Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Wang Ji-Zhi"'
Publikováno v:
Chinese Physics B. 17:4027-4032
Recently, two chaotic image encryption schemes have been proposed, in which shuffling the positions and changing the grey values of image pixels are combined. This paper provides the chosen plaintext attack to recover the corresponding plaintext of a
Publikováno v:
2010 International Conference on Future Information Technology and Management Engineering.
In this paper, we investigate the problem of efficient image data encryption and compression. Based on feedforward-feedback nonlinear dynamic filter (FFNDF) and employing random arithmetic coding, a novel image encryption scheme integrated with the s
Publikováno v:
2010 International Conference on Electrical and Control Engineering.
Chaotic maps can be used in constructing hash function because of their properties, such as parameter-sensitivity and random-similarity. Many algorithms have been proposed for chaos-based one-way hash function. However, how to map bit strings into de
Publikováno v:
2008 9th International Conference on Signal Processing.
In this paper, a novel image encryption scheme based on chaotic maps is proposed. By combining XOR operations and circular bit shift operation, the security of this encryption algorithm is enhanced effectively. Two chaotic maps are adopted in the pro
Publikováno v:
2007 8th International Conference on Electronic Measurement and Instruments.
The Internet Engineering Task Force (IETF) has introduced IPv6 with a mission to meet the growing demands of the future Internet. IPv6 is more and more emphasized and moving from the pilot phase to the practical application. In the process of deployi
Publikováno v:
ISI
Summary form only given. Along with the rapid development and wide application of Internet technique, the research about communication security becomes a very important topic in theory and the practice. For the explicitness and large information cont
Autor:
Xu Shu-Jiang, Wang Ji-Zhi
Publikováno v:
Acta Physica Sinica. 57:37
Recently,a large number of chaotic cryptosystems have been proposed,yet many of them have the drawbacks of lack of robustness and security. In this paper,we point out the weakness of a very recent block cipher algorithm which is based on the ch
Publikováno v:
Acta Physica Sinica. 57:2737
The collision of a keyed hash function based on chaotic map is pointed out. Its principle is analyzed in theory. The definition of the nonsingularity is presented based on analyzing digital discrete chaotic sequence. The necessary and sufficient cond
Publikováno v:
Acta Physica Sinica. 55:5048
Chaos would happen within certain ranges of parameters of chaotic system. The chaos sequence has good pseud random character. Now some papers have provided some methods to construct one-way hash function based on chaotic map. Through analyzing these
Publikováno v:
2008 9th International Conference on Signal Processing; 2008, p1014-1018, 5p