• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Synchronously scrambled diffuse image encryption method based on a new cosine chaotic map

    2022-08-31 09:54:56XiaopengYan閆曉鵬XingyuanWang王興元andYongjinXian咸永錦
    Chinese Physics B 2022年8期
    關鍵詞:興元

    Xiaopeng Yan(閆曉鵬) Xingyuan Wang(王興元) and Yongjin Xian(咸永錦)

    1School of Information Science and Technology,Dalian Maritime University,Dalian 116026,China

    2Guangxi Key Laboratory of Multi-source Information Mining&Security,Guangxi Normal University,Guilin 541004,China

    Keywords: chaos mapping,cosine mapping,cyclic information wave,doppler effect,image encryption

    1. Introduction

    Nowadays,the explosive development of the information age has led to a lot of security problems. No matter whether it is information itself or the process of information transmission, there are many security risks. As a kind of widely used information carriers,digital image plays a decisive role in the process of the modern information transmission.In a network,there are a large number of images per second by transmission,processing and sharing. Therefore, digital image information security problem is also gradually attractive. In order to protect the privacy and the safety of materials and non-public information, image security has become an important information security problem.

    In the traditional information transmission, most of the information is text information, so the traditional encryption algorithm is mainly used to encrypt the text information. The volume of this algorithm is large, and the correlation of the algorithm itself is strong. Therefore, in the direction of image encryption, this type of algorithm is unsuitable.[1–3]In order to develop algorithms suitable for image encryption,many researchers began to develop corresponding encryption algorithms based on the characteristics of digital images. Among them, chaotic system encryption,[4–7]biological DNA simulation coding,[8,9]transformation method based on optical characteristics,[10–12]quantum cryptography[13–15]and other methods have been gradually applied in image encryption. In image hiding,[16–18]information security,[19–21]watermarking,[22–24]digital image security,[25–28]and other aspects, these basic theories have played an important role.Among them, chaotic systems gradually attracted more and more attention because of their good characteristics. Due to their pseudo-randomness, unpredictability, ergodic property and initial value sensitivity,chaotic systems have good applications in the field of encryption,so many encryption methods based on chaotic systems began to be proposed.

    Because of its adaptability to the encryption field,chaotic mapping is widely used in encryption algorithms. We classified the systems according to the number of system parameters, and we did this for both high-dimensional chaotic systems and low-dimensional chaotic systems. Low-dimensional chaotic systems have relatively simple structures and use very little resources,However,its chaotic behavior only exists in a limited range,so it can be predicted.[29–31]High-dimensional systems, on the other hand, exhibit excellent chaotic behavior and unpredictability. As a result,their structures are more intricate, consume more resources, and take longer to operate. It is challenging to put many high-dimensional systems into practice. Finding a chaotic system with good chaos and a straightforward structure is now a crucial step in developing encryption techniques.[32]

    Many researchers have also proposed numerous stronger chaotic systems, such as one-dimensional chaotic systems based on the design of sine and inverse sine functions. Although it is still easier to predict than other systems, its encryption efficiency has greatly improved over other systems in recent years. Many classical chaotic systems were used as a base structure to encrypt algorithms. Hua and Zhou[33]put forth a brand-new two-dimensional chaotic system that effectively fixed the two-dimensional chaotic system’s flaws. To create a new chaotic system and incorporate it into an encryption algorithm,some researchers suggested combining the conventional sinusoidal mapping with logistic mapping.[34–37]A custom color image encryption technique based on various types of coupling mapping was proposed by Wanget al.[38]Although the algorithm has strong security, it encrypts data slowly.

    A new low-dimensional chaotic mapping relying on cosine function with good chaos effect is proposed in this paper because of the limitations of the low-dimensional chaotic system and the complexity of the high-dimensional chaotic system,and it is named as the one-dimensional cosine system(CLS).The new chaotic mapping is put to the test using the conventional theoretical analysis method, and it is demonstrated to have excellent chaotic performance in the scope of infinite real parameters. Additionally,we use the C-LS system in the domain of encryption to further strengthen the security of the encryption algorithm due to its excellent characteristics.Thus,we suggest a fresh encryption scheme. In this algorithm, the scrambling and diffusion of the image are realized by simulating the information wave model based on cosine chaos mapping, generating the cyclic information wave, and using the information wave diffusion model. The circular information wave has a doppler-like effect that simultaneously diffuses and scrambles the image matrix.Additionally,the secondary XOR diffusion is used to deepen the encryption effect in order to further ensure it. Following a thorough experimental analysis of the algorithm’s experimental results, we demonstrate that the algorithm can effectively withstand common attack types and that it has good security on its own.

    2. Basic theory of algorithm

    2.1. Chaotic system

    2.1.1. Logistic chaotic maps

    The chaos map has excellent initial value sensitivity,and the initial value and control parameters can be slightly modified to obtain two completely different results. Therefore,the chaotic system is very suitable for applications in encryption.Among the existing few nonlinear systems,the logistic map is a well-known 1-D chaotic system that is used in cryptography.According to mathematics,they can be defined as follows:

    2.1.2. Sine chaotic map

    The sine chaotic system is based on sinusoidal function.As a result, the input angle is converted to the output angle within the range of [0,1/π]. In terms of mathematics, sine mapping is defined as follows:

    wheretrepresents the control parameter,andQ(xi)stands for the sine mapping.

    2.2. Cosine chaotic mapping

    The cosine chaotic maps take the structure shown in Fig.1.

    Fig.1. Cosine chaotic mapping construction.

    HereL(a,xi)andS(a,xi)represent chaotic mapping models with control parameters,L(a,xi)andS(a,xi)are improved and combined.Using the weighted model,a new chaotic mapping model is constructed using a nonlinear cosine transform.As a result of the Logistic chaotic mapping model and the sine chaotic mapping model,we construct a new one-dimensional cosine chaotic mapping model as follows:

    Here,rrepresents the control parameter of chaotic mapping,iis the length of the mapping information wave,andTis the period of the cosine mapping.

    In the system mapping,we takeras the control parameter. Based on the cosine function,the new chaotic map can be derived by ignoring the negative value of the parameterμ.

    2.2.1. Chaos trajectory

    The C-LS chaotic system exhibits a very high chaotic state within the parameter range and has a very wide range of chaos.The positive real number space is covered by its chaotic area because it is based on the cosine function. For cryptography,a system with sufficient key space,sufficient complexity,and unpredictability can better meet the needs of encryption.Later, we test the new cosine chaotic system using the corresponding dynamic analysis techniques.

    When parameters in a dynamic system change, the output value range is described using a system trajectory bifurcation diagram. It can be an important tool for understanding the causes of instability and chaos as well as how different states of the system relate to one another and change over time. The relationship between bifurcation and the system’s structural stability is very close. The bifurcation graph produced by logistic mapping,sine mapping,and C-LS mapping with a change in control parameters is shown in Figs.2 and 3.

    Fig.2. Chaotic map bifurcation graph: (a)logistic mapping,(b)sine mapping.

    Fig.3. Bifurcation graph of C-LS mapping in different parameter ranges: (a)bifurcation diagram with control parameters between(0,1),(b)bifurcation diagram with control parameters between(0,5).

    As seen in Fig.3,the C-LS mapping’s bifurcation graphs are evenly and randomly distributed within the parameter’s norm, covering the entire region. This shows that the newly generated chaotic mapping exhibits robust chaotic behavior across the entire parameter range.

    2.2.2. Lyapunov exponent

    The initial state sensitivity and unpredictability of one chaotic mapping are its most prominent dynamical characteristics, and these characteristics can be measured using the Lyapunov exponent (LE). The average exponent rate of convergence or divergence for two orbits of a chaotic mapping that are close to each other in the phase plane can be described by the LE using the formula[39]

    Their chaos phenomenon gradually becomes worse as the LE increases. If the LE is positive, it means that regardless of how close or far apart the two trajectories are from each other,they will exhibit completely different incremental states over time. Therefore,the system is in a chaotic state when the LE is positive. The LE maximum can be used to assess the predictability of a high-dimensional system, which typically has two or more LE values. As a result,the system is in a chaotic state when its maximal LE is greater than 0. The hyperchaotic phenomenon is identified when the system has more than one positive LE and its orbits diverge in multiple directions. A larger LE indicates that the MD displays better hyperchaotic behaviors,which are much more complex and difficult to predict.

    Comparatively and elaborately using the Lyapunov exponent can make the issue more obvious. We use the Lyapunov exponent as the benchmark value to evaluate whether the system exhibits chaotic properties. Using the LE maximum, we can determine if the system exhibits chaotic behavior.

    Fig.4. The Lyapunov exponent of chaotic maps: (a)Lyapunov exponent of C-LS mapping, (b) Lyapunov exponent of logistic mapping, (c)Lyapunov exponent of sine mapping.

    2.2.3. Initial state sensitivity

    One of the most crucial characteristics of chaotic systems is their sensitivity to initial values. It symbolizes the sensitivity of an orbit whose initial values are almost infinitesimal and diverge exponentially following a set number of iterations.We create two tracks with initial value differences of 10?15,as shown in Fig.5(a),and control parameter differences of 10?15,as shown in Fig.5(b),to further analyze the sensitivity of the map (b). The orbits diverge after five to six iterations, as depicted in the figure, as a result of the system’s highly chaotic behavior.

    Fig.5. Chaotic mapping initial value sensitivity: (a)initial value sensitivity,(b)control parameter sensitivity.

    2.3. Cosines map circular information waves

    The term “cyclic information wave” describes a model of ripples with a set frequency of occurrence and an ongoing diffusion cycle. Doppler effect and water surface ripple are included in the traditional model.

    The Doppler effect is a frequent occurrence in nature that affects almost all types of waves, including sound, light, and electric ones. When the wave source and the observation position move together, a Doppler wave occurs, and when this happens,the signal state that the observation position receives will differ in frequency characteristics,depending on how the wave source and observation position move. The frequency of the received signal from the moral wave source will be higher and the wavelength will shorten as the observation position moves closer to the position of the wave source, indicating that the information wave is compressed. On the other hand,the wavelength lengthens as the frequency rises. The effect increases with increasing source velocity. The Doppler wave model can be described mathematically as follows:if the wave source’s frequency isF,its motion speed isV,the sound speed in air isU,and the distance between the stationary observerPand the wave source’s motion direction isL,then the frequency model that the observer receives is expressed as

    wheret0denotes the time center that corresponds to the observer’s location;whentf0,t0denotes the wave source’s proximity to the observer;whent>t0andf

    In order to simulate the Doppler effect and create an information wave model,we use the C-LS chaotic model as the generating function. The cyclic diffusion effect, period and frequency of C-LS mapping are good. Using chaos to build a cyclic information wave model,pseudo-random sequences are generated based on C-LS mapping:

    (1) The information wave’s length is given asn, and the circular information wave’s polynomial is given asm.

    (2) Different pseudo-random sequences are generated in multiple columns using C-LS chaotic mapping, and the sequences are chosen as frequency and parameter sequences in the polynomial.

    (3)The circular information wave model is created using the C-LS mapping as the generation system:

    whereTis the period.

    The high frequency shifts to the low frequency as the distance grows. To achieve the goals of synchronous scrambling and diffusion of the image,it is possible to use the frequency shift property of the circular information wave to change the gray value and position of the image pixel. The appropriate information wave polynomial is chosen based on the image size,and the frequency array of the circular information wave is generated using a chaotic system simulation. The necessary information wave can then be generated after a number of cycle iterations based on various periods.

    When scrambling an image,the wave used to generate the information is dependent on the size of the image because the generated cycle information wave length is inversely proportional to the image size. As a result,when the image is larger,the wave used to generate the information will take more time,which has a significant negative impact on how quickly the scrambling process proceeds, so the algorithm adopted for chunking thoughts, according to the size of the block to generate a wave doppler and scrambling,will greatly improve the execution efficiency of this algorithm.

    2.4. Key generation

    We decide to use the hash function as the secret key generation technique. The compression length of a given message sequence can be specified by the hash algorithm. This algorithm has a very high safety factor and can withstand the majority of brute force attacks, but some algorithms have recently been broken,including SHA-1 and others. Thus,as the primary part of key generation, we opt for the more popular SHA-512 function.

    Due to the peculiarity of the hash function, if the plaintext has a pixel value transformed, then the generated hash sequence group will be completely different, so it has extremely high security and sensitivity.We operate the SHA-512 function to hash the unencrypted image to obtain hash array,from which we select the appropriate sequence value for corresponding processing to obtain the secret key value we need.

    The algorithm’s complexity of 2512makes it robust enough to fend off brute force attacks. We select a 128-bit hash sequence and transform it into an array:

    Step 1 The hash algorithm is used to calculate the plaintext image. The parameter used to iterate the chaotic system is chosen to be the corresponding hash value. We initialize the sequence value to conform to the requirements of the chaotic system’s correlation coefficient. The formula for calculating the initial value and control parameters is as follows:

    Step 2 The obtained parameters are initialized to produce those that satisfy the requirements of the chaotic system.We produce the necessary pseudo-random sequence using the C-LS cyclic information wave generation system. The cyclic information wave’s sequence is transformed into a matrix with the same size as the matrix that will be diffused during the diffusion stage.The components of the pseudo-random sequence A must first be converted before being normalized. The normalized processing formula of circulating information wave is given as follows:

    3. Encryption algorithm

    3.1. Cyclic information waves are simultaneously scrambled and diffused

    The synchronous scrambling and diffusion process is realized as follows:

    Step 1 Obtain the median element value ofPasP(mid),the maximum element value asP,and the original image matrix asP(max). Utilize thePmatrix to perform a traversal comparison operation. Ifp(u,v)≤p(mid),recordL(u,v)=0;otherwise,recordL(u,v)=1,and get the position record matrixL.

    Step 2 Using Eq.(7)and matrixP,the cyclic information wave is produced. Information sequenceZis then obtained,and the initial operation is performed on the sequenceZ:

    3.2. Image encryption process

    According to the needs of the algorithm, the target image matrix is first divided intoN×Nsmall blocks, then into smaller blocks, and finally block-after-block division is carried out on the synchronized scrambling diffusion operation.Using an 256×256 image as an example,this article chooses images of various sizes for experiments. The block 8×8 is a matrix block. The steps for encryption are as follows:

    Step 1 Using C-LS chaotic mapping,six rows of chaotic pseudo-random sequences are created, and the sequences are initialized:

    Step 2 Choose theAA1 andBB2 sequence,apply Eq.(7)in periodTgenerated wave doppler information, convert information sequence of the same size as matrixpwave information matrix,and then utilize the information matrix for the block to apply Eqs.(13)and(14)to sync block image scrambling and diffusion, after the completion of the merger block image,and the output,as the first phase encryption results forP1.

    Step 3 Use Eq. (7), the sequencesAA2 andBB2 were chosen to produce Doppler information waves with the periodT1, which were then transformed into a matrix with the same sizeP1. In accordance with Eq. (5),P1undergoes traversal sorting and scrambling, and the scrambling matrixP2is produced.

    Step 4 Using Eq. (7), theAA3 andBB3 are chosen to produce information waves with the periodT2that are then transformed into a matrix with the same sizeP2. To achieve diffusion operation, the matrixP2is used in the XOR operation,and the final encrypted image is output.

    Fig.6. Encryption process flow chart.

    The reverse of encryption is decryption. The precise operational flow of the encryption algorithm suggested in this paper is shown Fig.6.

    4. Simulation results

    The simulation-based safety verification algorithm is presented in algorithm, we select a representative target image,analyze it comprehensively according to different resolutions and colors, write and implement the code using MATLAB software, and conduct the simulation and experimental analysis of the algorithm under the Window 10 operation system.

    We use the images “Lena” in color, “boat” in grayscale,“TestPat-1K,”and“Lena”in grayscale to conduct an encryption simulation experiment. The results are then subjected to the necessary security analysis. Figure 7 displays the encrypted and unencrypted versions of the image.

    Fig. 7. Experimental results. (a) Lena, (b) encryption result, (c) decrypted, (d) boat, (e) encryption result, (f) decrypted, (g) TestPat-1k, (h)encryption result,(i)decrypted,(j)color Lena,(k)encryption result,(l)decrypted.

    5. Security analysis

    In terms of security, there are a number of security requirements such that our algorithm should meet in order to comply with safety standard requirements. To determine whether the algorithm has reliable security through verification, we should conduct the appropriate security verification on the simulation results and the algorithm itself. We should compare numerical results to verify the encryption effect for encryption methods.

    On the algorithm, we analyze common attacks, brute force attacks, statistical attacks, robustness attacks, and some plaintext attacks. The results show that the proposed theory has a high degree of reliability when compared to both experimental and numerical simulation results.

    5.1. Key analysis

    Large key spaces used in the encryption techniques make them resistant to brute-force attacks. The resistance of the key space increases with its size. Therefore,the design algorithm should choose the secret key space with the larger size. There are various components to the algorithm’s key space. This paper’s key space 26×2512×1014×6is much larger than 2100.Because the algorithm’s key is 6 bits,the computer’s precision is 10?14. It takes SHA-512 as its hash function,and the space size is 2512. Thus,in our proposed algorithm,the key space is sufficient to resist all kinds of brute-force attacks.

    5.2. Key sensitivity analysis

    In order to estimate the sensitivity and security of the algorithm, our model achieves high key sensitivity. A small perturbation can significantly change the reconstruction output,and the current encryption result obtained is very different from the result prior to the key change.

    In the simulation, we first choose a secret key value,change it from 0.3801 to 0.380000000001, and then use the two keys to get the two encrypted images of Figs. 8(a) and 8(b). Make a distinction using two encrypted images. In Fig.8(c),the image difference is displayed. The two encryption results are very dissimilar,as shown in Fig.8(c). Finally,we decrypt Fig.8(a)using the modified key,and the result in Fig.8(d)shows that the modified key is unable to decrypt the original key encryption result.

    We again change the secret key information, choose a pixel from the original image matrix,add or subtract 1,modify the pixel value,and then encrypt the image before and after the change,respectively. Figure 8(d)is the pixel value after modification encrypted image.Figure 8(e)is the difference between Figs.8(a)and 8(d).This result shows the extremely strong key sensitivity of the algorithm script in this paper.

    Fig. 8. Sensitivity test. (a) Encrypted with x1(0), (b) encrypted with modified x1(0), (c) difference between (a) and (b), (d) decrypted with modified x1(0),(e)encrypted with modified1-bit pixel,(f)difference between(e)and(a).

    5.3. Statistical analysis

    A series of simulation experiments and numerical analyses are conducted in this section in order to verify the reliability of the algorithm.

    (1)Histogram

    The unprocessed image’s pixel distribution is more concentrated,and because of this,the overall pixel distribution is not uniform, which causes the histogram of the image to be very wavy. The image’s pixels are evenly distributed after encryption,and the histogram can be used to visualize this distribution. The histogram ought to be flat as a result. Inequalities in the distribution of image pixels will be targeted by statistical attacks. A flat and uniform distribution of pixels can therefore withstand statistical analysis well.

    The histogram results of the three different images chosen for the experiment are displayed in Fig.9. The histogram of the encrypted image can be seen in Fig. 9, and exhibits a pixel distribution that is remarkably uniform.

    (2)Correlation comparison

    The unprocessed image has strong pixel correlation, and a statistical analysis attack on a strongly correlated image can easily leak or lose information content. In contrast, the encrypted image breaks up the pixel correlation of the original image, making it well resistant to the statistical type of attack.The encrypted image’s pixel correlation can be decreased through encryption operation. The formulas(16)and(17)[40]are used to calculate the correlation of adjacent pixels in the encrypted image using the Lena graph as the experimental target. Figure 10 displays the correlation’s numerical results. We have

    with

    Calculating the correlation of the ciphertext image yields corresponding data. In the literature, data results have been compared.[41–44]Figure 11 and Table 1 display the comparison results. We can see from the comparison that the correlation coefficient obtained by the algorithm in this paper is actually smaller than the correlation coefficient produced by the algorithm in a number of other documents. Therefore, it can be inferred from the experimental findings and numerical analysis that the encryption algorithm suggested in this paper performs exceptionally well in resisting statistical analysis.

    Fig.9. Histogram of experimental images. (a)Original image of Lenna,(b)encryption image of Lenna,(c)original image of Elaine,(d)encryption image of Elaine,(e)original image of airport,(f)encryption image of airport.

    Fig. 10. Correlation of adjacent pixels: (a)–(c) plaintext image correlation, (d)–(f) ciphertext image correlation. (a) Horizontal correlations, (b) vertical correlations,(c)diagonal correlations,(d)horizontal correlations,(e)vertical correlations,(f)diagonal correlations.

    Fig.11. Ciphertext correlation line graph.

    Table 1. Correlation comparison results of adjacent pixels.

    (3)Information entropy

    Determine the image’s information entropy and,using the information entropy’s specific value, assess the likelihood of information leakage.

    (i)Global information entropy

    The calculation formula of global information entropy is as follows:[39]

    Global information entropy should typically be around 8 wirelessly. The likelihood of leakage decreases with proximity. By comparing the encryption results of the algorithm in this paper with the values in Refs. [41–44], we can see from Tables 2 and 3 that for the encryption results of the algorithm in this paper, the value of global information entropy is better than other similar algorithms, and it is very close to 8, so the probability of information leakage of this algorithm is very low.

    (ii)Local Shannon entropy

    To determine the algorithm’s local information entropy,we use the equation

    The Shannon entropy must be within the range of[7.901515698, 7.903422936] after the algorithm has encrypted the images that satisfy the experimental requirements.This is known as a pass test. Table 4 displays the Shannon entropy values determined by the aforementioned formula following the encryption of the image using the algorithm suggested in this paper.

    Table 2. Information entropy of encrypted image.

    Table 3. Entropy comparison results of encrypted image information.

    Table 5. Local Shannon entropy.

    5.4. The χ2 test

    In this section, we examine the ciphertext images’ pixel distribution. Chi-square detection tests the target quantitatively and yields numerical results that are quantitative, helping to prevent visual misperception. For comparative analysis,we use the formula provided in Ref.[39]as follows:

    Table 6. Uniformity evaluation by chi-square test.

    5.5. Resistance differential attack analysis

    Table 7 compares and analyzes the NPCR and UACI of the encrypted image. In the differential attack evaluation,the closer the NPCR and UACI are to the standard value,the more it proves that the algorithm has higher resistance to attack.Through the data comparison in Table 7,Figs.12 and 13,it can be seen that the algorithm proposed in this paper is relatively excellent in the experimental results of NPCR and UACI. In addition,by comparing with the literature,[46–48]it can be seen that the NPCR and UACI values and pass rate of our algorithm are the best.

    Table 7. Comparison of NPCR(%)values and UACI(%)values.

    Fig.12. NPCR test results.

    Fig.13. UACI test results.

    5.6. Resistance to noise attacks and cropping attacks

    When the data we send includes digital images, the attacker can directly attack the encrypted image to compromise the data’s integrity, obstructing the receiver’s decryption process and preventing the acquisition of accurate decryption information. Through experiments,we simulate various degrees of noise,cropping,and loss attacks,and by decrypting the images that have undergone the attacks, we can obtain images with recognizable information.[49,50]The decryption results through various levels of clipping and noise attacks are shown in Figs.14 and 15,demonstrating how well the algorithm can resist these attacks.

    Fig. 14. Noise experiment. (a) Noise intensity 0.01, (b) noise intensity 0.05, (c) noise intensity 0.1, (d) noise intensity 0.05, (e) 0.01 noise picture decryption,(f)0.05 noise picture decryption,(g)0.1 noise picture decryption,(h)0.01 noise picture decryption.

    Fig.15. Cropping attack experiment: (a)1.526%,(b)6.25%,(c)25%,(d)25%,(e)1.526%,clipping decryption(f)6.25%clipping decryption,(g)25%clipping decryption,(h)25%clipping decryption.

    6. Conclusion

    This paper proposes a novel cosine-based chaotic onedimensional mapping. The chaotic map can meet the requirements of cryptography because of its highly chaotic behavior, wide range of control parameters, and numerous fixed points. In light of the issues in the field of image encryption, we propose a new image encryption scheme based on one-dimensional cosine chaos mapping and doppler wave to synchronous operation of diffusion of image,which improves encryption efficiency and reduces system complexity,and the associated with the same type of algorithm is not found. The plan put forth in this paper is more efficient at encrypting data.The scheme proposed in this paper has better security and can withstand common attacks, which has some industrial value and significance, according to simulation experiments, data analysis,and comparison.

    Acknowledgements

    This project was supported by the National Natural Science Foundation of China (Grant No. 61672124),the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund (Grant No. MMJJ20170203), the Liaoning Provincial Science and Technology Innovation Leading Talents Program (Grant No. XLYC1802013), the Key R&D Project of Liaoning Province (Grant No. 2019020105-JH2/103), Jinan City ‘20 Universities’ Funding Projects Introducing Innovation Team Program (Grant No. 2019GXRC031), Research Fund of Guangxi Key Lab of Multi-source Information Mining&Security(Grant No.MIMS20-M-02).

    猜你喜歡
    興元
    Lossless embedding: A visually meaningful image encryption algorithm based on hyperchaos and compressive sensing
    情系鄉(xiāng)村振興的最美老干部——艾興元
    An image encryption algorithm based on spatiotemporal chaos and middle order traversal of a binary tree
    Force-constant-decayed anisotropic network model: An improved method for predicting RNA flexibility
    Molecular dynamics simulations on the wet/dry self-latching and electric fields triggered wet/dry transitions between nanosheets:A non-volatile memory nanostructure
    A secure image protection algorithm by steganography and encryption using the 2D-TSCC*
    An image encryption algorithm based on improved baker transformation and chaotic S-box?
    Fractal sorting vector-based least significant bit chaotic permutation for image encryption?
    Tip-induced superconductivity commonly existing in the family of transition-metal dipnictides MPn2*
    鳳凰淚
    金沙江文藝(2018年1期)2018-11-14 02:09:33
    亚洲av美国av| 亚洲中文字幕一区二区三区有码在线看 | 九色亚洲精品在线播放| 欧美日本亚洲视频在线播放| 色综合亚洲欧美另类图片| 国产精品av久久久久免费| 在线观看免费午夜福利视频| 久久青草综合色| 黄网站色视频无遮挡免费观看| 日韩成人在线观看一区二区三区| 亚洲人成77777在线视频| 男人操女人黄网站| 亚洲色图综合在线观看| 亚洲全国av大片| 亚洲久久久国产精品| www.www免费av| 国产激情久久老熟女| 两性午夜刺激爽爽歪歪视频在线观看 | 国产日韩一区二区三区精品不卡| 亚洲精品在线美女| 岛国视频午夜一区免费看| 久久天躁狠狠躁夜夜2o2o| 亚洲免费av在线视频| 欧美一级a爱片免费观看看 | 一级a爱视频在线免费观看| 欧美在线黄色| av网站免费在线观看视频| 精品久久蜜臀av无| 曰老女人黄片| 国产蜜桃级精品一区二区三区| 大型av网站在线播放| 狂野欧美激情性xxxx| 搡老熟女国产l中国老女人| 好男人电影高清在线观看| 长腿黑丝高跟| 国产成人一区二区三区免费视频网站| 午夜日韩欧美国产| 午夜影院日韩av| 天天添夜夜摸| 成人国语在线视频| 国产精品国产高清国产av| 国产成人系列免费观看| 91av网站免费观看| 亚洲男人的天堂狠狠| 欧美精品啪啪一区二区三区| 久久婷婷人人爽人人干人人爱 | 亚洲一区二区三区色噜噜| 国产一卡二卡三卡精品| 一区二区三区精品91| 中文字幕最新亚洲高清| 国产成人欧美| 精品久久久久久久毛片微露脸| 国产成人av教育| 看片在线看免费视频| 亚洲精品中文字幕在线视频| 国产成年人精品一区二区| 禁无遮挡网站| 免费观看精品视频网站| 亚洲专区中文字幕在线| 俄罗斯特黄特色一大片| 欧美另类亚洲清纯唯美| 日本黄色视频三级网站网址| 亚洲成人国产一区在线观看| 黄片大片在线免费观看| 久久 成人 亚洲| 精品电影一区二区在线| 精品久久久久久久毛片微露脸| x7x7x7水蜜桃| 日韩精品中文字幕看吧| 色综合亚洲欧美另类图片| 这个男人来自地球电影免费观看| 亚洲精品国产色婷婷电影| 久久国产精品影院| 精品国产美女av久久久久小说| 亚洲国产欧美一区二区综合| 黄色a级毛片大全视频| 999久久久精品免费观看国产| 美女高潮喷水抽搐中文字幕| 18禁黄网站禁片午夜丰满| 丝袜美足系列| 国产又爽黄色视频| www.www免费av| xxx96com| 99国产极品粉嫩在线观看| 成在线人永久免费视频| 欧美中文日本在线观看视频| www日本在线高清视频| 国产又色又爽无遮挡免费看| 麻豆av在线久日| 黑人欧美特级aaaaaa片| 国产精品久久久久久亚洲av鲁大| 满18在线观看网站| 久久人妻av系列| 国产99白浆流出| 99在线人妻在线中文字幕| 可以在线观看的亚洲视频| 一区二区三区国产精品乱码| 村上凉子中文字幕在线| 人成视频在线观看免费观看| 最近最新中文字幕大全电影3 | 最好的美女福利视频网| 一夜夜www| 校园春色视频在线观看| 久久香蕉精品热| 91精品三级在线观看| 久99久视频精品免费| 国产99久久九九免费精品| 亚洲专区中文字幕在线| 亚洲aⅴ乱码一区二区在线播放 | 黄色丝袜av网址大全| 亚洲熟女毛片儿| 亚洲成av片中文字幕在线观看| 中文字幕人妻熟女乱码| 亚洲av成人一区二区三| 国产高清激情床上av| 视频在线观看一区二区三区| 精品久久久久久久人妻蜜臀av | 女人爽到高潮嗷嗷叫在线视频| 久久国产乱子伦精品免费另类| 最近最新中文字幕大全免费视频| www.熟女人妻精品国产| 午夜精品国产一区二区电影| 久久精品国产亚洲av高清一级| 日本三级黄在线观看| 一级黄色大片毛片| or卡值多少钱| 午夜久久久久精精品| 变态另类成人亚洲欧美熟女 | 好看av亚洲va欧美ⅴa在| 亚洲自拍偷在线| 免费人成视频x8x8入口观看| 中文字幕久久专区| 巨乳人妻的诱惑在线观看| 国产精品 国内视频| 黑人欧美特级aaaaaa片| 美女大奶头视频| 中亚洲国语对白在线视频| 久久人人爽av亚洲精品天堂| 此物有八面人人有两片| 久久天躁狠狠躁夜夜2o2o| 我的亚洲天堂| 天天躁夜夜躁狠狠躁躁| 午夜福利在线观看吧| 亚洲欧美日韩高清在线视频| 亚洲伊人色综图| 男女之事视频高清在线观看| 免费观看精品视频网站| 日韩精品免费视频一区二区三区| 日韩有码中文字幕| 日韩国内少妇激情av| 亚洲精品久久成人aⅴ小说| 在线观看免费日韩欧美大片| 91九色精品人成在线观看| avwww免费| 在线观看免费日韩欧美大片| 免费在线观看视频国产中文字幕亚洲| 免费在线观看完整版高清| 国产麻豆成人av免费视频| 欧美绝顶高潮抽搐喷水| 中文字幕人妻丝袜一区二区| 老司机福利观看| 一二三四在线观看免费中文在| www.999成人在线观看| 欧美人与性动交α欧美精品济南到| 午夜日韩欧美国产| 精品人妻在线不人妻| 在线观看午夜福利视频| 国产伦一二天堂av在线观看| 在线永久观看黄色视频| 欧美色欧美亚洲另类二区 | 国产熟女午夜一区二区三区| 亚洲av成人一区二区三| 人人妻人人爽人人添夜夜欢视频| 欧美成人免费av一区二区三区| 黄色成人免费大全| 久久中文字幕人妻熟女| 50天的宝宝边吃奶边哭怎么回事| 午夜福利18| 欧美在线一区亚洲| 国产精品野战在线观看| 国产私拍福利视频在线观看| 欧美色欧美亚洲另类二区 | bbb黄色大片| 岛国在线观看网站| 亚洲人成77777在线视频| 午夜久久久在线观看| 久久婷婷成人综合色麻豆| 91av网站免费观看| 9色porny在线观看| 午夜a级毛片| 真人一进一出gif抽搐免费| 在线观看舔阴道视频| 精品人妻在线不人妻| bbb黄色大片| 国产精品98久久久久久宅男小说| 国内毛片毛片毛片毛片毛片| 国产精品一区二区在线不卡| 成人三级黄色视频| 热99re8久久精品国产| 欧美日韩精品网址| 长腿黑丝高跟| www.熟女人妻精品国产| 97人妻精品一区二区三区麻豆 | 免费在线观看亚洲国产| 妹子高潮喷水视频| 亚洲五月天丁香| 成人欧美大片| 欧美激情 高清一区二区三区| 两人在一起打扑克的视频| av免费在线观看网站| 国产成年人精品一区二区| www国产在线视频色| 夜夜看夜夜爽夜夜摸| 天天添夜夜摸| 可以在线观看毛片的网站| 国产一区在线观看成人免费| 一进一出抽搐动态| 国产一区二区三区视频了| 51午夜福利影视在线观看| 亚洲欧美日韩高清在线视频| 色综合亚洲欧美另类图片| 国产麻豆成人av免费视频| 在线观看66精品国产| 国产精品自产拍在线观看55亚洲| 淫妇啪啪啪对白视频| 亚洲国产毛片av蜜桃av| 亚洲人成伊人成综合网2020| 老汉色∧v一级毛片| 满18在线观看网站| 亚洲一区二区三区不卡视频| 国产黄a三级三级三级人| 午夜福利成人在线免费观看| 国产三级在线视频| 国产精品美女特级片免费视频播放器 | 久久精品影院6| 成熟少妇高潮喷水视频| 好男人电影高清在线观看| 这个男人来自地球电影免费观看| 一边摸一边抽搐一进一出视频| 国产黄a三级三级三级人| 亚洲国产精品久久男人天堂| 久久人人精品亚洲av| a在线观看视频网站| 搡老熟女国产l中国老女人| 国产成年人精品一区二区| 精品日产1卡2卡| 亚洲成人久久性| 色播亚洲综合网| 怎么达到女性高潮| 国产私拍福利视频在线观看| 国产成人啪精品午夜网站| 成人国产一区最新在线观看| 两性夫妻黄色片| 亚洲午夜精品一区,二区,三区| 国产一区二区激情短视频| 法律面前人人平等表现在哪些方面| 12—13女人毛片做爰片一| 免费搜索国产男女视频| 国产精品乱码一区二三区的特点 | 不卡av一区二区三区| 国产一区二区三区综合在线观看| 九色国产91popny在线| 日韩 欧美 亚洲 中文字幕| 日本一区二区免费在线视频| 亚洲国产欧美日韩在线播放| 一本久久中文字幕| 亚洲专区国产一区二区| 一个人观看的视频www高清免费观看 | 国产野战对白在线观看| 亚洲精品美女久久av网站| 日韩欧美在线二视频| 人人妻,人人澡人人爽秒播| tocl精华| 精品少妇一区二区三区视频日本电影| 91av网站免费观看| 女人爽到高潮嗷嗷叫在线视频| 天堂√8在线中文| 国产精品 欧美亚洲| 人人妻人人澡欧美一区二区 | 日韩成人在线观看一区二区三区| 97超级碰碰碰精品色视频在线观看| 精品国产亚洲在线| 满18在线观看网站| 国产免费男女视频| 国产精品av久久久久免费| 日日爽夜夜爽网站| 天堂√8在线中文| 级片在线观看| 两个人免费观看高清视频| 国产麻豆69| 在线观看66精品国产| а√天堂www在线а√下载| 亚洲天堂国产精品一区在线| 自线自在国产av| 亚洲精华国产精华精| 日日摸夜夜添夜夜添小说| 国产av在哪里看| 禁无遮挡网站| 精品国产超薄肉色丝袜足j| 啪啪无遮挡十八禁网站| 曰老女人黄片| 色播亚洲综合网| 成人永久免费在线观看视频| 国产av精品麻豆| 中文字幕av电影在线播放| 在线免费观看的www视频| 欧洲精品卡2卡3卡4卡5卡区| 国产不卡一卡二| 最新在线观看一区二区三区| 国产精品久久久久久亚洲av鲁大| 久久久精品国产亚洲av高清涩受| 97碰自拍视频| 黄色片一级片一级黄色片| 999久久久精品免费观看国产| 两个人视频免费观看高清| 香蕉久久夜色| av在线天堂中文字幕| 丁香六月欧美| 久久久久久久午夜电影| 91精品国产国语对白视频| 亚洲精品美女久久久久99蜜臀| 人妻久久中文字幕网| 色在线成人网| 精品国产一区二区久久| 老熟妇仑乱视频hdxx| 精品欧美国产一区二区三| 亚洲人成网站在线播放欧美日韩| 在线观看午夜福利视频| 中文亚洲av片在线观看爽| av超薄肉色丝袜交足视频| 亚洲va日本ⅴa欧美va伊人久久| 99国产综合亚洲精品| 黄色毛片三级朝国网站| 色综合站精品国产| 丝袜美足系列| 极品教师在线免费播放| 午夜福利影视在线免费观看| 久久人妻福利社区极品人妻图片| 一本大道久久a久久精品| 国产一区二区三区在线臀色熟女| 韩国av一区二区三区四区| 久久久国产精品麻豆| 黄色毛片三级朝国网站| 午夜福利免费观看在线| 色播在线永久视频| or卡值多少钱| 午夜日韩欧美国产| 亚洲九九香蕉| 两性午夜刺激爽爽歪歪视频在线观看 | 久久久久亚洲av毛片大全| 午夜精品久久久久久毛片777| 精品国产超薄肉色丝袜足j| 桃红色精品国产亚洲av| 999久久久精品免费观看国产| 亚洲五月婷婷丁香| 麻豆久久精品国产亚洲av| 一区二区三区精品91| 亚洲三区欧美一区| 国产色视频综合| 亚洲电影在线观看av| 又大又爽又粗| 妹子高潮喷水视频| 在线观看免费午夜福利视频| 乱人伦中国视频| 免费在线观看亚洲国产| 久久国产乱子伦精品免费另类| 欧美黄色淫秽网站| 国产xxxxx性猛交| 精品日产1卡2卡| 国产又色又爽无遮挡免费看| 亚洲第一电影网av| 色综合亚洲欧美另类图片| 国产av一区在线观看免费| 国产主播在线观看一区二区| 久久午夜综合久久蜜桃| 中文字幕人妻丝袜一区二区| 黄色毛片三级朝国网站| av在线天堂中文字幕| 一本综合久久免费| 久久久久久久精品吃奶| 又紧又爽又黄一区二区| 精品欧美国产一区二区三| 麻豆久久精品国产亚洲av| 麻豆国产av国片精品| 亚洲精品中文字幕在线视频| 国产国语露脸激情在线看| 神马国产精品三级电影在线观看 | 别揉我奶头~嗯~啊~动态视频| 色哟哟哟哟哟哟| 久久午夜亚洲精品久久| 亚洲 国产 在线| 亚洲人成伊人成综合网2020| 亚洲国产精品sss在线观看| 老司机午夜福利在线观看视频| 国产xxxxx性猛交| 国产亚洲欧美精品永久| 他把我摸到了高潮在线观看| 正在播放国产对白刺激| 亚洲久久久国产精品| xxx96com| 国产亚洲欧美在线一区二区| 黑人操中国人逼视频| av在线天堂中文字幕| 中文字幕精品免费在线观看视频| 一个人观看的视频www高清免费观看 | 久久精品国产清高在天天线| 人人澡人人妻人| 亚洲av成人av| 国产亚洲精品av在线| 免费看美女性在线毛片视频| 免费无遮挡裸体视频| 又大又爽又粗| 午夜视频精品福利| 国产97色在线日韩免费| 日韩精品免费视频一区二区三区| 欧美大码av| 国产欧美日韩精品亚洲av| 中文字幕av电影在线播放| 国产一区二区三区在线臀色熟女| www日本在线高清视频| 一级片免费观看大全| 一边摸一边做爽爽视频免费| 欧美日韩一级在线毛片| 亚洲自拍偷在线| 成人亚洲精品av一区二区| 日韩欧美一区二区三区在线观看| 日韩大尺度精品在线看网址 | 美女国产高潮福利片在线看| 亚洲精品久久国产高清桃花| 12—13女人毛片做爰片一| 久久这里只有精品19| 涩涩av久久男人的天堂| 亚洲国产中文字幕在线视频| 在线免费观看的www视频| 日日夜夜操网爽| 亚洲性夜色夜夜综合| 757午夜福利合集在线观看| 久久精品91无色码中文字幕| 亚洲一区二区三区色噜噜| 无人区码免费观看不卡| 国产真人三级小视频在线观看| 一级片免费观看大全| 黑人欧美特级aaaaaa片| 琪琪午夜伦伦电影理论片6080| 精品久久久精品久久久| 免费人成视频x8x8入口观看| 久久久久久免费高清国产稀缺| 在线观看日韩欧美| 色在线成人网| 两人在一起打扑克的视频| 日韩精品青青久久久久久| 这个男人来自地球电影免费观看| 美女国产高潮福利片在线看| 久久中文字幕一级| 黄色毛片三级朝国网站| 日本精品一区二区三区蜜桃| 最新在线观看一区二区三区| 伊人久久大香线蕉亚洲五| 久久精品91无色码中文字幕| 亚洲国产精品合色在线| 国产精品精品国产色婷婷| 成人欧美大片| 国产欧美日韩精品亚洲av| 黑人欧美特级aaaaaa片| 午夜免费观看网址| 亚洲欧洲精品一区二区精品久久久| 午夜福利欧美成人| 亚洲一区高清亚洲精品| 色在线成人网| 国产亚洲欧美98| 亚洲精品一区av在线观看| x7x7x7水蜜桃| 伊人久久大香线蕉亚洲五| 可以在线观看的亚洲视频| 神马国产精品三级电影在线观看 | 日本精品一区二区三区蜜桃| 亚洲情色 制服丝袜| 亚洲第一青青草原| √禁漫天堂资源中文www| 亚洲精品久久成人aⅴ小说| 精品久久久久久久久久免费视频| 国产精品爽爽va在线观看网站 | 黄色 视频免费看| 日本撒尿小便嘘嘘汇集6| 日本 av在线| 欧美一级a爱片免费观看看 | 91成年电影在线观看| 日韩精品中文字幕看吧| 国产欧美日韩一区二区精品| 村上凉子中文字幕在线| 91大片在线观看| 露出奶头的视频| 亚洲一区中文字幕在线| 久久香蕉激情| 国产亚洲精品第一综合不卡| 多毛熟女@视频| 免费高清视频大片| 高清在线国产一区| 淫秽高清视频在线观看| 一二三四在线观看免费中文在| 欧美日韩一级在线毛片| 国产不卡一卡二| 免费观看精品视频网站| 日日干狠狠操夜夜爽| 夜夜看夜夜爽夜夜摸| 性少妇av在线| 日本欧美视频一区| √禁漫天堂资源中文www| 国产一卡二卡三卡精品| 国产精品一区二区免费欧美| 亚洲精品美女久久久久99蜜臀| 色av中文字幕| 一区二区三区国产精品乱码| 亚洲人成网站在线播放欧美日韩| 国产av又大| 老熟妇仑乱视频hdxx| 亚洲欧美一区二区三区黑人| 欧美激情久久久久久爽电影 | 亚洲一区二区三区不卡视频| 高清黄色对白视频在线免费看| 国产精品1区2区在线观看.| 亚洲精华国产精华精| 黄网站色视频无遮挡免费观看| 嫁个100分男人电影在线观看| 成人特级黄色片久久久久久久| 精品熟女少妇八av免费久了| 国产亚洲欧美98| 亚洲国产毛片av蜜桃av| 日本在线视频免费播放| 亚洲成av片中文字幕在线观看| 中文字幕av电影在线播放| 日韩欧美免费精品| 老熟妇乱子伦视频在线观看| 国产伦人伦偷精品视频| 欧美精品啪啪一区二区三区| 麻豆av在线久日| 欧美日韩黄片免| 18禁黄网站禁片午夜丰满| av中文乱码字幕在线| 18禁黄网站禁片午夜丰满| 天天躁夜夜躁狠狠躁躁| 精品熟女少妇八av免费久了| 12—13女人毛片做爰片一| 欧美色视频一区免费| 亚洲一区二区三区色噜噜| 免费看十八禁软件| 中文亚洲av片在线观看爽| a在线观看视频网站| 黄网站色视频无遮挡免费观看| 又大又爽又粗| 久久精品亚洲熟妇少妇任你| 免费搜索国产男女视频| 欧美成人午夜精品| 亚洲色图 男人天堂 中文字幕| 亚洲国产欧美日韩在线播放| 在线观看免费午夜福利视频| 亚洲专区中文字幕在线| 精品无人区乱码1区二区| 久久久久亚洲av毛片大全| 性欧美人与动物交配| 欧美在线黄色| 一卡2卡三卡四卡精品乱码亚洲| 国产成人系列免费观看| 法律面前人人平等表现在哪些方面| av欧美777| 欧美大码av| 亚洲精品美女久久久久99蜜臀| 一级毛片精品| 国产一区二区三区综合在线观看| 韩国av一区二区三区四区| 狠狠狠狠99中文字幕| 少妇 在线观看| 国产av又大| 婷婷精品国产亚洲av在线| 精品久久蜜臀av无| 日韩精品青青久久久久久| 国产三级黄色录像| 大香蕉久久成人网| 国产三级在线视频| 亚洲男人的天堂狠狠| 亚洲精品美女久久av网站| 色综合婷婷激情| 母亲3免费完整高清在线观看| 久久久久久免费高清国产稀缺| aaaaa片日本免费| 国产免费av片在线观看野外av| 国产精品电影一区二区三区| 叶爱在线成人免费视频播放| 美女国产高潮福利片在线看| 久久精品成人免费网站| 亚洲精品中文字幕在线视频| 久久这里只有精品19| 久久人人97超碰香蕉20202| aaaaa片日本免费| 亚洲成人精品中文字幕电影| 丰满人妻熟妇乱又伦精品不卡| 十八禁网站免费在线| 91在线观看av| 69av精品久久久久久| 一区二区三区激情视频| 亚洲一卡2卡3卡4卡5卡精品中文| 自线自在国产av| 精品日产1卡2卡| 亚洲男人天堂网一区| 黑人操中国人逼视频| 久久亚洲真实| 一区二区三区高清视频在线| 黄色片一级片一级黄色片| 日本欧美视频一区| 久久国产精品人妻蜜桃| 露出奶头的视频| 九色亚洲精品在线播放| 别揉我奶头~嗯~啊~动态视频| 亚洲国产精品999在线| 国产高清videossex|