(论文) 第 26 页
26
致谢
首先感谢我的导师刘洋教授,本文的研究工作是在他的悉心指导和严格要求下顺利完成的。在半年研究学习期间,他不仅教了我丰富的专业知识,同时也教了我严谨的治学态度和正确的治学方法,对我的学业和论文的写作无不倾注着辛勤的汗水和心血。他踏实的工作作风及诲人不倦的敬业精神将使我受益一生。在此,表示我最诚挚的感谢并致以崇高的敬意! 还要感谢学校给我们创造这么好的学习机会。感谢我的家人及朋友一直以来给予我的关爱、理解、支持与信任!
最后,衷心地感谢在百忙之中抽出时间评阅论文和参加答辩的各位专家和教授!
冯强 2013年5月10日
(论文) 第 27 页
27
参考文献
[1] C. E. Shannon. Communication Theory of Secrecy Systems [J]. Bell Systems TechnicalJournal, 1949,28(4):656–715.
[2] N.Bourbakis, C.Alexopoulos. Picture data encryption using scan patterns [J]. PatternRecognition, 1992,25(6):567-581.
[3] S. S. Maniccam, N. G. Bourbakis. Lossless image compression and encryption using SCAN[J]. Pattern Recognition, 2001,34(6):1229-1245. [4] S. S. Maniccam and N. G. Bourbakis. Image and video encryption using SCAN patterns [J].Pattern Recognition, 2004,37(4):725-737.
[5] 丁玮, 闰伟齐, 齐东旭. 基于生命游戏的数字图像置乱与数字水印技术闭[J]. 北方工业大学学报, 2000,12(l):l-5.
[6] D. Qi, J. Zou, and X. Han. A New Class of Scrambling Transformation and Its Application inthe Image Information Covering [J]. Science China E, 2000, 43(3): 304–312.
[7] M. Zhang, G. Shao, and K. Yi. T-matrix and Its Applications in Image Processing [J].Electronics Letters, 2004, 40(25): 1583-1584.
[8] 丁玮, 齐东旭. 数字图像变换及信息隐藏与伪装技术[J]. 计算机学报,1998, 21(9):838-843.
[9] 陈刚, 赵晓宇, 李均利. 一种自适应的图像加密算法[J]. 软件学报, 2005, 16 (11): 1975-1982.
[10] Marco Tomassini, Malthieu Perrenoud. Cryptography with cellular automata [J]. Applied SoftComputing, 2001,1(2):151-160.
[11] Zhihong Guan, Fanjun Huang, and Wenjie Guan. Chaos-based image encryption algorithrn [J].
Physies Letters A, 2005,346(l-3):153-157.
[12] Linhua Zhang, Xiaofeng Liao, and Xuebing Wang. An image encryption approach based on
chaotic maps [J]. Chaos,Solitons&Fractals, 2005,24(3):759-765.
(论文) 第 28 页
28
[13] M. Podesser, H. Schmidt. A Selective Bitplane Encryption for Secure Transmission of ImageData in Mobile Environments [C]. Fifth IEEE nordic signal processing symposium, 2002.
[14] 刘式达, 刘式适, 严中伟译. 混沌的本质[M]. 北京:气象出版社,1997:68-76.
[15] J. Fridrich. Symmetric ciphers based on two-dimensional chaotic maps [J]. Int J Bifurcation
and Chaos, 1998,8(6):1259-1284
[16] G. Chen, Y. Mao, C. Chui. Symmetric Image Encryption Scheme Based on 3D Chaotic CatMaps [J]. Chaos, Solitons & Fractals, 2004,21(3): 749-761. [17] 齐东旭, 邹建成. 一类新的置乱变换及其在图像信息陷蔽中的应用[J]. 中国科学,2000,30(5):440-447.
[18] Kwok-Wo Wong, Bernie Sin-Hung Kwok, Wing-Shing Law. A fast image encryption schemebased on chaotic standard map [J]. Physics Letters A , 372 (2008) 2645–2652.
[19] Kennedy J,Eberhart R.Particle swarm optimization[C]. IEEE International
Conference
onNeural
Networks,
Perth,
Australia,
1995,4:1942-1948.
[20] Guo Chen, Yong Chen, Xiaofeng Liao. An extended method for obtaining S-boxes based onthree-dimensional chaotic Baker maps[J]. Chaos, Solitons and Fractals, 2007,31: 571–579.
[21] Di Xiao, Xiaofeng Liao, K..W. Wong. An efficient entire chaos-based scheme for deniable
authentication [J]. Chaos, Solitons and Fractals, 2005,23:1327–1331. [22] Tao Xiang, Kwok-wo Wong, Xiaofeng Liao. A Novel Symmetrical Cryptosystem based onDiscretized Two-dimensional Chaotic Map[J]. Physics Letters A,2007,364(3-4):252-258.
[23] N.K. Pareek,Vinod Patidar,K.K. Sud Image encryption using chaotic logistic map[J]. Imageand Vision Computing, 2006,24:926–934
(论文) 第 29 页
29
[24] Linhua Zhang, Xiaofeng Liao, Xuebing Wang. An image encryption approach based onchaotic maps Chaos[J]. Solitons and Fractals, 2005, 24: 759–765 [25] Tao Xiang, Xiao feng Liao, Guoping Tang Yong Chen, Kwok-wo Wong. A novel blockcryptosystem based on iterating a chaotic map [J]. Physics Letters A, 2006,349:109–115.
[26] R.J. Chen, W.K. Lu and J.L. Lai. Image encryption using progressive cellular automatasubstitution and SCAN [C]. IEEE International Symposium on Circuits and Systems, 2005.
[27] F. Maleki, A. Mohades, S. Mehdi Hashemi, M.E. Shiri. An Image Encryption System byCellular Automata with Memory [C]. The Third International Conference on Availability,Reliability and Security. 2008.
[28] K. Martin, R. Lukac, K. Plataniotis. Efficient Encryption of Wavelet-based Coded ColorImages [J]. Pattern Recognition. 2005, 38(7): 1111-1115.
[29] K. Chan, F. Fekri. A Block Cipher Cryptosystem Using Wavelet Transforms Over FiniteFields [J]. IEEE Transactions on Signal Processing. 2004, 52(10): 2975-2991.
[30] C. Wu, C. Kuo. Design of Integrated Multimedia Compression and Encryption Systems [J].IEEE Transaction on Multimedia, 2005 7(5): 828-839.