[1]SHANNON C E. Communication theory of secrecy systems [J].Bell System Technical Journal, 1949, 28(4):656-715.
[2]LI T-Y, YORKE J A. Period three implies chaos [J].The American Mathematical Monthly, 1975, 82(10):985-992.
[3]PECORA L M, CARROLL T L. Synchronization in chaotic systems [J].Physical Review Letters, 1990, 64(8):821-824.
[4]JAKIMOSKI G, KOCAREV L. Chaos and cryptography: block encryption ciphers based on chaotic maps [J].IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, 2001, 48(2):163-169.
[5]BEHNIA S, AKHSHANI A, MAHMODI H, et al. A novel algorithm for image encryption based on mixture of chaotic maps [J].Chaos, Solitons and Fractals, 2008, 35(2):408-419.
[6]LANG JUN, TAO RAN, WANG YUE. Image encryption based on the multiple-parameter discrete fractional Fourier transform and chaos function [J].Optics Communications, 2010,283(10):2092-2096.
[7]YE GUODONG. Image scrambling encryption algorithm of pixel bit based on chaos map [J].Pattern Recognition Letters, 2010, 31(5):347-354.
[8]佟晓筠, 崔明根. 基于扰动的复合混沌序列密码的图像反馈加密算法[J].中国科学F辑:信息科学, 2009, 29(6):588-597.
[9]RHOUMA R, BELGHITH S. Cryptanalysis of a new image encryption algorithm based on hyper-chaos [J].Physics Letters A, 2008, 372(38):5973-5978.
[10]刘金梅, 丘水生.基于超混沌系统的图像加密算法的安全性分析 [J].计算机应用研究,2010,27(3):1042-1044.
[11]LEIPNIK R B, NEWTON T A. Double strange attractors in rigid body motion with linear feedback control [J].Physics Letters A, 1981, 86(2):63-67.
[12]GHOSH D,BHATTACHARYA S.Projective synchronization of new hyperchaotic system with fully unknown parameters[J].Nonlinear Dynamics,2010,61(1/2):11-21.
[13]WONG K-W, KWOK B S-H, LAW W-S. A fast image encryption scheme based on chaotic standard map [J].Physics Letters A, 2008; 372(15):2645-2652.
[14]GAO TIEGANG, CHEN ZENGQIANG. A new image encryption algorithm based on hyper-chaos [J].Physics Letters A, 2008, 372(4):394-400.
[15]杨雪松,于万波,魏小鹏.基于复合超混沌系统且与明文相关联的图像加密[J].计算机应用研究,2011,28(10):3807-3810.
[16]WANG YONG, WONG K-W, LIAO XIAO-FENG, et al. A new chaos-based fast image encryption algorithm [J].Applied Soft Computing, 2011, 11(1):514-522. |