吉林大学学报(工学版) ›› 2014, Vol. 44 ›› Issue (3): 801-806.doi: 10.13229/j.cnki.jdxbgxb201403035
• Orignal Article • Previous Articles Next Articles
TIAN Hai-jiang1, LEI Peng2,WANG Yong2
CLC Number:
[1] 黄润生.混沌及其应用[M].武汉:武汉大学出版社,2000. [2] Fridrich J. Symmetric cipher based on two dimensional chaotic maps[J]. International Journal of Bifurcation and Chaos,1998, 8 (6): 1259-1284. [3] Chen G, Mao Y, Chui C K. A symmetric image encryption scheme based on 3D chaotic cat maps[J]. Chaos, Solitons & Fractals, 2004,21(3):749-761. [4] Wang Yong,Wong Kwok-Wo,Liao Xiao-feng. A chaos-based image encryption algorithm with variable control parameters[J]. Chaos, Solitons & Fractals,2009,41(4): 1773-1783. [5] Wang Yong,Wong Kwok-Wo,Liao Xiao-feng, et al. A new chaos-based fast image encryption algorithm[J]. Applied Soft Computing,2011,11(1):514-522. [6] Behnia S,Akshshani A,Mahmodi H,et al.A novel algorithm for image encryption based on mixture of chaotic maps[J].Chaos,Solitons & Fractals,2008(35):408-419. [7] Zhu He-gui,Zhao Cheng,Zhang Xiang-de.A novel image encryption-compression scheme using hyper-chaos and Chinese remainder theorem[J].Signal Processing: Image Communication,2013,6(28):670-680. [8] Adleman L M. Molecular computation of solutions of combinational problems[J].Science, 1994,266(11):1021-1024. [9] Wasiewicz P, Mulawka J J, Rudnicki W R,et al. Adding numbers with DNA[J]. IEEE International Conference on Systems Man and Cybernetics,2000,21(1):265-270. [10] King O D, Gaborit P. Binary templates for comma-free DNA codes[J].Discrete Applied Mathematics,2007, 155(5):831-839. [11] Gehani A, Labean T, Reif J H. DNA-based cryptography[J]. Aspects of Molecular Computing,2004,54(3):167-188. [12] Wei Xiao-peng,Guo Ling,Zhang Qiang,et al.A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system[J].The Journal of Systems and Software,2012,85(2):290-299. [13] Zhang Qiang,Guo Ling,Wei Xiao-peng. Image encryption using DNA addition combining with chaotic maps[J]. Mathematical and Computer Modelling, 2010, 52(11-12): 2028-2035. |
[1] | LIU Fu,ZONG Yu-xuan,KANG Bing,ZHANG Yi-meng,LIN Cai-xia,ZHAO Hong-wei. Dorsal hand vein recognition system based on optimized texture features [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1844-1850. |
[2] | WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858. |
[3] | JIN Shun-fu,WANG Bao-shuai,HAO Shan-shan,JIA Xiao-guang,HUO Zhan-qiang. Synchronous sleeping based energy saving strategy of reservation virtual machines in cloud data centers and its performance research [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1859-1866. |
[4] | ZHAO Dong,SUN Ming-yu,ZHU Jin-long,YU Fan-hua,LIU Guang-jie,CHEN Hui-ling. Improved moth-flame optimization method based on combination of particle swarm optimization and simplex method [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1867-1872. |
[5] | LIU En-ze,WU Wen-fu. Agricultural surface multiple feature decision fusion disease judgment algorithm based on machine vision [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1873-1878. |
[6] | OUYANG Dan-tong, FAN Qi. Clause-level context-aware open information extraction [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1563-1570. |
[7] | LIU Fu, LAN Xu-teng, HOU Tao, KANG Bing, LIU Yun, LIN Cai-xia. Metagenomic clustering method based on k-mer frequency optimization [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1593-1599. |
[8] | GUI Chun, HUANG Wang-xing. Network clustering method based on improved label propagation algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1600-1605. |
[9] | LIU Yuan-ning, LIU Shuai, ZHU Xiao-dong, CHEN Yi-hao, ZHENG Shao-ge, SHEN Chun-zhuang. LOG operator and adaptive optimization Gabor filtering for iris recognition [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1606-1613. |
[10] | CHE Xiang-jiu, WANG Li, GUO Xiao-xin. Improved boundary detection based on multi-scale cues fusion [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1621-1628. |
[11] | ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223. |
[12] | HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230. |
[13] | FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236. |
[14] | CAO Jie, SU Zhe, LI Xiao-xu. Image annotation method based on Corr-LDA model [J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243. |
[15] | HOU Yong-hong, WANG Li-wei, XING Jia-ming. HTTP-based dynamic adaptive streaming video transmission algorithm [J]. 吉林大学学报(工学版), 2018, 48(4): 1244-1253. |
|