Search algorithm of ICA and its application to image encryption

被引:0
|
作者
College of Software, Beihang University, Beijing 100083, China [1 ]
不详 [2 ]
机构
来源
J. Inf. Comput. Sci. | 2008年 / 3卷 / 1003-1010期
关键词
Cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:1003 / 1010
相关论文
共 50 条
  • [21] A new hyperchaotic map and its application for image encryption
    Hayder Natiq
    N. M. G. Al-Saidi
    M. R. M. Said
    Adem Kilicman
    The European Physical Journal Plus, 133
  • [22] Discrete chaotic synchronization and its application in image encryption
    Wang, Hua
    Wu, Jiu-Peng
    Sheng, Xiao-Shu
    Zan, Peng
    Communications in Computer and Information Science, 2014, 462 : 264 - 272
  • [23] Analysis of pi series and its application to image encryption
    Chen, Ting
    Li, Feng
    ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS: WITH ASPECTS OF CONTEMPORARY INTELLIGENT COMPUTING TECHNIQUES, 2007, 2 : 695 - +
  • [24] Digital wavefront reconstruction and its application to image encryption
    Lai, S
    Neifeld, MA
    OPTICS COMMUNICATIONS, 2000, 178 (4-6) : 283 - 289
  • [25] Discrete Chaotic Synchronization and Its Application in Image Encryption
    Wang, Hua
    Wu, Jiu-Peng
    Sheng, Xiao-Shu
    Zan, Peng
    COMPUTATIONAL INTELLIGENCE, NETWORKED SYSTEMS AND THEIR APPLICATIONS, 2014, 462 : 264 - 272
  • [26] A new hyperchaotic map and its application for image encryption
    Natiq, Hayder
    Al-Saidi, N. M. G.
    Said, M. R. M.
    Kilicman, Adem
    EUROPEAN PHYSICAL JOURNAL PLUS, 2018, 133 (01):
  • [27] Gyrator transform hologram and its application in image encryption
    Lin, R. (linrui@ctbu.edu.cn), 1600, Chinese Optical Society (42):
  • [28] A memristive Ikeda map and its application in image encryption
    Wang, Mengjiao
    Zou, Yi
    Li, Zhijun
    CHAOS SOLITONS & FRACTALS, 2025, 190
  • [29] A new discrete chaotic map application in image encryption algorithm
    Yang, Feifei
    An, Xinlei
    Xiong, Li
    PHYSICA SCRIPTA, 2022, 97 (03)
  • [30] Analysis of Random Function and its Application in the Encryption Algorithm
    She Wei
    Xie Huijuan
    PROCEEDINGS OF THE 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER ENGINEERING AND ELECTRONICS (ICECEE 2015), 2015, 24 : 597 - 600