|
[1]
|
张勇. 混沌数字图像加密[M]. 北京: 清华大学出版社, 2016.
|
|
[2]
|
Matthews, R. (1989) On the Derivation of a “Chaotic” Encryption Algorithm. Cryptologia, 13, 29-42. [Google Scholar] [CrossRef]
|
|
[3]
|
Fridrich, J. (1998) Symmetric Ciphers Based on Two-Dimensional Chaotic Maps. International Journal of Bifurcation and Chaos, 8, 1259-1284. [Google Scholar] [CrossRef]
|
|
[4]
|
Ye, R. (2011) A Novel Chaos-Based Image Encryption Scheme with an Efficient Permutation-Diffusion Mechanism. Optics Communications, 284, 5290-5298. [Google Scholar] [CrossRef]
|
|
[5]
|
Pareek, N.K., Patidar, V. and Sud, K.K. (2006) Image Encryption Using Chaotic Logistic Map. Image and Vision Computing, 24, 926-934. [Google Scholar] [CrossRef]
|
|
[6]
|
Stoyanov, B. and Kordov, K. (2015) Image Encryption Using Chebyshev Map and Rotation Equation. Entropy, 17, 2117-2139. [Google Scholar] [CrossRef]
|
|
[7]
|
Li, C., Luo, G., Qin, K. and Li, C. (2016) An Image Encryption Scheme Based on Chaotic Tent Map. Nonlinear Dynamics, 87, 127-133. [Google Scholar] [CrossRef]
|
|
[8]
|
Wang, X., Guan, N. and Yang, J. (2021) Image Encryption Algorithm with Random Scrambling Based on One-Dimensional Logistic Self-Embedding Chaotic Map. Chaos, Solitons & Fractals, 150, Article ID: 111117. [Google Scholar] [CrossRef]
|
|
[9]
|
Hua, Z. and Zhou, Y. (2016) Image Encryption Using 2D Logistic-Adjusted-Sine Map. Information Sciences, 339, 237-253. [Google Scholar] [CrossRef]
|
|
[10]
|
Tang, M., Zeng, G., Yang, Y. and Chen, J. (2022) A Hyperchaotic Image Encryption Scheme Based on the Triple Dislocation of the Liu and Lorenz System. Optik, 261, Article ID: 169133. [Google Scholar] [CrossRef]
|
|
[11]
|
Xiao, Y., Tong, X., Zhang, M. and Wang, Z. (2021) Image Lossless Encoding and Encryption Method of EBCOT Tier1 Based on 4D Hyperchaos. Multimedia Systems, 28, 727-748. [Google Scholar] [CrossRef]
|
|
[12]
|
Lai, Q., Hu, G., Erkan, U. and Toktas, A. (2023) High-efficiency Medical Image Encryption Method Based on 2D Logistic-Gaussian Hyperchaotic Map. Applied Mathematics and Computation, 442, Article ID: 127738. [Google Scholar] [CrossRef]
|
|
[13]
|
Hua, Z., Zhou, Y. and Bao, B. (2020) Two-dimensional Sine Chaotification System with Hardware Implementation. IEEE Transactions on Industrial Informatics, 16, 887-897. [Google Scholar] [CrossRef]
|
|
[14]
|
Liu, L., Jiang, D., Wang, X., Rong, X. and Zhang, R. (2021) 2D Logistic-Adjusted-Chebyshev Map for Visual Color Image Encryption. Journal of Information Security and Applications, 60, Article ID: 102854. [Google Scholar] [CrossRef]
|
|
[15]
|
Yang, Y., Wang, B., Pei, S., Zhou, Y., Shi, W. and Liao, X. (2021) Using M-Ary Decomposition and Virtual Bits for Visually Meaningful Image Encryption. Information Sciences, 580, 174-201. [Google Scholar] [CrossRef]
|
|
[16]
|
叶瑞松, 陈月明. 一个迭代函数系统的分形混沌特性及其应用[J]. 汕头大学学报(自然科学版), 2023, 38(2): 3-30.
|
|
[17]
|
Wong, K., Kwok, B.S. and Law, W. (2008) A Fast Image Encryption Scheme Based on Chaotic Standard Map. Physics Letters A, 372, 2645-2652. [Google Scholar] [CrossRef]
|
|
[18]
|
Shah, D., Shah, T. and Jamal, S.S. (2019) A Novel Efficient Image Encryption Algorithm Based on Affine Transformation Combine with Linear Fractional Transformation. Multidimensional Systems and Signal Processing, 31, 885-905. [Google Scholar] [CrossRef]
|
|
[19]
|
Ghebleh, M., Kanso, A. and Noura, H. (2014) An Image Encryption Scheme Based on Irregularly Decimated Chaotic Maps. Signal Processing: Image Communication, 29, 618-627. [Google Scholar] [CrossRef]
|