Welcome![Sign In][Sign Up]
Location:
Search - chaotic map

Search list

[Special Effectsxbpjepg

Description: 基于小波变换和混沌映射的多功能图像水印算法,完成的图像数字水印加密-based on wavelet transform and the chaotic map multifunctional image watermarking algorithm to complete the digital watermark image encryption
Platform: | Size: 36294 | Author: xxx | Hits:

[Special Effectsxbpjepg

Description: 基于小波变换和混沌映射的多功能图像水印算法,完成的图像数字水印加密-based on wavelet transform and the chaotic map multifunctional image watermarking algorithm to complete the digital watermark image encryption
Platform: | Size: 35840 | Author: xxx | Hits:

[AI-NN-PRchaos-baker-vanderpol

Description: baker(面包师变换)的混沌图像,面包师变换是混沌的一种,是一维的混沌映射。vanderpol混沌系统的图像-baker (baker transform) of chaotic image, the baker's transformation is a chaotic, is a dimension of chaotic maps. Vanderpol chaotic system image
Platform: | Size: 1024 | Author: xuqs | Hits:

[matlabLyapunov_Terra

Description: 当计算混沌系统Lyapunov指数时,gs.m代码实现正交化 直接运行L2.m,可计算出Lyapunov指数(该代码是基于奇异值分解计算Lyapunov指数的) -chaotic system when calculating Lyapunov exponent, gs.m code directly Orthogonalization L2.m operation, translate into Lyapunov exponent (The code is based on the singular value decomposition Lyapunov exponent)
Platform: | Size: 1024 | Author: 贾敏 | Hits:

[Special EffectslogisticDCT

Description: matlab版本,基于混沌logstic映射的DCT域数字水印提取算法!很不错的1-matlab version logstic based on chaotic map DCT domain digital watermarking extraction algorithm! Very good one
Platform: | Size: 6144 | Author: 刘田 | Hits:

[Crack Hacklogic

Description: 利用混沌影射的方法设计了一种多随机性的文件加密算法.分析了数据加密和Logistic混沌映射 的原理,提出了基于混沌方法的多随机性文件加密算法,采用VB完成了文件加密软件的设计.软件测试表 明:该加密算法的混沌特性和多随机特性增加了解密的难度,提高了加密数据的安全性,实现了密钥的随机 生成和加密算法的随机调用,使得加密后的文件更加安全.-Alluding to the use of chaos designed a multi-randomness of the file encryption algorithm. Analysis of the data encryption and Logistic chaotic map theory, put forward a method based on chaotic encryption algorithm and more random files using VB completed file encryption software design. Software Testing showed that: the encryption algorithm of chaotic characteristics and multi-random characteristics of an increase of the difficulty of decryption, the encrypted data to improve security, the realization of the randomly generated key encryption algorithm and the random call, making encrypted documents more secure.
Platform: | Size: 150528 | Author: hujun | Hits:

[Crack Hackfrey

Description: frey map混沌随机序列的MATLAB产生源程序-frey map chaotic random sequences generated source MATLAB -frey map chaotic random sequence of MATLAB generated source-frey map chaotic random sequences generated source MATLAB
Platform: | Size: 1024 | Author: zhaoxue | Hits:

[matlabchaotick_map

Description: Pixel based chaotic map
Platform: | Size: 1024 | Author: Staflik | Hits:

[matlabBernoulli

Description: matlab code for Bernoulli s chaotic map used for encryption
Platform: | Size: 1024 | Author: anshu | Hits:

[GIS programmatlab

Description: 基于Logistic混沌映射图像加密 -Based on the Logistic chaotic map image encryption
Platform: | Size: 457728 | Author: colo | Hits:

[Special Effectsmiyao

Description: 本文提出了基于二维混沌映射的数字图像水印算法,混沌具有随机性、似噪声及对初始条件的极端敏感性等特点。将经过二维混沌映射置乱后的数字水印信号嵌入图像小波域的低频系数,实现了数字水印的隐蔽性、保密性和稳固性;利用二维混沌映射Arnold变换对水印信号进行置乱,不仅增强了水印信号保密性,同时有效提高了视觉上抵抗图像剪切攻击的能力。-In this paper, two-dimensional chaotic map based on digital image watermarking algorithm, Chaos with random noise and the likelihood of extreme sensitivity to initial conditions and so on. Two-dimensional chaotic map will be scrambling after the digital watermark embedded image signal of the low-frequency coefficients in wavelet domain, the realization of a digital watermark hidden, security and stability the use of two-dimensional chaotic map on Arnold transform scrambling watermark signal, not only enhances the confidentiality of the watermark signal at the same time improve the visual image shear resistance attacks.
Platform: | Size: 668672 | Author: lafeng | Hits:

[Crack HackCatMap

Description: chaos theory , chaotic map, cat map
Platform: | Size: 13312 | Author: Sama | Hits:

[OtherLogistic

Description: 基于Logistic混沌映射的DCT域脆弱数字水印算法 -gistic chaotic map based on fragile digital watermarking algorithm for DCT domain
Platform: | Size: 389120 | Author: 天下 | Hits:

[matlablogistic-map

Description: Chaotic Logistic (quadratic) map
Platform: | Size: 1024 | Author: Ahmed | Hits:

[Special EffectsTwo-dimensional-chaotic-map

Description: 本文提出了基于二维混沌映射的数字图像水印算法,混沌具有随机性、似噪声及对初始条件的极端敏感性等特点。-In this paper, two-dimensional chaotic map based on digital image watermarking algorithm, Chaos is random, like noise and extreme sensitivity to initial conditions and so on.
Platform: | Size: 665600 | Author: 陈万虹 | Hits:

[OtherCriteria-to-Design-Chaotic-Self-Similar-Traffic-g

Description: this work is concentrate on criteria to build chaotic map system to generate self similar traffic. the criteria relates the self similarity with polynomial decay.
Platform: | Size: 336896 | Author: izzat | Hits:

[matlabHenon-Map

Description: Henon Map is one of the most studied in chaotic map.
Platform: | Size: 1024 | Author: Andri | Hits:

[OtherProposed-random-unified-chaotic-map-as-PRBG-for-v

Description: Proposed random unified chaotic map as PRBG for voice encryption in wireless communication 2015
Platform: | Size: 606208 | Author: medo | Hits:

[Other78

Description: HCA101: A Chaotic Map based on Cellular Automata with Binary Synchronization Properties
Platform: | Size: 287744 | Author: tala | Hits:

[Industry researchDesigning a 2D infinite collapse map for image encryption

Description: Due to the unpredictability and complexity properties, chaotic maps are widely applied in security, com- munication, and system control. Existing one-dimensional (1D) chaotic maps can be easily predicted and high-dimensional (HD) ones have more complex structures and higher computation costs. In order to enhance the chaotic performance, this paper proposes a new two-dimensional infinite collapse map (2D- ICM). Compared with existing 2D chaotic maps, 2D-ICM has better ergodicity, hyperchaotic property, un- predictability, and a wider chaotic region. To investigate its application, we further propose an image encryption algorithm using 2D-ICM. Simulation demonstrates that the proposed image encryption algo- rithm has excellent performance for protecting various kinds of images.
Platform: | Size: 6732366 | Author: zhedongtzdt@163.com | Hits:
« 12 3 4 5 6 7 »

CodeBus www.codebus.net