Deep search:Searching for "image encryption" in 'ABSTRACT and KEYWORDGot 12 items.
index Title
1How to repair the Hill cipher
Author(s):ISMAIL I.A., AMIN Mohammed, DIAB H...  Clicked:5853  Download:5038  Cited:5  <Full Text>
Journal of Zhejiang University Science A  2006 Vol.7 No.12 P.2022-2030  DOI:10.1631/jzus.2006.A2022
2Cryptanalysis of an image encryption scheme based on the Hill cipher
Author(s):Cheng-qing LI, Dan ZHANG, Guan-ron...  Clicked:6396  Download:4029  Cited:7  <Full Text>
Journal of Zhejiang University Science A  2008 Vol.9 No.8 P.1118-1123  DOI:10.1631/jzus.A0720102
3Comments on “How to repair the Hill cipher”
Author(s):Y. RANGEL-ROMERO, R. VEGA-GARC&Iac...  Clicked:6159  Download:3961  Cited:5  <Full Text>
Journal of Zhejiang University Science A  2008 Vol.9 No.2 P.211-214  DOI:10.1631/jzus.A072143
4Decryption of pure-position permutation algorithms
Author(s):ZHAO Xiao-yu, CHEN Gang, ZHANG Dan...  Clicked:5333  Download:3116  Cited:5  <Full Text>
Journal of Zhejiang University Science  2004 Vol.5 No.7 P.803-809  DOI:10.1631/jzus.2004.0803
5Performance study of selective encryption in comparison to full encryption for still visual images
Author(s):Osama A. Khashan, Abdullah M. Zin,...  Clicked:9939  Download:3922  Cited:6  <Full Text>  <PPT> 2212
Journal of Zhejiang University Science C  2014 Vol.15 No.6 P.435-444  DOI:10.1631/jzus.C1300262
6A novel color image encryption algorithm based on a fractional-order discrete chaotic neural network and DN...
Author(s):Li-ping Chen, Hao Yin, Li-guo Yuan...  Clicked:7161  Download:8825  Cited:0  <Full Text>  <PPT> 1854
Frontiers of Information Technology & Electronic Engineering  2020 Vol.21 No.6 P.866-879  DOI:10.1631/FITEE.1900709
7Discrete fractional watermark technique
Author(s):Zai-rong Wang, Babak Shiri, Dumitr...  Clicked:6239  Download:5319  Cited:0  <Full Text>  <PPT> 1747
Frontiers of Information Technology & Electronic Engineering  2020 Vol.21 No.6 P.880-883  DOI:10.1631/FITEE.2000133
8Bio-inspired cryptosystem on the reciprocal domain: DNA strands mutate to secure health data
Author(s):S. Aashiq Banu, Rengarajan Amirtha...  Clicked:6564  Download:5658  Cited:0  <Full Text>  <PPT> 1928
Frontiers of Information Technology & Electronic Engineering  2021 Vol.22 No.7 P.940-956  DOI:10.1631/FITEE.2000071
9A joint image compression and encryption scheme based on a novel coupled map lattice system and DNA operati...
Author(s):Yuanyuan LI, Xiaoqing YOU, Jianqua...  Clicked:2253  Download:6189  Cited:0  <Full Text>  <PPT> 494
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.6 P.813-827  DOI:10.1631/FITEE.2200645
10TPE-H2MWD: an exact thumbnail preserving encryption scheme with hidden Markov model and weighted diffusion
Author(s):Xiuli CHAI, Xiuhui CHEN, Yakun MA,...  Clicked:2834  Download:2630  Cited:0  <Full Text>  <PPT> 589
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.8 P.1169-1180  DOI:10.1631/FITEE.2200498
11A geographic information encryption system based on Chaos-LSTM and chaos sequence proliferation
Author(s):Jia DUAN, Luanyun HU, Qiumei XIAO,...  Clicked:1668  Download:985  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.3 P.427-440  DOI:10.1631/FITEE.2300755
12SPJEU: a self-sufficient plaintext-related JPEG image encryption scheme based on a unified key
Author(s):Ming LI, Wenwen ZHOU, Mengdie WANG...  Clicked:715  Download:572  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.6 P.847-861  DOI:10.1631/FITEE.2400721
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE