[1] LIAO X, XIAO D, CHEN Y,et al. Principles and applications of chaos cryptography[M]. Beijing:Science Press, 2009:238-248.(廖晓峰,肖迪,陈勇,等.混沌密码学原理及其应用[M].北京:科学出版社,2009:238-248.) [2] DING W, YAN W, QI D. Digital image scrambling technology based on Arnold transformation[J]. Journal of Computer-Aided Design and Computer Graphics, 2001,13(4):338-341.(丁玮, 闫伟齐,齐东旭.基于Arnold变换的数字图像置乱技术[J].计算机辅助设计与图形学学报,2001,13(4):338-341.) [3] ZOU J, TIE X. Arnold transformation of digital image with two dimensions and its periodicity[J]. Journal of North China University of Technology, 2000,12(1):10-14.(邹建成,铁小匀.数字图像的二维Arnold变换及其周期性[J].北方工业大学学报,2000,12(1):10-14.) [4] LI L. On periods of Arnold type transformations[J]. Acta Scientiarum Naturalium Universitatis Sunyatseni, 2005,44(2):1-4.(黎罗罗.Arnold型置乱变换周期分析[J].中山大学学报:自然科学版, 2005,44(2):1-4.) [5] GUO L, ZHANG X. Image twice-scrambling algorithm based on two-dimensional arnold transforms[J]. Computer Applications and Software, 2010,27(4):264-266.(郭琳琴,张新荣.基于二维Arnold 变换的图像双置乱算法[J].计算机应用与软件, 2010,27(4):264-266.) [6] QI D, ZOU J, HAN X. A new class of scrambling transformation and its application in the image information covering[J]. Science in China:Series E, 2000,43(3):304-312. [7] TANG Z, ZHANG X. Secure image encryption without size limitation using Arnold transform and random strategies[J]. Journal of Multimedia, 2011,6(2):202-206. [8] CAO G, HU K, TONG W. Image scrambling based on Logistic uniform distribution[J]. Acta Physica Sinica, 2011,60(11):125-132.(曹光辉,胡凯,佟维.基于Logistic 均匀分布图像置乱方法[J]. 物理学报,2011,60(11),125-132.) [9] XIANG T, LIAO X, TANG G. A novel block cryptosystem based on iterating a chaotic map[J]. Physics Letters A, 2006,349(1):109-115. [10] SUN F, LIU S, LI Z. A novel image encryption scheme based on spatial chaos map[J]. Chaos, Solitons and Fractals, 2008,38(3):631-640. [11] WANG J. Study on chaotic digital image encryption[D]. Nanjing:Nanjing University of Posts and Telecommunications, 2013.(王静.混沌数字图像加密技术研究[D].南京:南京邮电大学,2013.) [12] CHEN G, MAO Y, CHUI C K. A symmetric image encryption scheme based on 3D chaotic cat maps[J]. Chaos Solitons and Fractals, 2004,21:749-761. [13] WU X, OU D, LIANG Q,et al. A user-friendly secret image sharing scheme with reversible steganography based on cellular automata[J]. Journal of Systems and Software, 2012,85(8):1852-1863. |