TY - BOOK AU - Redlich, R. M. AU - Nemzow, M. A. PY - 2017 DA - 2017// TI - Digital information infrastructure and method for security designated data and with granular data stores: US, US9734169 [P] ID - Redlich2017 ER - TY - JOUR AU - Han, Z. AU - Huang, S. AU - Li, H. PY - 2016 DA - 2016// TI - Risk assessment of digital library information security: A case study [J] JO - Electron. Libr. VL - 34 UR - https://doi.org/10.1108/EL-09-2014-0158 DO - 10.1108/EL-09-2014-0158 ID - Han2016 ER - TY - BOOK AU - Zhou, C. AU - Guo, Y. AU - Huang, W. PY - 2016 DA - 2016// TI - Information security defense method of electric power control system based on digital watermark[C]// International Conference on Materials Engineering, Manufacturing Technology and Control ID - Zhou2016 ER - TY - STD TI - E. Chisanga, E.K. Ngassam, Towards a conceptual framework for information security digital divide[C]// Ist-Africa week conference. IEEE, 1–8 (2017) ID - ref4 ER - TY - STD TI - T. Caulfield, C. Ioannidis, D. Pym, Discrete Choice, Social Interaction, and Policy in Encryption Technology Adoption (Short Paper). In International Conference on Financial Cryptography and Data Security. Springer, Berlin, Heidelberg (2016), pp. 271-279 ID - ref5 ER - TY - STD TI - Z. Cai, D. Huang, Research on DES Data Encryption Technology in Network Information Security [J]. Computer Measurement & Control. 25, 241-247 (2017) ID - ref6 ER - TY - STD TI - Sun Y Q, Wang X H. Information encryption technology with strong robustness based on QR code and matrix mapping [J]. Packaging Engineering. 38, 194-199 (2017) ID - ref7 ER - TY - STD TI - S.W. Lee, S.M. Park, K.B. Sim, et al., Smart Door Lock Systems using encryption technology [J]. 27(1), 65–71 (2017) ID - ref8 ER - TY - JOUR AU - Wen, Z. AU - Taoshen, L. I. AU - Zhang, Z. PY - 2005 DA - 2005// TI - An image encryption technology based on chaotic sequences [J] JO - Comput Eng. VL - 31 ID - Wen2005 ER - TY - JOUR AU - Wang, Y. Y. AU - Wang, Y. R. AU - Wang, Y. PY - 2007 DA - 2007// TI - Optical image encryption based on binary Fourier transform computer-generated hologram and pixel scrambling technology [J] JO - Optics & Lasers in Engineering VL - 45 UR - https://doi.org/10.1016/j.optlaseng.2007.01.003 DO - 10.1016/j.optlaseng.2007.01.003 ID - Wang2007 ER - TY - JOUR AU - Zhang, X. Y. AU - Chao, W. AU - Su-Mei, L. I. PY - 2008 DA - 2008// TI - Image encryption technology on two-dimensional cellular automata [J] JO - Journal of Optoelectronics Laser VL - 19 ID - Zhang2008 ER - TY - JOUR AU - Ahmad, J. AU - Khan, M. A. AU - Hwang, S. O. AU - Khan, J. S. PY - 2017 DA - 2017// TI - A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices JO - Neural Computing and Applications VL - 28 UR - https://doi.org/10.1007/s00521-016-2405-6 DO - 10.1007/s00521-016-2405-6 ID - Ahmad2017 ER - TY - JOUR AU - Sixing, X. AU - Xin, S. AU - Bing, L. PY - 2012 DA - 2012// TI - New image encryption technology of image based on computer generated hologram [J] JO - Laser & Optoelectronics Progress VL - 49 UR - https://doi.org/10.3788/LOP49.040902 DO - 10.3788/LOP49.040902 ID - Sixing2012 ER - TY - JOUR AU - Matthews, J. M. AU - Moffat, A. F. J. PY - 1994 DA - 1994// TI - WR 40: Coherence or chaos? [J] JO - Astronomy & Astrophysics VL - 283 ID - Matthews1994 ER - TY - STD TI - T. Habutsu, Y. Nishio, I. Sasase, et al., A secret key cryptosystem by iterating a chaotic map[C]// the workshop on advances in cryptology-Eurocrypt. Springer-Verlag, 13(1),1-5 (1991) ID - ref15 ER - TY - JOUR AU - Fridrich, J. PY - 1998 DA - 1998// TI - Symmetric ciphers based on two-dimensional chaotic maps [J] JO - International Journal of Bifurcation & Chaos VL - 08 UR - https://doi.org/10.1142/S021812749800098X DO - 10.1142/S021812749800098X ID - Fridrich1998 ER - TY - STD TI - Ismail I A, Amin M, Diab H. A digital image encryption algorithm based a composition of two chaotic logistic maps [J]. International Journal of Network Security, 2010, 11(1):1–10 ID - ref17 ER - TY - JOUR AU - Fuyan, S. AU - Zongwang, L. PY - 2011 DA - 2011// TI - Digital image encryption with chaotic map lattices [J] JO - Chinese Physics B VL - 20 ID - Fuyan2011 ER - TY - JOUR AU - Diaconu, A. V. AU - Loukhaoukha, K. PY - 2013 DA - 2013// TI - An improved secure image encryption algorithm based on Rubik’s cube principle and digital chaotic cipher [J] JO - Mathematical Problems in Engineering VL - 2013 UR - https://doi.org/10.1155/2013/848392 DO - 10.1155/2013/848392 ID - Diaconu2013 ER - TY - JOUR AU - Wang, X. AU - Lintao, L. PY - 2013 DA - 2013// TI - Cryptanalysis and improvement of a digital image encryption method with chaotic map lattices [J] JO - Chinese Physics B VL - 22 ID - Wang2013 ER - TY - STD TI - T.K. Sun, X.G. Shao, X.Y. Wang, A novel binary image digital watermarking algorithm based on DWT and chaotic encryption[C]// the, international conference for young computer scientists. IEEE Computer Society, 2797–2802 (2008) ID - ref21 ER - TY - STD TI - L.I. Yu-Zhen, X. Jin, G. Zhao, et al., Color image encryption scheme based on zigzag transformation and chaotic map [J]. Computer Engineering & Design. 37, 2001-2006 (2016) ID - ref22 ER - TY - JOUR AU - Liu, L. AU - Xiao, S. AU - Zhang, L. PY - 2017 DA - 2017// TI - Digital chaos-masked optical encryption scheme enhanced by two-dimensional key space [J] JO - Opt. Commun. VL - 398 UR - https://doi.org/10.1016/j.optcom.2017.04.015 DO - 10.1016/j.optcom.2017.04.015 ID - Liu2017 ER - TY - STD TI - M. Zhao, X. Tong, A multiple chaotic encryption scheme for image[C]// international conference on wireless communications NETWORKING and Mobile computing. IEEE, 1–4 (2010) ID - ref24 ER - TY - JOUR AU - Chen, G. AU - Mao, Y. AU - Chui, C. K. PY - 2004 DA - 2004// TI - A symmetric image encryption scheme based on 3D chaotic cat maps [J] JO - Chaos, Solitons Fractals VL - 21 UR - https://doi.org/10.1016/j.chaos.2003.12.022 DO - 10.1016/j.chaos.2003.12.022 ID - Chen2004 ER - TY - JOUR AU - Wang, K. F. AU - Zhuang, S. AU - Zhao, X. R. PY - 2015 DA - 2015// TI - JPEG image encryption algorithm based on three-dimensional multi-chaotic system [J] JO - Applied Mechanics & Materials VL - 734 UR - https://doi.org/10.4028/www.scientific.net/AMM.734.554 DO - 10.4028/www.scientific.net/AMM.734.554 ID - Wang2015 ER - TY - JOUR AU - Xiuli, C. AU - Zhihua, G. AU - Ke, Y. PY - 2017 DA - 2017// TI - An image encryption scheme based on three-dimensional Brownian motion and chaotic system [J] JO - Chinese Physics B VL - 26 ID - Xiuli2017 ER -