Welcome![Sign In][Sign Up]
Location:
Search - image encryption based on chaos

Search list

[Special Effectsdct1_watermarked

Description: Firstly, research on robust image watermarking. A digital watermarking scheme based on wavelet transform was proposed. It realizes the watermarking extract without the original image using 64×64×8 bit gray image as the watermark signal. In order to enhancing the security of the watermark, we employ an encryption technology based on chaos and bit plan. Simulation results show that our scheme have good invisibility and can survive low-quality JPEG compression, median filtering and so on. In addition, the analysis of the extracted watermark can help us to detect and localize tampers.
Platform: | Size: 102725 | Author: xiaxianming | Hits:

[Special Effectsdct1_watermarked

Description: Firstly, research on robust image watermarking. A digital watermarking scheme based on wavelet transform was proposed. It realizes the watermarking extract without the original image using 64×64×8 bit gray image as the watermark signal. In order to enhancing the security of the watermark, we employ an encryption technology based on chaos and bit plan. Simulation results show that our scheme have good invisibility and can survive low-quality JPEG compression, median filtering and so on. In addition, the analysis of the extracted watermark can help us to detect and localize tampers.-Firstly, research on robust image watermarking. A digital watermarking scheme based on wavelet transform was proposed. It realizes the watermarking extract without the original image using 64 × 64 × 8 bit gray image as the watermark signal. In order to enhancing the security of the watermark, we employ an encryption technology based on chaos and bit plan. Simulation results show that our scheme have good invisibility and can survive low-quality JPEG compression, median filtering and so on. In addition, the analysis of the extracted watermark can help us to detect and localize tampers.
Platform: | Size: 102400 | Author: xiaxianming | Hits:

[Crack Hackchaos

Description: 这是从本网站下载的基于混沌序列的图像加密算法,自己又添加了两种加密算法以及做了一个较好的对话框界面。-This is downloaded from this site sequences based on chaotic image encryption algorithm, but it is adding two encryption algorithm as well as doing a good dialog box interface.
Platform: | Size: 1393664 | Author: 巢歌 | Hits:

[Other2

Description: 2007年硕士论文,基于混沌的数字图像和视频加密算法研究-Master' s thesis in 2007, based on the chaos of the digital image and video encryption algorithm
Platform: | Size: 4153344 | Author: 小杜 | Hits:

[Special Effectstuxiang

Description: 基于混沌理论的Logistic映射数字图像的加密算法,实现图像的置乱-Based on the Chaos Theory of Logistic mapping digital image encryption algorithm, the realization of image scrambling
Platform: | Size: 65536 | Author: 夏青 | Hits:

[matlablogistic-encrypt

Description: 基于Logistic混沌映射的图像加密 将图像数据转换成二进制数据,并采用Logistic进行混沌序列生成,然后设定阈值将其转换成二值序列,之后,设定加密规则,将二进制图像数据与混沌二值序列进行加密运算,实现图像加密-Based on Logistic chaos mapping image encryption
Platform: | Size: 892928 | Author: 林显 | Hits:

[Crack HackJournal-of-Electronic-Imaging

Description: Efficient modified RC5 based on chaos adapted to image encryption
Platform: | Size: 1019904 | Author: Ahmed | Hits:

[Special Effectschaos-alogrithm-based-on-matlab

Description: 几个经典的混沌映射函数,及其在图像加密中的应用算法文档-Several classic chaos mapping function, and its application in image encryption algorithm
Platform: | Size: 118784 | Author: Cherry | Hits:

[Crack Hackchaos

Description: 基于混沌理论加密的图片水印加密技术源代码-Based on chaos theory, the image watermark encryption technology encryption source code
Platform: | Size: 7410688 | Author: hejian | Hits:

[Program docNew-Microsoft-Office-Word-Document

Description: With the fast development of the computer technology and information processing technology, the problem of information security is becoming more and more important. Information hiding is usually used to protect the important information from disclosing when it is transmitting over an insecure channel. Digital image encryption is one of the most important methods of image information hiding and camouflage. The image encryption techniques mainly include compression methodology, modern cryptography mechanism, chaos techniques, DNA techniques, and so on. In this paper, we summarize the main encryption algorithms and classify them based on the means. In particular, chaos-based and DNA cryptography-based image encryption algorithms are illustrated and analyzed in detail. Finally, the future direction in this field is discussed.
Platform: | Size: 76800 | Author: mrinal | Hits:

[Crack HackImage-Cipher

Description: 本文主要提出一种新的基于混沌的图像加密算法。适用于BMP等格式图片!-This paper presents a new image encryption algorithm based on chaos. Applies to BMP format picture!
Platform: | Size: 1874944 | Author: 侯淇彬 | Hits:

[Crack Hackchaos

Description: 基于Visual C++的图像加密,采用混沌加密。-Based on the Visual image C++ encryption using chaotic encryption.
Platform: | Size: 3623936 | Author: | Hits:

[source in ebookChaotic-encryption

Description: 数字图像处理,图像加密,混沌加密,基于Visual C-Digital image processing, image encryption, encryption, based on Visual C++,chaos.
Platform: | Size: 15360 | Author: | Hits:

[Crack Hackimage_chaso

Description: 基于混沌同步的图像加密仿真代码 完美加密-Image encryption based on chaos synchronization perfect simulation code encryption
Platform: | Size: 305152 | Author: lunzi | Hits:

[Crack Hackchipher

Description: :目前混沌系统与加密技术相结合是现如今最热门的一个课题,虽然有大量的加密算法面世,但是这些加密算法并不成熟,仍然需要进一步的研究。本文采用像素位置置乱变换和像素值替代变换相结合的加密思想,设计出一种基于混沌的数字图像加密算法。引入了整数域上的逆仿射变换,算法中采用二维 logistic 混沌映射相结合的方法,生成多组混沌序列,像素置乱变换与灰度值替换都由这些混沌序列所控制。多混沌序列产生的密钥空间大于单一的混沌序列所产生的密钥空间,因此本文研究的算法加密强度很高。-The current chaotic system with encryption technology combined is now one of the hottest topics, although there are a number of encryption algorithms available, but these encryption algorithms are not ripe, still need further study. In this paper, the pixel position and the pixel value Scrambling alternative encryption ideological transformation combining design a digital image based on chaos encryption algorithm. The introduction of the inverse affine transformation integer domain, the algorithm uses a two-dimensional logistic chaos mapping method of combining to produce multiple sets of chaotic sequence, scrambling transformation and pixel gray values are replaced by the chaotic sequence control. Key space more chaotic sequence is greater than the key space of a single chaotic sequence generated by the algorithm to encrypt and therefore high strength paper.
Platform: | Size: 836608 | Author: sanmei | Hits:

[Windows DevelopProject1

Description: Program image encryption based on chaos.-Program image encryption based on chaos.
Platform: | Size: 219136 | Author: born007 | Hits:

[Special Effectsessey

Description: 基于混沌和分组结构的图像加密算法研究之论文的仿真matlab程序-Image encryption algorithm based on chaos and group structure of paper simulation of MATLAB programs
Platform: | Size: 9216 | Author: 思源 | Hits:

[CA authxu2016bit

Description: 基于混沌的图像比特级加密算法(新的置乱和扩散策略)-Image bit level encryption algorithm based on Chaos (New scrambling and diffusion strategy)
Platform: | Size: 1024 | Author: 王厚林 | Hits:

[Crack Hackhyperchaos

Description: Cryptanalysis of a new image encryption algorithm based on hyper-chaos
Platform: | Size: 751616 | Author: cs1400 | Hits:

[Special Effects混沌图像加密

Description: 介绍了数字图像加密技术的现状,主要介绍了混沌在数字图像加密领域内的应用。 提供了一个基于混沌的数字图像加密算法(This paper introduces the current situation of digital image encryption technology, mainly introduces the application of chaos in the field of digital image encryption. A digital image encryption algorithm based on chaos is presented.)
Platform: | Size: 163840 | Author: 432502 | Hits:
« 12 »

CodeBus www.codebus.net