Project supported by the National Natural Science Foundation of China(Grant Nos.61173183,61672124,61370145,and 11501064);the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund,China(Grant No.MMJJ20170203);the China Postdoctoral Science Foundation(Grant No.2016M590850);the Scientific and Technological Research Program of Chongqing Municipal Education Commission,China(Grant No.KJ1500605)
Based on the Fisher–Yatess scrambling and DNA coding technology, a chaotical image encryption method is proposed. First, the SHA-3 algorithm is used to calculate the hash value of the initial password, which is used ...
Project supported by the National Natural Science Foundation of China(Grant Nos.61672124,61370145,and 61173183);the Password Theory Project of the13th Five-Year Plan National Cryptography Development Fund,China(Grant No.MMJJ20170203);the Program for New Century Excellent Talents in Fujian Province University;the Natural Science Foundation of Fujian Province of China(Grant No.2018J01100)
In this paper, first, we investigate a novel one-dimensional logistic-PWLCM(LP) modulation map which is derived from the logistic and PWLCM maps. Second, we propose a novel PCLML spatiotemporal chaos in pseudo-rando...
Project supported by the National Natural Science Foundation of China(Grant Nos.61672124,61370145,61173183,and 61503375);the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund,China(Grant No.MMJJ20170203)
Detection of community structures in the complex networks is significant to understand the network structures and analyze the network properties. However, it is still a problem on how to select initial seeds as well a...