首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2篇
  免费   0篇
教育   2篇
  2004年   2篇
排序方式: 共有2条查询结果,搜索用时 15 毫秒
1
1.
Pure position permutation image encryption algorithms,commonly used as image encryption investigated in this work are unfortunately frail under known-text attack.In view of the weakness of pure position permutation algorithm,we put forward an effective decryption algorithm for all pure-position permutation algorithms.First,a summary of the pure position permutation image encryption algorithms is given by introducing the concept of ergodic matrices.Then,by using probability theory and algebraic principles,the decryption probability of pure-position permutation algorithms is verified theoretically; and then,by defining the operation system of fuzzy ergodic matrices,we improve a specific decryption algorithm.Finally,some simulation results are shown.  相似文献   
2.
INTRODUCTION Due to the development of communicationtechnology, information security becomes an increasingly important problem. The wide use omultimedia technology and the improvement innetwork transmission gradually enable direct acquisition of information clearly through imagesHence, data security has become a critically important issue. Many encryption algorithms havebeen proposed to protect valuable data from unauthorized parties. The basic methods can be classified into th…  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号