排序方式: 共有2条查询结果,搜索用时 281 毫秒
1
1.
A Perturbing Scheme of Digital Chaos 总被引:1,自引:0,他引:1
Introduction Inrecentyears,therehasbeengrowinginter-estinginchaoticcryptography.Bothdigitaland analogchaoticencryptionmethodshavebeenpro-posedandanalyzed[1-7].Indigitalciphers,chaotic systemsaremostlyemployedtogeneratepseudo-randombits[3-5].Chaoticsystemshavemanyperfectcharacter-istics,suchasmixingandsensitivitytoinitialcon-ditions,whichcanbeconnectedwiththoseofgood ciphers,suchasconfusionanddiffusion[6-8].Unfortunately,whenchaoticsystemsarereal-izedinfinitecomputingprecision,theirdigitaldy-n… 相似文献
2.
Introduction TheInternetandtheadvancementofdigital technologieshaveenablednumerousapplicationsin theareasofmultimediacommunicationsandmulti-medianetworking.Atypicalcharacteristicofdigi-talproductsisthattheyareeasytomanipulate,i.e.tostore,duplicate,transmitormodify.Thus,theauthenticationandthecopyrightprotec-tionfromunauthorizedmanipulationofdigitalau-dio,image,andvideodatabecomeanessential concerninthedigitalmultimediaera[1].Digitalwa-termarkinghasattractedconsiderableattentionand seennumerou… 相似文献
1