共 36 条
- [21] Biryukov A., Daemen J., Lucks S., Vaudenay S., Topics and Research Directions for Symmetric Cryptography. In Proceedings of Early Symmetric Crypto workshop, (pp. 1–4). University of Luxembourg, (2017)
- [22] Schneier B., Applied Cryptography: Protocols Algorithms and Source Code in C, (1996)
- [23] Khan M., A novel image encryption using Fourier series, Journal of Vibration and Control, 21, 16, pp. 3450-3455, (2015)
- [24] Fourier Series
- [25] Folland G.B., Fourier Analysis and Its Applications, (1992)
- [26] Military Cryptanalysis Part I- National Security Agency
- [27] Kerckhoffs’s principle
- [28] Parvin Z., Seyedarabi H., Shamsi M., A new secure and sensitive image encryption scheme based on new substitution with chaotic function, Multimedia Tools and Applications, 75, 17, pp. 10631-10648, (2016)
- [29] Chen Z., Lu J., Yang P., Luo X., Recognizing substitution steganography of spatial domain based on the characteristics of pixels correlation, International Journal of Digital Crime and Forensics, 9, 4, pp. 48-61, (2017)
- [30] Liu H., Wang X., Color image encryption using spatial bit-level permutation and high-dimension chaotic system, Optics Communications, 284, 16, pp. 3895-3903, (2011)