[1] |
ZHANG H Z, YAO M, LEI P, et al. Research of image processing method of far-field laser spots[J]. Laser Technology, 2013, 37(4):460-463(in Chinese). |
[2] |
LIN R, LIU Q N, ZHANG C L. A new fast algorithm for gyrator transform[J]. Laser Technology, 2012, 36(1):50-53(in Chinese). |
[3] |
PENG C, LIU L. Encryption algorithm for compressed images based on chaotic sequences[J]. Computer Engineering, 2008, 34(20):177-179(in Chinese). |
[4] |
GU G S, LIU F C. Contourlet domain image encryption based on chaos mapping[J]. Journal of Computer Applications, 2011, 31(3):771-773(in Chinese). |
[5] |
YANG H Q, LIAO X F, WONG K W, et al. SPIHT-based joint image compression and encryption[J]. Acta Physica Sinica, 2012, 61(4):40505(in Chinese). |
[6] |
LIN C, WANG J P, MA W G, et al. Study on chaotic encryption algorithm for images after compression[J]. Microelectronics Computer, 2013, 30(3):5-7(in Chinese). |
[7] |
CONG S, PU Y K, WANG J N. DCT based image compression algorithm and application[J]. Computer Engineering and Applications, 2010, 46(18):160-163(in Chinese). |
[8] |
LI L, WANG W N, LI J J. Security improvement for image encryption algorithm based on hyper-chaos system[J]. Application Research of Computers, 2011, 28(11):4335-4337(in Chinese). |
[9] |
LU H B, SUN Y. Image encryption scheme based on novel hyperchaotic system[J].Computer Science,2011,38(6):149-152(in Chinese). |
[10] |
RAHIMOV H, BABAEI M, HASSANABADI H .Improving middle square method RNG using chaotic map[J]. Applied Mathematics, 2011, 2(4):137-141. |
[11] |
SADEG S, GOUGACHE M, MANSOURI N, et al. An encryption algorithm inspired from DNA[C]// 2010 International Conference on Machine and Web Intelligence (ICMWI).New York, USA:IEEE, 2010:344-349. |
[12] |
WANG Y, WONG K W, LIAO X, et al. A new chaos-based fast image encryption algorithm[J]. Applied Soft Computing, 2011, 11(1):514-522. |