Chinese Journal of Liquid Crystals and Displays, Volume. 34, Issue 12, 1210(2019)
Imageen cryption-secret sharing algorithm based on two-dimensional cascade modulation coupling map
[1] [1] MIGLIORINI D, MINGOZZI E, VALLATI C. Performance evaluation of H.264/SVC video streaming over mobile WiMAX [J]. Computer Networks,2011, 55(15): 3578-3591.
[2] [2] PRAVEENKUMAR P, PRIYA P C, AVILA J, et al. Tamper proofing identification and authenticated DICOM image transmission using wireless channels and CR network [J]. Wireless Personal Communications,2017, 97(4): 5573-5595.
[3] [3] KEKRE H B, SARODE T, HALARNKAR P N. Partial image scrambling using Walsh sequency in sinusoidal wavelet transform domain [M]//BERRETTI S, THAMPI S M, SRIVASTAVA P R. Intelligent Systems Technologies and Applications: Volume 1. Cham: Springer,2015: 471-484.
[4] [4] SONG C Y, QIAO Y L. A novel image encryption algorithm based on DNA encoding and spatiotemporal chaos [J]. Entropy,2015, 17(10): 6954-6968.
[5] [5] LEI Z Q, XIAO D. Artificial image security degradation algorithm based on invertible information hiding in spatial domain [J]. Computer Science,2015, 42(3): 162-166. (in Chinese)
[6] [6] MU X F, DENG H X, LI X B, et al. Two-phase image steganalysis algorithm based on artificial bee colony algorithm [J]. Computer Science,2019, 46(6): 174-179. (in Chinese)
[7] [7] LIU X. Based on the distributed mass image data storage system in the research and design [D]. Shenzhen: Shenzhen University, 2016. (in Chinese)
[8] [8] LIU Y X, YANG C N, WU C M, et al. Threshold changeable secret image sharing scheme based on interpolation polynomial [J]. Multimedia Tools and Applications,2019, 78(13): 18653-18667.
[9] [9] LI P, YANG C N, ZHOU Z L. Essential secret image sharing scheme with the same size of shadows [J]. Digital Signal Processing,2016, 50: 51-60.
[10] [10] CAO C, SUN K H, LIU W H. A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map [J]. Signal Processing,2018, 143: 122-133.
[11] [11] HUA Z Y, ZHOU Y C, CHEN C L P. A new series-wound framework for generating 1D chaotic maps [C]//Proceedings of 2013 IEEE Digital Signal Processing and Signal Processing Education Meeting (DSP/SPE). Napa, CA, USA: IEEE,2013: 118-123.
[12] [12] LIU W H, SUN K H, ZHU C X. A fast image encryption algorithm based on chaotic map [J]. Optics and Lasers in Engineering,2016, 84: 26-36.
[13] [13] MAY B R. Simple mathematical models with very complicated dynamics [J]. Nature,1976, 261(5560): 459-467.
[14] [14] HE D, HE C, JIANG L G, et al. Chaotic characteristics of a one-dimensional iterative map with infinite collapses [J]. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications,2001, 48(7): 900-906.
[15] [15] ASMA F. Finite element model updating using Lagrange interpolation [J]. Mechanics and Mechanical Engineering,2019, 23(1): 228-232.
Get Citation
Copy Citation Text
WANG Wan-ping, LI Bing. Imageen cryption-secret sharing algorithm based on two-dimensional cascade modulation coupling map[J]. Chinese Journal of Liquid Crystals and Displays, 2019, 34(12): 1210
Category:
Received: Aug. 16, 2019
Accepted: --
Published Online: Jan. 9, 2020
The Author Email: