Description: This paper presented a new self-adaptive image encryption algorithm so as to improve its robustness. Under
this algorithm, a gray image or color image was divided into 2 × 2 size blocks. A corresponding size of matrix in the top right
corner was created by the pixel gray-scale value of the top left corner under Chebyshev mapping. The gray-scale value of the
top right corner block was then replaced by the matrix created before. The remaining blocks were encrypted in the same
manner in clockwise until the top left corner block was finally encrypted. This algorithm is not restricted to the size of image
and it is suitable to gray images and color images, which leads to better robustness. Meanwhile, the introduction of gray-scale
value diffusion system equips this algorithm with powerful function of diffusion and disturbance.
To Search:
File list (Check if you may need any files):
自适应加密\AA.m
..........\AAA.asv
..........\AAA.m
..........\AAde.m
..........\AAmain.asv
..........\AAmain.m
..........\ABCDmain.asv
..........\ABCDmain.m
..........\ACmain.asv
..........\ACmain.m
..........\ad.asv
..........\ad.m
..........\Amain.asv
..........\BB.m
..........\BBB.m
..........\BBde.m
..........\Bmain.m
..........\CC.m
..........\CCC.asv
..........\CCC.m
..........\CCde.m
..........\ccoef.m
..........\clock.asv
..........\DD.m
..........\DDD.asv
..........\DDD.m
..........\DDde.asv
..........\DDde.m
..........\declock.asv
..........\DTU.m
..........\DTUJ.m
..........\FDC.asv
..........\FDC.m
..........\HDU.m
..........\HDUJ.m
..........\HUD.m
..........\HUDJ.m
..........\LDTRU.m
..........\LDTRUJ.m
..........\LLR.m
..........\LLRJ.m
..........\LLRRL.asv
..........\LLRRL.m
..........\LRL.m
..........\LRLJ.m
..........\LRRLL.asv
..........\LRRLL.m
..........\LTR.m
..........\LTRJ.m
..........\LUTRD.m
..........\LUTRDJ.m
..........\per.m
..........\ps.m
..........\randPair.m
..........\RDTLU.m
..........\RDTLUJ.m
..........\RKK.m
..........\RTL.m
..........\RTLJ.m
..........\RUTLD.m
..........\RUTLDJ.m
..........\SC.m
..........\testPair.asv
..........\testPair.m
..........\testper.m
..........\UTD.m
..........\UTDJ.m
..........\vper.m
自适应加密