共 19 条
- [1] Hiding data in images by simple LSB substitution [J]. PATTERN RECOGNITION, 2004, 37 (03) : 469 - 474
- [2] [陈志刚 Chen Zhigang], 2016, [电子与信息学报, Journal of Electronics & Information Technology], V38, P1547
- [3] [范九伦 FAN Jiu-lun], 2009, [电子学报, Acta Electronica Sinica], V37, P720
- [4] GONG Haimei, 2016, INTELLIGENT COMPUTER, V6, P60, DOI [10.3969/j.issn.2095-2163.2016.04.018, DOI 10.3969/J.ISSN.2095-2163.2016.04.018]
- [5] HAO Jin, 2021, J DALIAN POLYTECHNIC, V40, P214, DOI [10.19670/j.cnki.dlgydxxb.2021.0703, DOI 10.19670/J.CNKI.DLGYDXXB.2021.0703]
- [6] Exponential Chaotic Model for Generating Robust Chaos [J]. IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (06): : 3713 - 3724
- [7] Cosine-transform-based chaotic system for image encryption [J]. INFORMATION SCIENCES, 2019, 480 : 403 - 419
- [8] 2D Logistic-Sine-coupling map for image encryption [J]. SIGNAL PROCESSING, 2018, 149 : 148 - 161
- [10] Liu R., 2016, COMPUTER MODERNIZATI, P13