Hong-hui LE Tao LI Lei SHI. Improved algorithm based on Henon Hyperchaotic system for image encryption[J]. Journal of Computer Applications, 2011, 31(07): 1909-1911.
[1]YANG TAO,YANG LINBAO,YANG CHUNMEI. Breaking chaotic switching using generalized synchronization: examples[J]. IEEE Transactions on Circuits Systems,1998,45(10):1062-1067.[2]肖迪,赵秋乐.一种基于Logistic混沌序列的图像置乱算法的安全分析[J].计算机应用,2010,30(7):1815-1817.[3]刘婷,闵乐泉.对一种混沌图像密码的选择明文攻击[J].武汉大学学报:信息科学版,2010,35(5):546-549.[4]张涛.一个混沌分组密码算法的分析[J].计算机应用研究,2010,27(6):2294-2296.[5]汪海明,李明,金晨辉.对XW混沌密码算法的分割攻击[J].计算机应用研究,2010,27(7):2625-2628.[6]陈艳丰,李义方.交替分段相互置乱的双混沌序列图像加密算法[J].华南理工大学学报:自然科学版,2010,38(5):27-33.[7]HENON M.A two dimentional mapping with a strange attractor[J]. Communications in Mathematical Physics,1976,50(1):69-77.[8]袁宁,宣蕾.超混沌序列密码受参数变化影响的实验研究[J].计算机研究与发展,2008,45(sl):351-356.[9]YONG R,ANOOP G, ALEX A. Automatically extracting highlights for TV-baseball programs[C]// Proceedings of ACM Multimedia. New York: ACM,2000:105-115.[10]陈关荣,汪小帆.动力系统的混沌化——理论、方法与应用[M].上海:上海交通大学出版社,2006.[11]WANG XIAOYUN, YU HONGBO. How to break MD5 and other Hash functions[C]// Annual International Conference on the Theory and Applications of Cryptographic Techniques,LNCS 3494. Berlin: Springer-Verlag,2005:19-35.