Citation: | XU Guangxian, XU Shanqiang, GUO Xiaojuan, HUA Yiyang. Image compression-encryption algorithm combined DCT transform with DNA operation[J]. LASER TECHNOLOGY, 2015, 39(6): 806-810. DOI: 10.7510/jgjs.issn.1001-3806.2015.06.016 |
[1] |
ZHANG H Z, YAO M, LEI P, et al. Research of image processing method of far-field laser spots[J]. Laser Technology, 2013, 37(4):460-463(in Chinese).
|
[2] |
LIN R, LIU Q N, ZHANG C L. A new fast algorithm for gyrator transform[J]. Laser Technology, 2012, 36(1):50-53(in Chinese).
|
[3] |
PENG C, LIU L. Encryption algorithm for compressed images based on chaotic sequences[J]. Computer Engineering, 2008, 34(20):177-179(in Chinese).
|
[4] |
GU G S, LIU F C. Contourlet domain image encryption based on chaos mapping[J]. Journal of Computer Applications, 2011, 31(3):771-773(in Chinese).
|
[5] |
YANG H Q, LIAO X F, WONG K W, et al. SPIHT-based joint image compression and encryption[J]. Acta Physica Sinica, 2012, 61(4):40505(in Chinese).
|
[6] |
LIN C, WANG J P, MA W G, et al. Study on chaotic encryption algorithm for images after compression[J]. Microelectronics Computer, 2013, 30(3):5-7(in Chinese).
|
[7] |
CONG S, PU Y K, WANG J N. DCT based image compression algorithm and application[J]. Computer Engineering and Applications, 2010, 46(18):160-163(in Chinese).
|
[8] |
LI L, WANG W N, LI J J. Security improvement for image encryption algorithm based on hyper-chaos system[J]. Application Research of Computers, 2011, 28(11):4335-4337(in Chinese).
|
[9] |
LU H B, SUN Y. Image encryption scheme based on novel hyperchaotic system[J].Computer Science,2011,38(6):149-152(in Chinese).
|
[10] |
RAHIMOV H, BABAEI M, HASSANABADI H .Improving middle square method RNG using chaotic map[J]. Applied Mathematics, 2011, 2(4):137-141.
|
[11] |
SADEG S, GOUGACHE M, MANSOURI N, et al. An encryption algorithm inspired from DNA[C]// 2010 International Conference on Machine and Web Intelligence (ICMWI).New York, USA:IEEE, 2010:344-349.
|
[12] |
WANG Y, WONG K W, LIAO X, et al. A new chaos-based fast image encryption algorithm[J]. Applied Soft Computing, 2011, 11(1):514-522.
|
1. |
吴明埝,沈一春,陈青青,王道根,李松林,谢书鸿,尹建华,徐拥军. 基于多分类高斯SVM的光纤信号的模式识别方法. 激光技术. 2025(01): 128-134 .
![]() | |
2. |
孙强,郝敏. 基于CenterNet的草原牛羊计数研究. 现代计算机. 2023(11): 1-8 .
![]() |