[1] 陈储培,李晶,邓洪敏.基于图像像素值改变和位置置乱的混沌加密[J].计算机应用,2015,35(S1):47-49. (CHEN C P, LI J, DENG H M. Chaotic encryption algorithm based on image pixel values change and position scrambling[J]. Journal of Computer Applications, 2015, 35(S1):47-49.) [2] 侯文滨,吴成茂.基于Arnold变换的图像分存加密方法[J].计算机应用,2011,31(10):2682-2686. (HOU W B, WU C M. Image encryption and sharing based on Arnold transform[J]. Journal of Computer Applications, 2011, 31(10):2682-2686.) [3] 刘祝华,曾高荣,谢芳森.像素值复合置乱的混沌图像加密方法[J].计算机工程与应用,2012,48(25):122-126. (LIU Z H, ZENG G R,XIE F S. Chaotic image encryption method based on pixel value composite scrambling[J]. Computer Engineering and Applications, 2012, 48(25):122-126.) [4] KOEAREV L, MAGGIO G M, OGORZALEK M, et al. Introduction to the special issue[J]. IEEE Transactions on Circuits and Systems-I:Fundamental Theory and Applications, 2001, 48(12):1385-1388. [5] WANG X-Y, YANG L, LIU R, et al. A chaotic image encryption algorithm based on perceptron model[J]. Nonlinear Dynamics, 2010, 62(3):6l5-621. [6] 潘辉,郑刚,胡晓惠,等.基于感知哈希的图像内容鉴别性能分析[J].计算机辅助设计与图形学学报,2012,24(7):925-931. (PAN H, ZHENG G, HU X H, et al. Performance analysis of image content identification on perceptual hashing[J]. Journal of Computer-Aided Design & Computer Graphics, 2012, 24(7):925-931.) [7] 肖烈虹,江贵平.基于高维混沌序列的医学图像加密[J].中国医学物理学杂志,2009,26(3):1180-1183. (XIAO L H, JIANG G P. Medical image encryption based on high dimension chaotic sequences[J]. Chinese Journal of Medical Physics, 2009, 26(3):1180-1183.) [8] 郑凡,田小建,范文华,等.基于Henon映射的数字图像加密[J].北京邮电大学学报,2008,31(1):66-70. (ZHENG F, TIAN X J, FAN W H, et al. Image encryption based on henon map[J]. Journal of Beijing University of Posts and Telecommunications, 2008, 31(1):66-70.) [9] 黄冬梅,耿霞,魏立斐,等.基于Henon映射的加密遥感图像的安全检索方案[J].软件学报,2016,27(7):1729-1740. (HUANG D M, GENG X, WEI L F, et al. A secure query scheme on encrypted remote sensing images based on Henon mapping[J]. Journal of Software, 2016, 27(7):1729-1740.) [10] 哈米提·阿斯艳, 哈米提·阿不都热西提提. 基于文本的图像检索与基于内容的图像检索技术的比较研究[J].首都师范大学学报(自然科学版),2012,33(4):6-9. (HAMITI ASIYAN, HAMITI ABUDOUREXITI. Comparative research of image retrieval based on text and content[J]. Journal of Capital Normal University (Natural Science Edition), 2012, 33(4):6-9.) [11] 冯伍,曹晓莉.医学图像检索技术的应用研究[J].中国医疗设备,2011,26(10):25-26. (FENG W, CAO X L. Application research of medical image retrieval technology[J]. China Medical Devices, 2011, 26(10):25-26.) [12] 沈晔,李敏丹,夏顺仁.基于内容的医学图像检索技术[J].计算机辅助设计与图形学学报,2010,22(4):569-578. (SHEN Y, LI M D, XIA S R. A survey on content-based medical image retrieval[J]. Journal of Computer-Aided Design & Computer Graphics, 2010, 22(4):569-578.) [13] 王阿川,陈海涛.基于离散余弦变换的鲁棒感知图像哈希技术[J].中国安全科学学报,2009,19(4):91-96. (WANG A C, CHEN H T. Robust image perceptual hashing technology based on discrete Cosine transform[J]. China Safety Science Journal, 2009, 19(4):91-96.) [14] 李云,韩凤英.基于高维混沌系统组合的图像加密新算法[J].计算机工程与应用,2009,45(1):103-104,107. (LI Y, HAN F Y. New image encryption algorithm based on combined high-dimension chaotic system[J]. Computer Engineering and Applications, 2009, 45(1):103-104, 107.) [15] 张维克,孔祥维,尤新刚.安全鲁棒的图像感知哈希技术[J].东南大学学报(自然科学版),2007,37(Z1):188-192. (ZHANG W K, KONG X W,YOU X G. Secure and robust image perceptual hashing[J]. Journal of Southeast University (Natural Science Edition), 2007, 37(Z1):188-192.) [16] LEFEBVRE F, CZYZ J, MACQ B. A robust soft hash algorithm for digital image signature[C]//ICIP 2003:Proceedings of the 2003 IEEE International Conference on Image Processing. Washington, DC:IEEE Computer Society, 2003, 3:495-498. [17] 苗新宇.面向人口信息系统的云计算中隐私保护技术研究[D].北京:北京邮电大学,2012:51. (MIAO X Y. The research of facing the information system of the population in the cloud computing privacy protection technology[D]. Beijing. Beijing University of Posts and Telecommunications, 2012:51.) [18] 李美云,李剑,黄超.基于同态加密的可信云存储平台[J].信息网络安全,2012,(9):35-40. (LI M Y, LI J, HUANG C. A credible cloud storage platform based on homomorphic encryption[J]. Netinfo Security, 2012, (9):35-40.) [19] ZEKERIYA E, FRANZ M, GUAJARDO J, et al. Privacy-preserving face recognition[C]//PETS 2009:Proceedings of the 2009 International Symposium on Privacy Enhancing Technologies, LNCS 5672. Berlin:Springer, 2009:235-253. [20] 朱远毅,董道国,金城.一种基于多特征签名的图像检索系统[J].计算机应用与软件,2011,28(7):82-85. (ZHU Y Y, DONG D G, JIN C. A multi feature signature based image retrieval system[J]. Computer Applications and Software, 2011, 28(7):82-85.) [21] MONGA V, MIHCAK M K. Robust and secure image hashing via non-negative matrix factorizations[J]. IEEE Transactions on Information Forensics and Security, 2007, 2(3):376-390. |