Hash encryption algorithm structure based on the hybrid Arnold mapping

被引:0
|
作者
Yu, Xiang [1 ]
机构
[1] Chongqing Radio and TV University, Jiulongpo District, Chongqing, China
关键词
D O I
10.4156/ijact.vol4.issue18.64
中图分类号
学科分类号
摘要
引用
收藏
页码:540 / 548
相关论文
共 50 条
  • [21] A new Grayscale image encryption algorithm composed of logistic mapping, Arnold cat, and image blocking
    Zareai, Delavar
    Balafar, Mohammadali
    Feizi Derakhshi, Mohammad Reza
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (12) : 18317 - 18344
  • [22] Image encryption algorithm based on multiple mixed hash functions and cyclic shift
    Wang, Xingyuan
    Zhu, Xiaoqiang
    Wu, Xiangjun
    Zhang, Yingqian
    OPTICS AND LASERS IN ENGINEERING, 2018, 107 : 370 - 379
  • [23] JPEG Image Encryption Algorithm Based on Hyperchaotic, Mixed Hash and Dynamic DNA
    Zhang, Qiu-Yu
    Ye, Yu-Tong
    International Journal of Network Security, 2022, 24 (02) : 216 - 229
  • [24] Image Hybrid Encryption Based on Matrix Nonlinear Operation and Generalized Arnold Transformation
    Liang, Xikun
    Tan, Xiao
    Tao, Limin
    Hu, Bin
    INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2019, 33 (06)
  • [25] Quantum image encryption algorithm based on generalized Arnold transform and Logistic map
    Wen-Wen Hu
    Ri-Gui Zhou
    SheXiang Jiang
    XingAo Liu
    Jia Luo
    CCF Transactions on High Performance Computing, 2020, 2 : 228 - 253
  • [26] Quantum image encryption algorithm based on generalized Arnold transform and Logistic map
    Hu, Wen-Wen
    Zhou, Ri-Gui
    Jiang, SheXiang
    Liu, XingAo
    Luo, Jia
    CCF TRANSACTIONS ON HIGH PERFORMANCE COMPUTING, 2020, 2 (03) : 228 - 253
  • [27] Hash-based encryption system
    Peyravian, M
    Roginsky, A
    Zunic, N
    COMPUTERS & SECURITY, 1999, 18 (04) : 345 - 350
  • [28] Research of chaos encryption algorithm based on logistic mapping
    Luo, Jinhong
    Shi, Haiyi
    IIH-MSP: 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Proceedings, 2006, : 381 - 383
  • [29] Chinese Character Encryption Algorithm Based on Logistic Mapping
    Guo, Wenping
    Chen, Ying
    Zhao, Xiaoming
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 7, 2010, : 478 - 481
  • [30] A Novel Encryption Algorithm Based on DWT and Multichaos Mapping
    Wang, Wei
    Tan, Haiyan
    Pang, Yu
    Li, Zhangyong
    Ran, Peng
    Wu, Jun
    JOURNAL OF SENSORS, 2016, 2016