用户名: 密码: 验证码:
数字图像置乱算法的研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
主要研究了数字图像置乱算法及其应用,包括数字图像置乱矩阵的构造方法、置乱矩阵的周期性、置乱矩阵在图像置乱中的应用三个方面。主要成果如下:
     (1)基于Euclid算法提出了两种构造二维广义Arnold矩阵:一种基于广义Fibonacci序列,一种基于Dirichlet序列。特点是:可以选择周期较大的二维广义Arnold矩阵,用户自行输入加密密钥,做到了一次一密,解决了一般二维广义Arnold矩阵的形式只有四种选择困境,从而大大增加了图像加密系统的安全性。
     (2)提出了构造任意n维广义Arnold型矩阵的三种方法:基于等差数列的n维广义Arnold矩阵构造方法、基于混沌整数序列的n维广义Arnold矩阵的构造方法和基于Chebyshev混沌神经网络的n维广义Arnold矩阵构造方法。特点是:每种方法都只与密钥有关,算法简单且可公开;密钥空间大,每种算法可“一次一密”生成安全性很高的加密矩阵,且加密结果具有良好的混沌特性和自相关性,明文的自然频率得以隐蔽和均匀化,有利于抵抗统计分析法的攻击,能满足密码学的要求。由密钥生成的变换矩阵和逆变换矩阵的算法中不涉及复杂矩阵运算,时间复杂度低,不会因为变换矩阵维数较高而超出了计算能力;使用此类变换矩阵对图像进行置乱,通过逆变换对置乱图像进行恢复。
     (3)阐述了二维Arnold映射的周期性与Fibonacci模数列的周期性的内在联系,证明了二维Arnold变换的模周期等于Fibonacci数列的模周期的一半,得到了猫映射的最小模周期的上界为3N,大大推进了现有的结论(N~2/2)。
     (4)首次提出了孪生Fibonacci数列对的定义,给出了其性质和定理,并证明了孪生Fibonacci数列对modp r的最小正周期定理;阐明了三维Arnold映射的周期性与孪生Fibonacci数列对的周期性的内在联系,得到了3维Arnold变换的最小正周期上界为3.14N~2,大大推进了现有的结论(N~3)。
     (5)证明了任意n维广义Arnold矩阵(modp r)的最小正周期定理,即对任意素数p和r∈Z~+,N=pr,若T=π_p(A(mod p)),则π_N(A(mod N)) p~(r-1)T。给出了n维Arnold矩阵的模周期上界为N~n/2。这些定理解决了长期困扰大家的变换矩阵模周期性计算问题,从而为图像置乱提供了更坚实的理论基础。
     (6)结合本文所定义的最佳置乱程度,首次提出了Arnold变换的最佳置乱周期的定义,给出了使用Arnold变换时的变换最佳置乱次数。实验表明,最佳置乱次数与实际的置乱情况能一致吻合。
     (7)提出了基于n维广义Arnold型变换矩阵的多轮双置乱的一次一密的加密算法:采取图像位置空间与色彩空间的多轮乘积型双置乱。特点是:具有周期长,算法完全公开,可有效防止多种攻击。实验结果表明该置乱变换算法效率高,安全性强。
The digital image scrambling algorithm and its applications are discussed in thispaper, it include the methods of constructing the image scrambling matrix, scramblingmatrix periodicity, and application of scrambling matrix in image scrambling. The maincontributions are as follows.
     (1) Based on Euclid algorithm, two methods of constructing two-dimensionalgeneralized Arnold matrix were proposed. One is based on the Fibonacci series and theother is based on the Dirichlet series. Its advantage is that the users can choose a largertwo-dimensional generalized period matrix Arnold and enter encryption key bythemselves, One-time Pad Cipher is realized, which resolve the problem of only foursituation about the generalized two-dimensional Arnold matrix and greatly increase theimage encryption system security.
     (2)Three methods for construction n-dimensional generalized Arnold matrix areproposed. The first is constructing n-dimensional generalized Arnold Based on sequencematrices, the second is on chaotic sequence and three is on Chebyshev Chaotic NeuralNetworks. Its advantages are include that each method only determining by theencryption key is simple and can be made public. Each algorithm has larger key spaceand can produce “One-time Pad Cipher” encryption matrix with very high security. Theencryption results have good chaos and autocorrelation with the natural frequency of theplaintext being hidden and homogenized, which is favorable for resisting statisticalanalysis attacks. Transformation matrix and inverse transform matrix produced by keydo not involve complicated matrix operations in the algorithm, whose time complexityis lower, so high-dimensional transformation matrix will not beyond computing power.The image is scrambled by transformation matrix and restored by the inversetransformation matrix.
     (3) The inherent relationship between the two-dimensional Arnold map periodicand Fibonacci module series periodic is described, that the smallest period of theFibonacci module sequence is twice of that of two-dimensional Arnold transformationis also proved, The upper bound for the smallest module period of Arnoldtransformation is obtained, which is3N, which greatly promote the existing conclusions(N~2/2).
     (4) The twin Fibonacci sequence is first proposed, and its properties and theoremsare given. The theorem of the least period of the twin Fibonacci sequence mod p~r is proved by means of the mathematical induction. The paper describes the inherentrelationship between the periodic of3-dimensional Arnold map and that of the twinFibonacci sequence, the upper bound for the smallest module period of the3-dimensional Arnold transformation is obtained, which is3.14N~2. It is a great advancecompared with the existing best upper bound N~3in the literatures.
     (5) The theorem of the least period of n-dimensional invertible generalized Arnoldmatrix mod p~r is proved by means of the mathematical induction, i.e., for any primenumber p, positive integer r,and n-dimensional invertible matrix A on the Galois fieldFP, if the least positive period of A(mod p) is T, then the least positive period of A(modp~r) is p~(r-1)T. The upper bound for the smallest module period of the n-dimensionalArnold transformation is obtained, which is N~n/2. These conclusions resolve theperennial problem for us to find the model period of the transformation matrix, whichprovide a much solider theoretical foundation for image scrambling.
     (6) The definition for the best scrambling period of Arnold transformation is firstproposed, the number of the best scrambling transformation using Arnoldtransformation is given.
     (7)The several rounds encryption algorithm based on n-dimensional generalizedArnold transformation matrix with One-time Pad Cipher is proposed, which isscrambling both in image position space and color space. Its features are included longperiod, the algorithm completely open, the effectively prevention to many attacks.Experimental results show that the scrambling transformation method is efficient andhas strong security.
引文
[1]沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学E辑:信息科学,2007,37(2):129-150.
    [2]陈克非.信息安全—密码的作用与局限[J].通信学报,2001,22(8):93-99.
    [3]Biham E,Shamir A. Differential cryptanalysis of DES-like cryptosystems[J].Journal of Cryptography,1991,4(1):3-72.
    [4]Petitcolas F A P,Anderson R J,Kuhn M G. Information hiding-a survey.Proceedings of the IEEE [J],1999,87(7):1062-1077.
    [5]Abbas Cheddad,Joan Condell,Kevin Curran,Paul Mc Kevitt. Digital imagesteganography:Survey and analysis of current methods [J]. Signal Processing,90(2010):727-752.
    [6]孙圣和,陆哲明,牛夏牧.数字水印技术与应用[M].北京:科学出版社,2004.
    [7]王朔中,张新鹏,张开文.数字密写和密写分析[M].北京:清华大学出版社,2005.
    [8]王育民,张彤,黄继武.信息隐藏-理论与技术[M].北京:清华大学出版社,2006.
    [9]S.Katzenbeisse著,吴秋新,钮心忻,杨义先等译.信息隐藏技术——隐写术与数字水印[M].北京:人民邮电出版社,2001.
    [10]钮心忻.信息隐藏与数字水印[M].北京:北京邮电大学出版社,2004.
    [11]F.Johnson and S. Jajodia. Exploring steganography:seeing the unseen [J].IEEE Computer Magazine,1998,26-34.
    [12]尤新刚,周琳娜,郭云彪.信息隐藏学科的主要分支及术语[A].北京电子技术应用研究所.信息隐藏全国学术研讨会(CIHW2000/2001)论文集[C].西安:西安电子科技大学出版社,2001,43-50.
    [13]Pfitzman B. Information hiding terminology [A]. First Information HidingWorkshop [C].347-350.
    [14]刘瑞祯,谭铁牛.数字图像水印研究综述[J].通信学报,2000,21(8):39-48.
    [15]I. J. Cox,M. L. Miller. The first50years of electronic watermarking [J].EURASIP Journal ofApplied Signal Processing,2002,2:126-132.
    [16] M. Goljan,“Lossless Data Embedding Methods for Digital Images andDetection of Steganograp”,PhD Thesis. Binghamton University,State University ofNew York.2001.
    [17]Bender W,Gruhl D,Morimoto N,Lu A. Techniques for data hiding. IBMSystem Journal,1996,35(3&4):313-336.
    [18]Anderson R J,Petitcolas F. On the limits of steganography. IEEE Journal ofSelected Areas in Communications,1998,16(4):474-481.
    [19]江早.信息伪装一种崭新的信息安全技术.中国图像图形学报,1998,3(1):83-86.
    [20]W. Li,X. Xue and P. Lu,"Robust Audio Watermarking Based on RhythmRegion Detection",IEE Electronics Letters2005,41(4):75-76.
    [21]李伟,袁一群,李晓强,薛向阳,陆佩忠.数字音频水印技术综述.通信学报,2005,26(2):100-111.
    [22]W. Li,X. Xue,"Audio watermarking based on music content analysis:robustagainst time scale modification",Proceeding of the Second International Workshop onDigital Watermarking (IWDW2003),Korea,October2003,pp:289-300.
    [23] C.P. Wu,P.C. Su,C.C. Kuo,"Robust and efficient digital audio watermarkingusing audio content analysis",SPIE Security and Watermarking of MultimediaContents,2000,pp:23-28.
    [24]王让定,朱洪留,徐达文.基于编码模式的H.264/AVC视频信息隐藏算法[J].光电工程,2010,37(5):144-150.
    [25]胡洋,张春田,苏育挺.基于H.264/AVC的视频信息隐藏算法[J].电子学报,2008,36(4):690-694.
    [26]陈真勇,唐龙,唐泽圣.视频信息隐藏的置乱策略与方法[J].中国图象图形学报,2005,10(10):1242-1247.
    [27]谭良,吴波,刘震,周明天.一种基于混沌和小波变换的大容量音频信息隐藏算法[J].电子学报,2010,38(8):1812-1818.
    [28]徐淑正,张鹏,王鹏军,杨华中.Performance Analysis of Data Hiding inMPEG-4AAC Audio[J].Tsinghua Science and Technology,2009,14(1):55-61.
    [29]陈铭,张茹,刘凡凡,钮心忻,杨义先.基于DCT域QIM的音频信息伪装算法[J].通信学报,2009,30(8):105-111.
    [30]杨艳秋,李建勇,曹长修.基于采样点倒置和BP网络的音频掩密算法[J].华中科技大学学报(自然科学版),2009,37(12):13-15.
    [31]张开文,张新鹏,王朔中.图像及音频信号中隐蔽嵌入信息存在性的统计检验[J].电子与信息学报,2003,25(7):871-877.
    [32]姜传贤,陈孝威.鲁棒可逆文本水印算法[J].计算机辅助设计与图形学学报,2010,22(5):879-884.
    [33]罗纲,孙星明.基于文本剩余度的文本隐藏信息检测方法研究[J].通信学报,2009,30(6):19-25.
    [34]戴祖旭,常健,陈静.抵抗同义词替换攻击的文本信息隐藏算法[J].四川大学学报(工程科学版),2009,41(4):186-190.
    [35]陈志立,黄刘生,余振山,杨威,陈国良.基于双文本段的信息隐藏算法[J].电子与信息学报,2009,31(11):2725-2730.
    [36]钮心忻,杨义先.文本伪装算法研究[J].电子学报,2003,31(3):1-4.
    [37]杜江.信息隐藏与数字水印技术研究[D].西安:西安电子科技大学,2001.
    [38]王卫卫.小波与提升及其在图像数字水印中的算法研究[D].西安:西安电子科技大学,2001.
    [39]朱桂斌.数字图像信息隐藏的理论与算法研究[D].重庆:重庆大学,2004.
    [40]吴明巧.数字图像信息隐写与隐写分析技术研究[D].长沙:国防科学技术大学,2007.
    [41]王丹.抗几何攻击的信息隐藏技术研究[D].上海:复旦大学,2008.
    [42]刘培培.图像脆弱数字水印和数字隐写的几个关键技术研究[D].成都:西南交通大学,2008.
    [43]叶天语.信息隐藏理论与算法研究[D].北京:北京邮电大学,2009.
    [44]C. Kurak and J.McHugh. A cautionary note on image down grading [A]. InApplication Proceedings of the8th IEEE Annual Computer Security ApplicationConference[C],1992,153-159.
    [45]Proceeding of the First Information Hiding Workshop,LNCS,Isaac NewtonInstitute,Cambridge,England.1999,Vol.1174.
    [46]http://www.informatik.uni-trier.de/~ley/db/conf/ih/index.html.
    [47]http://www.leaderstudio.net.
    [48]葛伟民.9.11与互联网[J].网络与信息,2001,15(11):12-13.
    [49]http://www.jjtc.com/security/stegtools.htm.
    [50]http://www.rugeley.demon.co.uk.
    [51]闫伟齐.数字图象信息隐藏中的数学方法及应用研究[D].北京:中国科学院计算技术研究所,2001.
    [52]Mangulis,V. Security of popular scrambling scheme for TV pictures. RCARev.,1980:423-432.
    [53]QI D X,ZOU J CH,HAN X Y. Anew class of scrambling transformation andits application in the image information covering [J].Science in China (Series E),2000,43(3):304-412.
    [54]Hsu C T,Wu J L. Hidden digital watermarks in Images [J]. IEEE Transactionson Image Processing,1999,8(1):58-68.
    [55]丁玮,闫伟齐,齐东旭.数字图象水印的Cox方法和Pitas方法综述[J].北方工业大学学报,2000,12(3):1-12.
    [56]Cox I J,Kilian J,Leighton F T,et al. Secure spread spectrum watermarkingfor multimedia. IEEE Transactions on Image Processing,1997,6(12):1673-1687.
    [57]Lee Y K,Chen L H. High capacity images steganographic model. IEEProc.-Vis. Images Signal Process.2000,147(3):288-294.
    [58]Arnold V I,Avez A. Ergodic Problems of Classical Mechanics. MathematicalPhysics Monograph Series. NewYork:WABenjamin,INC,1968.
    [59]F.J.Dyson,H.Falk. Period of a Discrete Cat Map-ping. The AmericanMathematical Monthly,1992,99(7):603-614.
    [60]QI D X,WANG D SH,YANG D L. Matrix transformation of digital image andits periodicity [J]. Progress in Natural Science,2001,11(7):543-549.
    [61]王道顺,杨地莲,齐东旭.数字图像的两类非线性变换及其周期性[J].计算机辅助设计与图形学学报,2001,13(9):829-833.
    [62]杨礼珍,陈克非.变换矩阵(mod n)的阶及两种推广Arnold变换矩阵.中国科学,E辑,2004,34(2):151-161.
    [63]YANG Y L,CAI N,NI G Q. Digital Image Scrambling Technology Based onthe Symmetry of Arnold Transform [J]. Journal of Beijing Institute of Technology,2006,2006,15(2):216-220.
    [64]邵利平,覃征,刘波,高洪江,覃珺.二维双尺度矩形映射及其在图像置乱上的应用[J].计算机辅助设计与图形学学报,2009,21(7):1025-1034.
    [65]柏森,曹长修,柏林.基于仿射变换的数字图象置乱技术[J].计算机工程与应用,2002,38(10):74-76.
    [66]朱桂斌,曹长修,胡中豫,等.基于仿射变换的数字图像置乱加密算法[J].计算机辅助设计与图形学学报,2003,15(6):711-715.
    [67]王泽辉.二维随机矩阵置乱变换的周期及在图像信息隐藏中的应用[J].计算机学报,2006,29(12):2218-2224.
    [68]马在光,丘水生.基于广义猫映射的一种图像加密系统[J].通信学报,2003,24(2):51-57.
    [69]郭建胜,金晨辉.对基于广义猫映射的一个图像加密系统的已知图像攻击[J].通信学报,2005,26(2):131-135.
    [70]吴昊升,王介生,刘慎权.图像的排列变换[J).计算机学报,1998,21(6):514-519.
    [71]朱桂斌.数字图像信息隐藏的理论与算法研究[D].重庆:重庆大学,2004.
    [72]徐献灵,崔楠.数字图像置乱加密技术综述[J].信息网络安全,2009,9(3):32-39.
    [73]李昌刚,韩正之,张浩然.图像加密技术综述[J].计算机研究与发展,2002,39(10):1317-1324.
    [74]丁玮,齐东旭.数字图像变换及信息隐藏与伪装技术.计算机学报,1998,21(9):838-843.
    [75]邵利平,蒙清照,李春枚,王旭.图像置乱方法综述[J].信息网络安全,2009,9(4):22-26.
    [76]丁玮,闫伟齐,齐东旭.基于Arnold变换的数字图像置乱技术[J].计算机辅助设计与图形学学报,2001,(4):339-341.
    [77]邹建成,铁小匀.数字图像的二维Arnold变换及其周期性[J].北方工业大学学报,2000,12(1):1014-1032.
    [78]孙伟.关于Arnold变换的周期性[J].北方工业大学学报,1999,11(1):29-32.
    [79]张健,于晓洋,任洪娥.一种改进的Arnold Cat变换图像置乱算法[J].计算机工程与应用,2009,45(35):14-17.
    [80]邹建成,唐旭晖,李国富.数字图像的仿射模变换及其周期性[J].北方工业大学学报,2000,12(3):13-16.
    [81]齐东旭.矩阵变换及其在图像信息隐藏中的应用研究[J].北方工业大学学报,1999,11(1):24-28.
    [82]李兵,徐家伟.Arnold变换的周期及其应用[J].中山大学学报(自然科学版),2004,43(S2):139-142.
    [83]黎罗罗.Arnold型置乱变换周期分析[J].中山大学学报(自然科学版),2005,44(2):1-4.
    [84]吴发恩,邹建成.数字图像二维Arnold变换周期的一组必要条件[J].北方交通大学学报,2001,25(6):66-69.
    [85]商艳红,李南,邹建成.Fibonacci变换及其在数字图像水印中的应用[J].中山大学学报(自然科学版),2004,43(S2):148-151.
    [86]Ding W,Y an W Q,Q I D X. Digital image scrambling. Progress in NaturalScience,2001,11(6):454-460.
    [87]丁玮,闫伟齐,齐东旭.基于置乱与融合的数字图象隐藏技术及其应用[J].中国图象图形学报,2000,5(A)(8):643-649.
    [88]徐桂芳,曹敏谦.纯幻方的构造原理与方法[M].西安:西安交通大学出版社,1994.
    [89]丁玮,齐东旭.基于生命游戏的数字图像置乱与数字水印技术[J].北方工业大学学报,2000,12(1):1-5.
    [90]柏森,曹长修,曹龙汉,王田,汪纪锋.基于骑士巡游变换的数字图象细节隐藏技术[J].中国图象图形学报,2001,6(11):1096-1100.
    [91]柏森,曹长修.一种新的数字图象置乱隐藏算法[J].计算机工程,2001,27(11):18-19.
    [92]姜德雷,柏森,董文明.基于广义骑士巡游的比特位平面间图像置乱算法[J].自然科学进展,2009,19(6):691-696.
    [93]雷仲魁,孙秋艳,宁宣熙.马步哈密顿圈(骑士巡游)在图像置乱加密方法上的应用[J].小型微型计算机系统,2010,31(5):954-989.
    [94]侯启槟,杨小帆,王阳生,黄向生.一种基于小波变换和骑士巡游的图像置乱算法[J].计算机研究与发展,2004,41(2):370-375.
    [95]袁玲,康宝生.基于Logistic混沌序列和位交换的图像置乱算法[J].计算机应用,2009,29(10):2681-2683.
    [96]马苗,谭永杰.基于相邻像素间位异或的图像置乱算法[J].计算机工程与应用,2008,44(9):187-189.
    [97]李环,覃征,张选平,邵利平.n维空间随机矩阵变换的音频置乱算法[J].西安交通大学学报,2010,44(4):13-17.
    [98]邵利平,覃征,衡星辰,高洪江,王羡慧.基于高维矩阵变换的雪崩图像置乱变换[J].中国图象图形学报,2008,13(8):1429-1436.
    [99]邵利平,覃征,衡星辰,等.基于矩阵变换的图像置乱逆问题求解[J].电子学报,2008,36(7):1355-21363.
    [100]邵利平,覃征,高洪江,衡星辰.二维非等长图像置乱变换[J].电子学报,2007,35(7):1290-1294.
    [101]李国富.基于正交拉丁方的数字图像置乱方法[J].北方工业大学学报,2001,13(1):14-16.
    [102]邹建成,李国富,齐东旭.广义Gray码及其在数字图像置乱中的应用[J].高校应用数学学报A辑(中文版),2002,17(3):363-370.
    [103]万里红,孙燮华,林旭亮.分形Hilbert曲线混合Gray码的图像加密算法研究[J].计算机工程与应用,2010,46(34):184-186.
    [104]谭永杰,马苗.位平面与Gray码相结合的图像置乱方法[J].计算机工程与应用,2010,46(16):174-177.
    [105]丁文霞,卢焕章,王浩,谢剑斌.基于混沌的快速格雷码分段置乱视频加密算法[J].通信学报,2007,28(9):34-39.
    [106]丁文霞,卢焕章,王浩.一种基于混沌二值密钥的格雷码分块置乱图像加密算法[J].计算机工程与科学,2008,30(7):50-53.
    [107]孙鑫,易开祥,孙优贤.基于混沌系统的图像加密算法[J].计算机辅助设计与图形学学报,2002,14(2):136-139.
    [108]易开祥,孙鑫,石教英.一种基于混沌序列的图像加密算法[J].计算机辅助设计与图形学学报,2000,12(9):672-676.
    [109]陈艳峰,李义方.交替分段相互置乱的双混沌序列图像加密算法[J].华南理工大学学报(自然科学版),2010,38(5):27-33.
    [110]刘云,郑永爱,莫丽丽.基于超混沌系统的图像加密方案[J].中南大学学报(自然科学版),2009,40(S1):121-126.
    [111]王英,郑德玲,王振龙.空域彩色图像混沌加密算法[J].计算机辅助设计与图形学学报,2006,18(6):876-880.
    [112]和红杰,张家树.基于混沌置乱的分块自嵌入水印算法[J].通信学报,2006,27(7):80-86.
    [113]朱从旭,陈志刚,欧阳文卫.一种基于广义Chen's混沌系统的图像加密新算法[J].中南大学学报(自然科学版),2006,37(6):1142-1148.
    [114]刘家胜,黄贤武,朱灿焰,吕皖丽.基于m序列变换和混沌映射的图像加密算法[J].电子与信息学报,2007,29(6):1476-1479.
    [115]黄峰,冯勇.一种对角线拉伸的混沌映射图像加密算法[J].光电子.激光,2008,19(1):100-103.
    [116]胡裕峰,朱善安.基于PCA和混沌置乱的零水印算法[J].浙江大学学报(工学版),2008,42(4):593-597.
    [117]张翌维,沈绪榜,郑新建,张洵颖.基于混沌映射的图像加密硬件实现结构[J].华中科技大学学报(自然科学版),2008,36(6):84-88.
    [118]高飞,李兴华.基于混沌序列的位图像加密研究[J].北京理工大学学报,2005,25(5):447-450.
    [119]张瀚,王秀峰,李朝晖,刘大海.一种基于混沌系统及Henon映射的快速图像加密算法[J].计算机研究与发展,2005,42(12):2137-2142.
    [120]王英,郑德玲,鞠磊.基于Lorenz混沌系统的数字图像加密算法[J].北京科技大学学报,2004,26(6):678-682.
    [121]李娟,冯勇,杨旭强.压缩图像的三维混沌加密算法[J].光学学报,2010,30(2):399-404.
    [122]王新成.多媒体实用技术(图象分册)[M].成都:电子科技大学出版社,1995.
    [123]沈庭方,方子文.数字图象处理及模式识别[M].北京:北京理工大学出版社,1998.
    [124]李昌利,卢朝阳.数字水印的去同步攻击及其对策[J].中国图象图形学报,2005,10(4):403-409.
    [125]张博,李小斌,侯彪.基于Hermit矩阵扰动特性的图像数字水印.西安电子科技大学学报,2008,35(6):1127-1130.
    [126]谢静,吴一全.基于奇偶量化的Contourlet变换域指纹图像水印算法[J].计算机应用,2007,27(6):1365-1367.
    [127]刘芳,贾成,袁征.一种基于Arnold变换的二值图像水印算法[J].计算机应用,2008,28(6):1044-1046.
    [128]赵亮,廖晓峰,向涛,肖迪.对高维混沌系统的图像加密算法安全性和效率的改进[J].计算机应用,2009,27(7):1775-1781.
    [129]黄良永,肖德贵.二值图像Arnold变换的最佳置乱度[J].计算机应用,2009,29(2):474-476.
    [130]Paul Garrett著.吴世忠等译.密码学导论[M].北京:机械工业出版社,2003:94-100,154.
    [131]袁明豪.Fibonacci数列的模数列的周期性[k-0-J].数学的实践与认识,2007,2(3):119-122.
    [132]袁明豪.Fibonacci数列的一组模数列的周期[J].黄冈师范学院学报,2007,3(3):1-3.
    [133]袁明豪.Fibonacci数列的模数列的周期的一个性质[k-0-J].数学的实践与认识,2008,4(8):207-210.
    [134]Peter Freyd,Kevin S.Brown. Periods of Fibonacci Sequences Mod m.TheAmerican Mathematical Monthly,1992,99(3):278-279.
    [135]kenneth H.Rosen. Elementary number theory and its applications (Fifthedition). Beijing:China Machine Press,2009.
    [136]Paulo Ribenboim. My Numbers,My Friends:Popular Lectures on NumberTheory. New York:Springer-Verlag.(2000).
    [137]E. Karaduman. An application of Fibonacci numbers in matrices,AppliedMathematics and Computation,2004,147:903-908.
    [138]Arnold Knopfmacher,Robert F. Tichy,StephanWagner,Volker Ziegler.Graphs,partitions and Fibonacci numbers. DiscreteApplied Mathematics,2007,155:1175-1187.
    [139]X. Fu,X. Zhou. On matrices related with Fibonacci and Lucas numbers,Appl.Math. Comput,2008,200(1):100-960.
    [140]M.C. Er,Sums of Fibonacci numbers by matrix methods,Fibonacci Quart,1984,22(3):204-207.
    [141] W. Chen,C. Quan,C.J. Tay. Optical color image encryption based onArnoldtransform and interference method. Optics Communications,2009,282(18):3680-3685.
    [142] S. Falcon,A. Plaza. On the4-dimensional k-Fibonacci spirals,Chaos,Soliton Fract,2008,38(4):993-1003.
    [143] Sergio Falcon,Angel Plaza. k-Fibonacci sequences modulo m. Chaos,Solitons and Fractals,2009,41:497-504.
    [144] Falcon S,PlazaA′. On k-Fibonacci sequences and polynomials and theirderivatives. Chaos,Solitons&Fractals,2007,39:1005-19.
    [145] E. Kilic. The Binet formula,sums and representations of generalizedFibonacci p-numbers,Eur. J. Combin.2008,29(3):701-711.
    [146] S. Yang. On the k-generalized Fibonacci numbers and high-order linearrecurrence relations,Appl. Math. Comput,2008,196(2):850-857.
    [147] E. Karaduman. On determinants of matrices with general Fibonacci numbersentries,Appl. Math. Comput,2005,167:670-676.
    [148] S. Falcon,A. Plaza. On the Fibonacci k-numbers,Chaos,Soliton Fract,2007,32(5):1615-1624.
    [149] Lin Dong-dai. Introduction to algebra and Finite Fields. Beijing:HigherEducation Press,2008,pp.34-36.
    [150] Ye G D. Image scrambling encryption algorithm of pixel bit based on chaosmap. PATTERN RECOGNITION LETTERS,2010,31(2):347-354.
    [151] Lin Z H,Wang H X. Efficient Image Encryption Using a Chaos-based PWLMemristor. IETE TECHNICAL REVIEW,2010,27(4):318-325.
    [152]Gao H J,Zheng Y S,Liang S Y,et al. A new chaotic algorithm for imageencryption [J]. Chaos,Solutions and Fractals,2006,29(2):393-399.
    [153]王泽辉.三维随机矩阵置乱变换的周期及其应用[J].中山大学学报(自然科学版),2008,47(1):21-25.
    [154]王英,郑德玲,吴延华.一种多重水印零嵌入算法[J].北京科技大学学报,2006,28(8):799-802.
    [155]王泽辉.集成随机置乱和环论的图形图像公钥加密技术[J].计算机辅助设计与图形学学报,2009,21(5):708-712.
    [156]孔涛,张亶.Arnold反变换的一种新算法[J].软件学报,2004,15(10):1558-1564.
    [157]杨晓元,苏光伟,张敏情.基于Kerckhoffs原则的图像隐密算法[J].武汉大学学报(理学版),2009,55(1):67-70.
    [158] MAY R M. Simple mathematical model with very complicated dynamics[J].Nature,1976,261:459-281.
    [159]邓绍江,肖迪,涂凤华.基于Logistic映射混沌加密算法的设计与实现[J].重庆大学学报,2004,27(4):61-63.
    [160]W. H.; Flannery,B. P.; Teukolsky,S. A.; and Vetterling,W. T..The Art ofScientific Computing,2nd ed. Cambridge,England:Cambridge University Press,pp.35-42,1992.
    [161]谭国律.基于矩阵张量积的数据加密方案[J].计算机科学,2002,29(8):119-120,125.
    [162]BibhudendraAcharya,Sarat Kumar Patra and Ganapati Panda,Involutory,Permuted and Reiterative Key Matrix Generation Methods for Hill CipherSystem[J].International Journal of Recent Trends in Engineering,2009,(4):106-108.
    [163]徐景实,谭利.矩阵加密与解密的一些方法[J].长沙电力学院学报(自然科学版),2003,18(1):1-3.
    [164]杨载朴.广义逆矩阵的张量积[J].工科数学,1999,15(1):85-88.
    [165]许君一,孙伟,齐东旭.矩阵Kronecker乘积及其应用[J].计算机辅助设计与图形学学报,2003,15(4):377-388.
    [166]Gerardo R Canta,Giovanni Poggi,Kronecker-product gain-shape vectorquantization for multispectral and hyperspectral image coding[J]. IEEE Transactions onImage Processing,1998,7(5):668-678.
    [167]Charles F Van Loan,The ubiquitous Kronecker product[J]. Journal ofComputational and Applied Mathematics,2000,123(Issue1/2):85-100.
    [168]Chades F Van Loan,Nikos Pitsianis,Approximation with Kroneckerproducts[R]. New York:Cornell University,CTO92TR109,1992
    [169]宋彩芹,赵建立.换位矩阵在矩阵张量积交换中的应用[J].济南大学学报(自然科学版),2009,23(2):218-220.
    [170]谭国律.基于矩阵张量积的数据加密矩阵的构造[J].计算机工程与应用,2006,42(23):65-65.
    [171]邹阿金,肖秀春.基于混沌控制系统的神经网络异步加密算法[J].计算机工程,2008,34(12):160-161.
    [172]邹阿金,张雨浓.基函数神经网络及应用[M].广州,中山大学出版社,2009.
    [173]Fredric M. Ham Ivica Kostanic(叶世伟,王海娟译),神经计算原理[M].北京,机械工业出版社,2007.
    [174] Tiegang Gao,Zengqiang Chen,Anew image encryption algorithm based onhyper-chaos[J]. Physics LettersA,2008,372:394-400.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700