• No results found

Cryptanalysis of a chaotic image encryption algorithm based on information entropy

N/A
N/A
Protected

Academic year: 2020

Share "Cryptanalysis of a chaotic image encryption algorithm based on information entropy"

Copied!
11
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

FIGURE 2: The functional graph of 2D-LASM with 6-bit floating-point precision and round quantization, where the length ofmantissa fraction is 3.
FIGURE 4: Three cipher-images encrypted by HCIE: a) “Peppers” withwith 64 ×64 blocks; b) “Lenna” with 64 ×64 blocks; c) “Lenna” 32 × 32 blocks
FIGURE 6: The process of revealing the permutation procedure of IEAIE with a differential attack.

References

Related documents

Figure 4 The ratio of Treg cells to Th17 cells negatively correlated with total bilirubin levels in chronic HBV-infected patients, especially in patients with ACHBLF (B) and

Driving need, initial event rate, fraction of events per- ceived as risky, event decay time, effect of recent events on monthly driving, effect of recent events on events per mile,

As mentioned before, an advantage of our approach over the pairwise model is that it is not “edge-factored.” Each greedy decision can rely on all of the information contained in

Table 3 and Fig. 4 illustrate the temporal evolution of the different networks at the term level. The communication networks aggregated in the second and third terms are very

ence; RR: Relative risk; RCT : Randomized controlled trial; RRT : Renal replace- ment therapy; RBCs: Red blood cells; TSA: Trial sequential analysis; RIFLE: Risk, injury, failure,

Thus, these data suggest that increased Ras/ MAPK signaling observed in alph mutant backgrounds is not responsible for the regulatory role that Alph plays in SAPK signaling, although

An analytic center cutting plane method for solving semi-infinite variational inequality problems. Merit functions for complementarity and related prob- lems:

Semantic-sensitive Namespace Management in Large-scale File Systems. Many document frameworks depend