|
[1]檔案樂活情報,數位影像資訊隱藏技術與應用( https://www.archives.gov.tw/alohasImages/92/theme.html ) [2]臺東師範學院資訊教育系,《數位智慧財產權保護之資訊技術》課程( http://www1.nttu.edu.tw/green/www/g02/g02-2/pp/dis/01.pdf ) [3]數位影像密碼學 (http://scimonth.blogspot.com/2015/05/blog-post_39.html) [4]百科知識,混沌密碼學(https://www.easyatm.com.tw/wiki/%E6%B7%B7%E6%B2%8C%E5%AF%86%E7%A2%BC%E5%AD%B8 ) [5]Xiaofeng Li and Yinhui Zhang, "Digital image encryption and decryption algorithm based on wavelet transform and chaos system," 2016 IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC), 2016, pp. 253-257, doi: 10.1109/IMCEC.2016.7867211. [6]Wenting Yuan, Xuelin Yang, Wei Guo and Weisheng Hu, "A double-domain image encryption using hyper chaos," 2017 19th International Conference on Transparent Optical Networks (ICTON), 2017, pp. 1-4, doi: 10.1109/ICTON.2017.8025092. [7]W. c. QIU and S. jun YAN, "An image encryption algorithm based on the combination of low - dimensional chaos and high - dimensional chaos," 2019 3rd International Conference on Electronic Information Technology and Computer Engineering (EITCE), 2019, pp. 684-687, doi: 10.1109/EITCE47263.2019.9094882. [8]Y. -Q. Zhang, J. -L. Hao and X. -Y. Wang, "An Efficient Image Encryption Scheme Based on S-Boxes and Fractional-Order Differential Logistic Map," in IEEE Access, vol. 8, pp. 54175-54188, 2020, doi: 10.1109/ACCESS.2020.2979827. [9]Z. Mu and H. Liu, "Research on digital media image encryption algorithm based on Logistic chaotic map," 2020 International Conference on Robots & Intelligent System (ICRIS), 2020, pp. 108-111, doi: 10.1109/ICRIS52159.2020.00035. [10]密碼學(一):古典密碼學 (https://justreadwithme.medium.com/%E5%AF%86%E7%A2%BC%E5%AD%B8-%E4%B8%80-%E5%8F%A4%E5%85%B8%E5%AF%86%E7%A2%BC%E5%AD%B8-455e43038241) [11]應用密碼學入門 (https://hitcon.org/2018/CMT/slide-files/d1_s2_r4.pdf) [12]聽起來好像很厲害的 - 密碼學 (https://ithelp.ithome.com.tw/articles/10248442) [13]密碼學基本概念 (https://hackmd.io/@DIuvbu1vRU2C5FwWIMzZ_w/ByUf1sdRr) [14]維基百科,3DES,2021 (https://zh.wikipedia.org/wiki/3DES) [15]楊吳泉,1994,現代密碼學入門及程式設計,全華科技圖書股份有限公司。 [16]賴溪松、韓亮、張真誠,1995,近代密碼學及其應用,松崗電腦圖書資料股份有限公司。 [17]百科知識,混沌理論 ( https://www.easyatm.com.tw/wiki/%E6%B7%B7%E6%B2%8C%E7%90%86%E8%AB%96 ) [18]維基百科,混沌理論 ( https://zh.wikipedia.org/zh-tw/%E6%B7%B7%E6%B2%8C%E7%90%86%E8%AE%BA ) [19]何謂”混沌理論”? 何謂”蝴蝶效應”? ( https://yauli25.pixnet.net/blog/post/38821905-%E4%BD%95%E8%AC%82%EF%BB%BF%E2%80%9D%E6%B7%B7%E6%B2%8C%E7%90%86%E8%AB%96%EF%BB%BF%E2%80%9D%EF%BC%9F-%E4%BD%95%E8%AC%82%EF%BB%BF%E2%80%9D%E8%9D%B4%E8%9D%B6%E6%95%88%E6%87%89 ) [20]孫克輝、王會海、賀少波,2021,混沌及其信息安全應用,清華大學出版社。 [21]維基百科,單峰映射 ( https://zh.m.wikipedia.org/zh-tw/%E9%80%BB%E8%BE%91%E6%96%AF%E8%B0%9B%E6%98%A0%E5%B0%84 ) [22]維基百科,雜湊函式 ( https://zh.wikipedia.org/wiki/%E6%95%A3%E5%88%97%E5%87%BD%E6%95%B8 ) [23][資料結構] 雜湊 (Hash) ( https://ithelp.ithome.com.tw/articles/10208884 ) [24]維基百科,MD5 ( https://zh.wikipedia.org/zh-tw/MD5 ) [25]密碼系统的攻擊 (https://learnku.com/articles/47101) [26]常見圖像加密性能評價指標(https://www.cxymm.net/article/qq_41137110/115675014)
|