-
程序在VB
Program In VB
- 2022-02-26 22:20:14下载
- 积分:1
-
创建巨型文件的参考源代码
创建巨型文件的参考源代码-create huge document reference source code
- 2023-05-06 15:20:02下载
- 积分:1
-
基于 RSA 密码
基于 RSA 密码,我写在 C# 语言中。本软件为越南人的。With 这个软件,you 可以加密和解密文本与 p,q 汽车或者你可以选择 p,q 随机。
- 2023-04-26 00:55:02下载
- 积分:1
-
cox方法展频水印matlab源码,对bitmap图像隐藏信息
cox方法展频水印matlab源码,对bitmap图像隐藏信息-frequency watermarking method Show Matlab source of bitmap images for hidden messages
- 2022-05-17 15:22:33下载
- 积分:1
-
加密算法,java上的加密算法,对大家应该用帮助的一个加密算法。...
加密算法,java上的加密算法,对大家应该用帮助的一个加密算法。-encryption algorithm, java on the encryption algorithm, we should be used to help an encryption algorithm.
- 2022-02-11 21:53:59下载
- 积分:1
-
自主循迹式机器人小车设计 期刊论文
自主循迹式机器人小车设计 期刊论文...
自主循迹式机器人小车设计 期刊论文
自主循迹式机器人小车设计 期刊论文-Autonomous tracking robot car design
- 2022-04-28 17:18:03下载
- 积分:1
-
Base64算法C++实现
Base64算法C++实现
Base64算法C++实现
Base64算法C++实现-Base64 algorithm C++ Achieve Base64 algorithm C++ Achieve
- 2022-10-11 00:05:03下载
- 积分:1
-
操作系统中关于哈明威码的C++实现程序
使用工具:Visual Studio 6.0...
操作系统中关于哈明威码的C++实现程序
使用工具:Visual Studio 6.0-Hemingwei operating system on the C code to achieve the procedures for the use tools : Visual Studio 6.0
- 2023-04-02 21:35:04下载
- 积分:1
-
大整数运算的实现
大整数运算的实现-large integer arithmetic Implementation
- 2022-05-07 09:02:08下载
- 积分:1
-
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map...
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map
-
In this paper, a novel block digital image encryp-
tion scheme based on a chaotic coupled map lattices
(CML) is reported. Within this scheme, an original
image is decomposed into sub-blocks with a given size,
and an external secret key with 192-bit is used and
mapped to the system parameters, which are employed
to generate a spatiotemporal chaotic binary sequence
matrix to encrypt the block original image. Besides,
the former sub-block encrypted result will be acted as
a feedback to the following sub-block encryption proc-
ess. The proposed scheme is described in detail, along
with the security analyses such as key space analysis,
sensitivity analysis, information entropy analysis and
correlation coefficients analysis of adjacent pixels. The
computer simulation results indicate that the suggested
image encryption scheme has some properties desir-
able in a good security
- 2022-05-30 11:41:05下载
- 积分:1