Welcome![Sign In][Sign Up]
Location:
Search - chaotic map image

Search list

[Special Effectsxbpjepg

Description: 基于小波变换和混沌映射的多功能图像水印算法,完成的图像数字水印加密-based on wavelet transform and the chaotic map multifunctional image watermarking algorithm to complete the digital watermark image encryption
Platform: | Size: 36294 | Author: xxx | Hits:

[Special Effectsxbpjepg

Description: 基于小波变换和混沌映射的多功能图像水印算法,完成的图像数字水印加密-based on wavelet transform and the chaotic map multifunctional image watermarking algorithm to complete the digital watermark image encryption
Platform: | Size: 35840 | Author: xxx | Hits:

[AI-NN-PRchaos-baker-vanderpol

Description: baker(面包师变换)的混沌图像,面包师变换是混沌的一种,是一维的混沌映射。vanderpol混沌系统的图像-baker (baker transform) of chaotic image, the baker's transformation is a chaotic, is a dimension of chaotic maps. Vanderpol chaotic system image
Platform: | Size: 1024 | Author: xuqs | Hits:

[Special EffectslogisticDCT

Description: matlab版本,基于混沌logstic映射的DCT域数字水印提取算法!很不错的1-matlab version logstic based on chaotic map DCT domain digital watermarking extraction algorithm! Very good one
Platform: | Size: 6144 | Author: 刘田 | Hits:

[Crack Hackinformationhide

Description: 基于混沌系统的图像加密算法,先采用Arnold猫映射进行像素点位置置乱,然后对置乱后的图像的像素值进行Liu混沌加密或者Lorenz混沌加密。-Chaotic systems based on image encryption algorithm, first using Arnold cat map for the location of pixel scrambling, and then scrambling image pixel values Liu chaotic encryption or Lorenz chaotic encryption.
Platform: | Size: 1416192 | Author: 巢歌 | Hits:

[GIS programmatlab

Description: 基于Logistic混沌映射图像加密 -Based on the Logistic chaotic map image encryption
Platform: | Size: 457728 | Author: colo | Hits:

[Special Effectsmiyao

Description: 本文提出了基于二维混沌映射的数字图像水印算法,混沌具有随机性、似噪声及对初始条件的极端敏感性等特点。将经过二维混沌映射置乱后的数字水印信号嵌入图像小波域的低频系数,实现了数字水印的隐蔽性、保密性和稳固性;利用二维混沌映射Arnold变换对水印信号进行置乱,不仅增强了水印信号保密性,同时有效提高了视觉上抵抗图像剪切攻击的能力。-In this paper, two-dimensional chaotic map based on digital image watermarking algorithm, Chaos with random noise and the likelihood of extreme sensitivity to initial conditions and so on. Two-dimensional chaotic map will be scrambling after the digital watermark embedded image signal of the low-frequency coefficients in wavelet domain, the realization of a digital watermark hidden, security and stability the use of two-dimensional chaotic map on Arnold transform scrambling watermark signal, not only enhances the confidentiality of the watermark signal at the same time improve the visual image shear resistance attacks.
Platform: | Size: 668672 | Author: lafeng | Hits:

[Special EffectsLorenz

Description: 用Lorenz映射生成三维混沌密码流,对密码流排序后生成三个不同的置换地址集合,用这个地址集合对图像RGB三层的像素点分别进行重新排列,从而达到置乱的目的。逆向即可完成图像的恢复。 -Lorenz map is generated using three-dimensional chaotic password flow, flow sorting of passwords generated after the address of a collection of three different permutations, using this address RGB three-tier set of image pixels were re-arranged so as to achieve the purpose of scrambling. Reverse to complete the image recovery.
Platform: | Size: 1399808 | Author: Tom | Hits:

[Crack HackAnImageEncryptionSchemeBasedonChaoticMap

Description: ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map - In this paper, a novel block digital image encryp- tion scheme based on a chaotic coupled map lattices (CML) is reported. Within this scheme, an original image is decomposed into sub-blocks with a given size, and an external secret key with 192-bit is used and mapped to the system parameters, which are employed to generate a spatiotemporal chaotic binary sequence matrix to encrypt the block original image. Besides, the former sub-block encrypted result will be acted as a feedback to the following sub-block encryption proc- ess. The proposed scheme is described in detail, along with the security analyses such as key space analysis, sensitivity analysis, information entropy analysis and correlation coefficients analysis of adjacent pixels. The computer simulation results indicate that the suggested image encryption scheme has some properties desir- able in a good security cryptosystem.
Platform: | Size: 1104896 | Author: ff | Hits:

[Crack HackNewcolorimageencryptionalgorithmbasedonchaoticsequ

Description: IEEE2008年文章An Image Encryption Scheme Based on Chaotic Map -An Image Encryption Scheme Based on Chaotic Map
Platform: | Size: 162816 | Author: ff | Hits:

[Special EffectsTwo-dimensional-chaotic-map

Description: 本文提出了基于二维混沌映射的数字图像水印算法,混沌具有随机性、似噪声及对初始条件的极端敏感性等特点。-In this paper, two-dimensional chaotic map based on digital image watermarking algorithm, Chaos is random, like noise and extreme sensitivity to initial conditions and so on.
Platform: | Size: 665600 | Author: 陈万虹 | Hits:

[Special EffectsLogistic

Description: :提出了一种新的基于混沌映射与排序变换的图像加密算法。混沌序列具有容易生成、对初始条件敏感以及具备白噪声的统计特性等优点。该算法利用混沌映射对初值的敏感性和伪随机性,通过对生成的混沌序列排序来得到图像置乱的地址变换码,由于排序的不规则性,因此新的混沌图像置乱算法具有较强的保密性能。通过对该算法的置乱性能分 析并进行仿真实验,结果表明,新算法具有良好的图像加密性能。-his paper presents a new encryption algorithm based on chaotic map image transformation and sorting. Chaotic sequence is easy to generate, sensitive to initial conditions, and with white noise statistical properties. The algorithm uses chaotic maps of sensitivity to initial values ​ ​ and pseudo-randomness, get the address of image scrambling transformation code generated chaotic sequence sorting, sort of irregular, so the new chaotic image scrambling algorithm has more strong performance of confidentiality. Scrambling performance points by the algorithm Analysis and simulation results show that the new algorithm has a good image encryption performanc
Platform: | Size: 208896 | Author: 陳曉慧 | Hits:

[Software Engineeringdocument

Description: In this paper, four chaotic maps are compared and noise effects are observed on image. Firstly, we use the image encryption algorithm to convert original image to encrypted image. Now we apply noise on the encrypted image and then decrypt cipher image with noise back to original image. The Simulation experimental results shows that Cross Chaotic map has got best results. Also, noise has a little effect on original image and can easily be received by the receiver. -In this paper, four chaotic maps are compared and noise effects are observed on image. Firstly, we use the image encryption algorithm to convert original image to encrypted image. Now we apply noise on the encrypted image and then decrypt cipher image with noise back to original image. The Simulation experimental results shows that Cross Chaotic map has got best results. Also, noise has a little effect on original image and can easily be received by the receiver.
Platform: | Size: 813056 | Author: hany | Hits:

[OtherLogistic-Henon-kent

Description: 混沌映射(序列)matlab算法“小全”:Logistic、Henon、帐篷、kent(含混沌二值图像生成函数)的matlab程序-Chaotic map (sequence) matlab algorithm " Souvenir" : Logistic, Henon, Tent, kent (including chaotic binary image generating function) matlab program
Platform: | Size: 119808 | Author: wch | Hits:

[matlab_ab2a1553c99663972265e106ea5efccb

Description: 混沌映射(序列)matlab算法“小全”:Logistic、Henon、帐篷、kent(含 混沌二值图像生成函数)-Chaotic map (sequence) matlab algorithm "Souvenir": Logistic, Henon, Tent, kent (including Chaos binary image generating function)
Platform: | Size: 118784 | Author: 闵国旗 | Hits:

[Special Effects1247900827image-encryption

Description: 图像加密,使用量logistic混沌映射对图像进行了加密和解密,可以直接运行-Image encryption, usage logistic chaotic map for image encryption and decryption, you can directly run
Platform: | Size: 188416 | Author: renguorui | Hits:

[Crack Hack2D-logistic-image-encrytion

Description: 本matlab函数,利用混沌映射不可预测性,遍历性和敏感性,以它们的参数和初始值的优异特性的,实现一个图像加密算法。我们引入了一个新的二维logistics函数。与现有的混沌映射相比,它具有更广泛的范围内混乱,更好的遍历性,混沌性和relativelylow实施成本。为了研究及其应用,我们提出了一个之乱转换(CMT),以有效地改变图像的像素位置。结合2D-logistics与CMT,我们进一步实现图像加密算法。-In this matlab test,we use the chastic s excellent properties of unpredictability, ergodicity and sensitivity to their parameters and initial values, chaotic maps are widely used in security applications. In this paper, we introduce a new two-dimensional Sine Logistic modulation map (2D-SLMM) which is derived the Logistic and Sine maps. Compared with existing chaotic maps,it has the wider chaotic range, better ergodicity, hyperchaotic property and relativelylow implementation cost. To investigate its applications, we propose a chaotic magic trans-form (CMT) to efficiently change the image pixel positions. Combining 2D-SLMM with CMT, we further introduce a new image encryption algorithm.
Platform: | Size: 4852736 | Author: Knight | Hits:

[CA authGuo10

Description: Test for GUO10 chaotic map image encode/decode algorithm
Platform: | Size: 1108992 | Author: rorrypikd | Hits:

[Crack HackLiu12

Description: Test for LIU12 chaotic map image encode/decode algorithm. A-RGB-image-encryption-algorithm-based-on-DNA-encoding-and-chaos-map_2012_Computers-and-Electrical-Engineering paper
Platform: | Size: 100352 | Author: rorrypikd | Hits:

[Industry researchDesigning a 2D infinite collapse map for image encryption

Description: Due to the unpredictability and complexity properties, chaotic maps are widely applied in security, com- munication, and system control. Existing one-dimensional (1D) chaotic maps can be easily predicted and high-dimensional (HD) ones have more complex structures and higher computation costs. In order to enhance the chaotic performance, this paper proposes a new two-dimensional infinite collapse map (2D- ICM). Compared with existing 2D chaotic maps, 2D-ICM has better ergodicity, hyperchaotic property, un- predictability, and a wider chaotic region. To investigate its application, we further propose an image encryption algorithm using 2D-ICM. Simulation demonstrates that the proposed image encryption algo- rithm has excellent performance for protecting various kinds of images.
Platform: | Size: 6732366 | Author: zhedongtzdt@163.com | Hits:
« 12 »

CodeBus www.codebus.net