[1] |
Morris R,Sloane N J A,Wyner A D.Assessment of the national bureau of standards proposed federal data encryption standard[J].Cryptologia,1977,1(3):281-291.
|
[2] |
Daemen J,Rijmen V.Announcing the advanced encryption standard(AES)[J].Federal Information Processing Stan- dards Publication,2001,29(8):2200-2203.
|
[3] |
Singh G.A study of encryption algorithms (RSA,DES,3DES and AES) for information security[J].International Journal of Computer Applications,2013,67(19):33-38.
|
[4] |
Araki K,Satoh T,Miura S.Overview of elliptic curve cryptography[C]∥Proc of the 1st International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography, 1998:29-49.
|
[5] |
Hossein M G,Ali N,Rasul E.An overview of encryption algorithms in color images[J].Signal Processing,2019,164:163-185.
|
[6] |
Shao Li-ping. Digital image scrambling technology[M].Beijing:Science Press,2016.(in Chinese)
|
[7] |
Zhang Xiao-qiang,Wang Meng-meng,Zhu Gui-liang. Research on the new development of image encryption algorithms[J].Computer Engineering & Science,2012,34(5):1-6.(in Chinese)
|
[8] |
Dang P P,Chau P M.Image encryption for secure Internet multimedia applications[J].IEEE Transactions on Consumer Electronics,2000,46(3):395-403.
|
[9] |
Zhang Min-rui,Huang Xing.Digital image scrambling based on BP neural network[J].Journal of Wuhan University of Technology (Information & Management Engineering),2007,29(10):5-9.(in Chinese)
|
[10] |
Kang X J, Guo Z H.A new color image encryption scheme based on DNA encoding and spatiotemporal chaotic system[J].Signal Processing:Image Communication,2020,80:115670.
|
[11] |
Chang K C,Liu J L.A linear quadtree compression scheme for image encryption[J].Signal Processing:Image Communication,1997,10(4):279-290.
|
[12] |
Zhang Chen,Ji Yong-gang.Research on image encryption method based on blind source separation[J].Modern Information Technology,2018,2(1):143-145.(in Chinese)
|
[13] |
Chen Na,Wu Jiang-bo. The discrete wavelet thansform and discrete orthonomal Stockwell transform based optical image encryption algorithm[J].Optical Technology,2019,45(3):348-354.(in Chinese)
|
[14] |
Li M, Liang T, He Y J.Arnold transform based image scrambling method[C]∥Proc of the 3rd International Conference on Multimedia Technology,2013:1309-1316.
|
[15] |
Zhou Y C, Panetta K,Agaian S,et al.Image encryption using P-Fibonacci transform and decomposition[J].Optics Communications,2012,285(5):594-608.
|
[16] |
Lin K T.Hybrid encoding method by assembling the magic-matrix scrambling method and the binary encoding method in image hiding[J].Optics Communications,2011,284(7):1778-1784.
|
[17] |
Hu Ke-ya,Wang Ying,Wang Jun.Image encryption based on block compression sensing and the improved magic square transformation[J].Laser Technology,2019,43(4):532-538.(in Chinese)
|
[18] |
Chai Z Q, Liang S L,Hu G R,et al.Periodic characteristics of the Josephus ring and its application in image scrambling[J].EURASIP Journal on Wireless Communications and Networking,2018:Article number 162.
|
[19] |
Fridrich J.Image encryption based on chaotic maps[C]∥Proc of 1997 IEEE International Conference on Systems,Man,and Cybernetics.Computational Cybernetics and Simulation,1997:1105-1110.
|
[20] |
Bai Sen,Cao Chang-xiu,Cao Long-han,et al.Digital image detail hiding technology based on knight-tour transformation[J].Chinese Journal of Image and Graphics,2001,6A(11):1096-1100.(in Chinese)
|
[21] |
Pan Ying-li,He Bing,Wang Ying. Image encryption algorithm based on improved knight tour[J].Computer and Digital Engineering,2016,44(1):136-140.(in Chinese)
|
[22] |
Lan Hong,Fang Yi.Modified knight’s tour image Encryption algorithm based on Arnold transform[J].Communications Technology,2018,51:1663-1670.(in Chinese)
|
[23] |
Kong Tao,Zhang Duan.A new anti-Arnold transformation algorithm [J].Journal of Software,2004,15(10):1558-1564.(in Chinese)
|
[24] |
Chen Xi,Xiang Fei,Zhang Zhi-yong,et al.Research and verification of 2-dimensional non-equilateral image scrambling methods[J].Journal of Hefei University of Technology (Natural Science),2013,36(8):929-932.(in Chinese)
|
[25] |
Hu Wei-wei,Zhang Yuan-biao,Yang Wen-yan. Research of digital image based on IFS and code space[J].Mathematics in Practice and Theory,2004,34(3):91-97.(in Chinese)
|
[26] |
Qi D X, Zou J C, Han X Y.A new class of scrambling transformation and its application in the image information covering[J].Science in China Series E:Technological Sciences,2000,43(3):304-312.
|
[27] |
Yang Y L,Cai N, Ni G Q. Digital image scrambling technology based on the symmetry of Arnold transform[J].Journal of Beijing Institute of Technology,2006,15(2):216-220.
|
[28] |
Shao Li-ping,Qin Zheng,Gao Hong-jiang,et al. 2-dimensional nonequilateral image scrambling transformation[J].Acta Electronica Sinica,2007,35(7):1290-1294.(in Chinese)
|
[29] |
Li Yong-kui,Feng Qiao-sheng,Zhou Fen,et al.2-D Arnold transformation and non-equilateral image scrambling transformation[J].Computer Engineering and Design,2009,30(13):3133-3135.(in Chinese)
|
[30] |
Wu Cheng-mao. Improvement of two dimensional non-equilateral transform and its application[J].Journal of Computer-Aided Design & Graphics,2015,27(8):1529-1538.(in Chinese)
|
[31] |
Hu M Y, Tian X L, Xia S W, et al.Image scrambling based on 3-D Hilbert curve[C]∥Proc of 2010 3rd International Congress on Image and Signal Processing,2010:147-149.
|
[32] |
Lagrange’s Four Square Theorem [EB/OL].[2020-05-13].http://www.personal.psu.edu/rcv4/Foursq.pdf#opennewwindow.
|
[33] |
Zhao Na.Research and implementation of magic square algorithm[J].Computer Study,2010(4):70-71.(in Chinese)
|
[34] |
Chang Xiu-ling,Lian Ying-chun.Wonderful odd-order magic squares[J].Journal of Inner Mongolia Minzu University,2010,16(2):11-12.(in Chinese)
|
[35] |
Li Guan-lin,Gu Da-quan.Research on the realization method of magic square[J].Microcomputer Applications,2010,26(1):17-18.(in Chinese)
|
[36] |
Pan Lin-sen.The symmetric exchange construction method of even-order magic squares[J].Journal of Chongqing Teachers College(Natural Science Edition),1997,14(1):12-17.(in Chinese)
|
[37] |
Yang Fu-tai.Demonstration on the production of magic squares of odd and even orders [J].Journal of Puyang Vocational and Technical College,2018,31(2):50-52.(in Chinese)
|
[38] |
Wang Dong-mei,Huang Lin,Wang Jin-rong.Encrypting digital holograph with magic transformation[J].Journal of Zhejiang University of Technology,2007,35(1):116-118.(in Chinese)
|
[39] |
Ye Man-zhu,Liao Shi-fang,Wang Xin-fang.A new image scrambling algorithm based on magic square transformation[J].Automation & Instrumentation,2016(2):216-218.(in Chinese)
|
[40] |
Zhong W B, Yu D H, Fang K T.Image encryption by using magic squares[C]∥Proc of 2016 9th International Congress on Image and Signal Processing,BioMedical Engineering and Informatics,2016:771-775.
|
[41] |
Chen Shan-xue, Yang Ya-juan,Yin Xiu-xuan. Digital image encryption algorithm based on improved knight's tour and bit operation[J].Journal of Chinese Computer Systems,2015,36(7):1607-1612.(in Chinese)
|
[42] |
The USC-SIPI image database[EB/OL].[2020-07-12].http://sipi.usc.edu/database/.
|
|
附中文参考文献:
|
[6] |
邵利平.数字图像置乱技术[M].北京:科学出版社,2016.
|
[7] |
张晓强,王蒙蒙,朱贵良.图像加密算法研究新进展[J].计算机工程与科学,2012,34(5):1-6.
|
[9] |
张敏瑞,黄兴.基于BP神经网络的数字图像置乱技术[J].武汉理工大学学报(信息与管理工程版),2007,29(10):5-9.
|
[12] |
张晨,冀勇钢.基于盲源分离的图像加密方法研究[J].现代信息科技,2018,2(1):143-145.
|
[13] |
陈娜,毋江波.基于离散小波变换的离散正交S变换域图像加密算法[J].光学技术,2019,45(3):348-354.
|
[17] |
胡克亚,王莹,王君.基于分块压缩感知和改进幻方变换的图像加密[J].激光技术,2019,43(4):532-538.
|
[20] |
柏森,曹长修,曹龙汉,等.基于骑士巡游变换的数字图象细节隐藏技术[J].中国图象图形学报,2001,6A(11):1096-1100.
|
[21] |
潘营利,何冰,王英.基于骑士巡游的改进图像加密算法[J].计算机与数字工程,2016,44(1):136-140.
|
[22] |
兰红,方毅.基于Arnold变换的改进骑士巡游图像加密算法[J].通信技术,2018,51(7):1663-1670.
|
[23] |
孔涛,张亶.Arnold反变换的一种新算法[J].软件学报,2004,15(10):1558-1564.
|
[24] |
陈曦,向菲,张志勇,等.二维非等长图像置乱方法的研究与验证[J].合肥工业大学学报(自然科学版),2013,36(8):929-932.
|
[25] |
胡薇薇,张元标,阳汶言.基于迭代函数系统和编码空间的数字图像置乱方法研究[J].数学的实践与认识,2004,34(3):91-97.
|
[28] |
邵利平,覃征,高洪江,等.二维非等长图像置乱变换[J].电子学报,2007,35(7):1290-1294.
|
[29] |
李永逵,冯乔生,周粉,等.二维Arnold变换及非等长图像置乱变换[J].计算机工程与设计,2009,30(13):3133-3135.
|
[30] |
吴成茂.二维不等长变换改进及其应用[J].计算机辅助设计与图形学学报,2015,27(8):1529-1538.
|
[33] |
赵娜.幻方算法的研究与实现[J].电脑学习,2010(4):70-71.
|
[34] |
常秀玲,连迎春.奇妙的奇数阶幻方[J].内蒙古民族大学学报,2010,16(2):11-12.
|
[35] |
李冠林,顾大权.幻方的实现方法研究[J].微型电脑应用,2010,26(1):17-18.
|
[36] |
潘林森.偶数阶幻方的对称交换构造法[J].重庆师范学院学报(自然科学版),1997,14(1):12-17.
|
[37] |
杨富太.单偶数阶幻方制作论证[J].濮阳职业技术学院学报,2018,31(2):50-52.
|
[38] |
王冬梅,黄琳,王金荣.幻方变换加密数字全息图[J].浙江工业大学学报,2007,35(1):116-118.
|
[39] |
叶满珠,廖世芳,王新芳.基于幻方变换的图像置乱新算法[J].自动化与仪器仪表,2016(2):216-218.
|
[41] |
陈善学,杨亚娟,尹修玄.改进的骑士巡游和位运算数字图像加密算法[J].小型微型计算机系统,2015,36(7):1607-1612.
|