排序方式: 共有2条查询结果,搜索用时 15 毫秒
1
1.
Pure position permutation image encryption algorithms,commonly used as image encryption investigated in this work are unfortunately frail under known-text attack.In view of the weakness of pure position permutation algorithm,we put forward an effective decryption algorithm for all pure-position permutation algorithms.First,a summary of the pure position permutation image encryption algorithms is given by introducing the concept of ergodic matrices.Then,by using probability theory and algebraic principles,the decryption probability of pure-position permutation algorithms is verified theoretically; and then,by defining the operation system of fuzzy ergodic matrices,we improve a specific decryption algorithm.Finally,some simulation results are shown. 相似文献
2.
INTRODUCTION Due to the development of communicationtechnology, information security becomes an increasingly important problem. The wide use omultimedia technology and the improvement innetwork transmission gradually enable direct acquisition of information clearly through imagesHence, data security has become a critically important issue. Many encryption algorithms havebeen proposed to protect valuable data from unauthorized parties. The basic methods can be classified into th… 相似文献
1