期刊文献+

图像的一维迭代加密-识别 被引量:4

One dimension iteration encryption-recognition of image
在线阅读 下载PDF
导出
摘要 图像加密传递是计算加密通讯中的一个重要研究分支 .图像的安全的传递研究具有重要的理论价值与应用价值 .提出图像的一维迭代加密 识别 ,给出迭代加密 识别算法与应用 . Encryption transference of image is one important branch in computation encryption communication. Researches on secure transference of image have important theoretical and practical sigmificane. This paper presents one dimension iteration encryption-recognition of image, and iteration encryption-recognition algorithm both of which have good application prospect.
出处 《山东大学学报(工学版)》 CAS 2003年第5期546-549,共4页 Journal of Shandong University(Engineering Science)
关键词 图像的一维特征 椭圆曲线 迭代加密 迭代解密 识别 算法 one dimension characteristic of image elliptic curve iteration encryption iteration decryption recognition algorithm
  • 相关文献

参考文献10

  • 1史开泉,崔玉泉.双枝模糊决策与决策加密-认证[J].中国科学(E辑),2003,33(2):154-163. 被引量:41
  • 2史开泉,李歧强.双枝模糊决策与决策识别问题[J].中国工程科学,2001,3(1):71-77. 被引量:39
  • 3史开泉,陈泽雄.电力系统集团加密通信与集团签署—认证[J].电力系统自动化,2002,26(21):53-57. 被引量:4
  • 4史开泉,陈泽雄.电力系统加密通信与通信认证问题[J].中国电机工程学报,2002,22(10):34-38. 被引量:17
  • 5SHI Kaiquan,CUI Yuquan.Both—branch fuzzy decision and decision encryption—authentication[J].SCIENCE IN CHINA:Information Science(series F),2003,46(2):90-103.
  • 6HAN Guoping,SHI Kaiquan.Half-encryption and full-encryption of fuzzy recognition[J].International Journal of Fuzzy Mathematics,2002,10(2):385—397.
  • 7HAN Guoping,SHI Kaiquan.Fuzzy decision and group encryption-group sharing of decision conclusion[J].International Journal of Fuzzy Mathematics.2003,11(3):5—10.
  • 8HAN Guoping,SHI Kaiquan.Eneryption of fuzzy recognition with t-order iteration[J].International Journal of Fizzy Mathematics,2003,11(3):4-12.
  • 9KOBLIZ N.Elliptic curve cryptoSystem[J].International Journal of Mathematics of Computer,1987,48(17):203—209.
  • 10RIVEST R.SHZMIR A,ADLEMAN L.A method for obtaining digital signature and public—key cryptosystems[J].International Journal of Communications of the Associations for Computing Machinery,1978,20(2):120—126.

二级参考文献22

  • 1陈守煜.多目标系统模糊关系优选决策理论与应用[J].水利学报,1994,26(8):62-66. 被引量:60
  • 2卢开澄.计算机密码学[M].北京:清华大学出版社,2000..
  • 3[1]Koblitz N. Elliptic curve crypto systems[J]. Mathematics of Computation. 1987, 48(17):203-209.
  • 4[2]Menezes A J, Vanstone S A. Elliptic crypto system and their implementation[J]. Journal of Cryptology, 1993,6 (4):209-224.
  • 5[3]Vanstone S, Elliptic curve crypto system-the answer to strong, fast public-key cryptography for securing constrained environments[R]. Elsevier Information Security Technical Report, 1997, 78-87.
  • 6[4]Calli W,Dawson E,Rea S.PKI elliptic curve cryptography and digital signatures[J].Intemational Joumal of Computer and Security,1999, 18(1):47-66.
  • 7[5]Rivest R L,Shamir A, Adleman L. A method for obtaining digital signatures and public-key crypto systems[J]. Communications of the association for computing machinery, 1978, 21(2):120-126.
  • 8Harn L. Group-oriented (t,n) Threshold Digital Signature Scheme and Digital Multisignature. IEE Proceedings--Computer and Digital Techniques, 1994, 141(5): 307~313
  • 9Harn L, Lin H Y, Yang S. Threshold Cryptosystem with Multiple Secret Sharing Policies. IEE Proceedings--Computer and Digital Techniques, 1994, 141(2): 142~144
  • 10闵嗣鹤,严士健(Min Sihe, Yan shijian).初等数论(Primary Number Theory).北京:北京人民教育出版社(Beijing: People Education Press),1983.106-114

共引文献68

同被引文献26

  • 1史开泉,崔玉泉.Both-branch fuzzy decision and decision encryptionauthentication[J].Science in China(Series F),2003,46(2):90-103. 被引量:28
  • 2卢昌荆,史开泉.图像的二维混合迭代加密识别[J].山东大学学报(工学版),2003,33(6):681-684. 被引量:2
  • 3卢开澄.计算机密码学[M].北京:清华大学出版社,2000..
  • 4SHI Kaiquan, CUI Yuquan. Both-branch fuzzy decision and decision encryption-authentication [ J ]. SCIENCE IN CHINA(series F): Information Scinences, 2003,46(2):90-103.
  • 5KOBLITZ N. Elliptic curve cryptosystems[J]. Mathematics of Computation, 2000,198(17):203-209.
  • 6PERALTA R J. A simple and fast probabilistic algorithm for square roots a prime number[ J ]. IEEE Transactions on Information Theory, 1986,32(6) :846-847.
  • 7SILVERMAN R D, WAG STAFF S S . A practical and analysis of the elliptic curve factoring algorithm [ J]. Mathematics of Computation, 1993, (61) :445-462.
  • 8KOBLITZ N. Elliptic curve implementation of Zero-Knowl-edge Bloks[J]. Journal of Cryptology, 1991, 4(3) :207-213.
  • 9赵荣椿.数字图像处理导论[M].西安:西安工业大学出版社,1994.66-71.
  • 10高文.多媒体数据压缩技术[M].北京:电子工业出版社,1998.82-93.

引证文献4

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部