[1] |
Chen Yong-fu,Song Peng,Wang Qi-fu,et al.Data leak prevention storage technology under cloud environment[J].Computer Applications and Software,2016,33(10):288-293.(in Chinese)
|
[2] |
Rui Kun-kun.On image encryption algorithm based on discrete Fourier transformation integrating with doubling chaotic map[J].Computer Applications and Software,2014,31(10):327-330.(in Chinese)
|
[3] |
Zhang Xiao-qiang, Wang Meng-meng,Zhu Gui-liang.Research on the new development of image encryption algorithms[J].Computer Engineering & Science,2012,34(5):1-6.(in Chinese)
|
[4] |
Li Chang-gang,Han Zheng-zhi,Zhang Hao-ran.An image encryption algorithm based on random key and “quasi-standard map”[J].Chinese Journal of Computers,2003,26(4):465-470.(in Chinese)
|
[5] |
Liang Yan-hui,Li Guo-dong,Wang Ai-yin.Frequency domain adaptive image encryption algorithm based on fractional order Chen hyperchaos[J].Computer Science,2019,46(Z2):488-492.(in Chinese)
|
[6] |
Zhu Shu-qin,Wang Wen-hong,Sun Zhong-gui.Security ana- lysis and improvement of chaotic image encryption algorithm[J].Computer Engineering and Applications,2019,55(1):115-122.(in Chinese)
|
[7] |
Chen Shao-peng.The performance analysis of attack methods about the advanced encryption standard[D].Xi’an:Xidian University,2014.(in Chinese)
|
[8] |
Lee Y,Tsai W.A new secure image transmission technique via secret-fragment-visible mosaic images by nearly reversible color transformation[J].IEEE Transactions on Circuits & Systems for Video Technology,2013,24(4):695-703.
|
[9] |
Bao L,Zhou Y.Image encryption:Generating visually meaningful encrypted images[J].Information Sciences,2015,324:197-207.
|
[10] |
Zheng S,Liu X,Chen R,et al.LSB-based visual image encryption scheme in cloud environment[C]∥Proc of 2019 IEEE International Conference on Parallel & Distributed Processing with Applications,2019:891-896.
|
[11] |
Hou D,Zhang W,Yu N.Image camouflage by reversible image transformation[J].Journal of Visual Communication & Image Representation,2016,40(A):225-236.
|
[12] |
Ping P,Fu J,Mao Y,et al.Meaningful encryption:Generat- ing visually meaningful encrypted images by compressive sensing and reversible color transformation[J].IEEE Access,2019,7:170168-170184.
|
[13] |
Yao H,Liu X,Tang Z,et al.An improved image camouflage technique using color difference channel transformation and optimal prediction-error expansion[J].IEEE Access,2018,6:40569-40584.
|
[14] |
Zheng Yong, Zhou Zheng-hua, Zhu Wei-le.Still image quantization using two-dimension trellis coded vector quantization[J].Journal of Electronics & Information Technology,2002,24(12):1906-1911.(in Chinese)
|
|
附中文参考文献:
|
[1] |
陈永府,宋鹏,王启富,等.云环境下的数据防泄密存储技术[J].计算机应用与软件,2016,33(10):288-293.
|
[2] |
芮坤坤.基于离散傅里叶变换融合双混沌映射的图像加密算法研究[J].计算机应用与软件,2014,31(10):327-330.
|
[3] |
张晓强,王蒙蒙,朱贵良.图像加密算法研究新进展[J].计算机工程与科学,2012,34(5):1-6.
|
[4] |
李昌刚,韩正之,张浩然.一种基于随机密钥及“类标准映射”的图像加密算法[J].计算机学报,2003,26(4):465-470.
|
[5] |
梁晏慧,李国东,王爱银.基于分数阶Chen超混沌的频域自适应图像加密算法[J].计算机科学,2019,46(Z2):488-492.
|
[6] |
朱淑芹,王文宏,孙忠贵.对一种混沌图像加密算法的安全分析和改进[J].计算机工程与应用,2019,55(1):115-122.
|
[7] |
陈少鹏.高级加密标准攻击方法的性能分析[D].西安:西安电子科技大学,2014.
|
[14] |
郑勇,周正华,朱维乐.二维网格编码矢量量化及其在静止图像量化中的应用[J].电子与信息学报,2002,24(12):1906-1911.
|