SIGNAL PROCESSINGYe, Guodong Pan, Chen Dong, Youxia Shi, Yang Huang, Xiaoling 出版年:2020
Most current image encryption algorithms encrypt plain images directly into meaningless cipher images. Visually, a few of them are vulnerable to illegal attacks on a few sharing platforms or open channels when being tran...
In this paper, a new and efficient pixel-level image encryption algorithm is presented. In contrast to the traditional permutation-diffusion architecture, the proposed method enhances the connection between position shuf...
Differing from the traditional permutation-diffusion architecture, an efficient symmetric image encryption algorithm is designed in this paper. To resolve the issue of low sensitivity of a plain-image, which is measured ...
The weights of decision makers play an important role in group decision-making problems. Entropy is a very important measure in information science. This work models an approach to determine the weights of decision maker...
This study proposes a quantum logistic image encryption algorithm based on the Rivest-Shamir-Adleman (RSA) and secure hash (SHA-3) algorithms. First, the asymmetric encryption algorithm RSA is used to randomly generate k...
The ranking of interval-valued intuitionistic fuzzy numbers (IVIFNs) is very important for fuzzy decision making problems. This paper presents a geometric approach for ranking IVIFNs. Based on the technique for order per...
ALEXANDRIA ENGINEERING JOURNALYe, Guodong Liu, Min Wu, Mingfa 出版年:2022
A new improved three-dimensional continuous chaotic system (ImproBsys) is designed in this paper. It can achieve from an ordinary chaotic state to a hyperchaotic state, that is, chaotic behavior tends to become more comp...
Image encryption algorithm is an important telecommunication technology for protecting personal security. In this article, we propose a novel multi-image visual encryption algorithm based on compressive sensing (CS) and ...
This paper presents a new asymmetric image encryption and hiding algorithm based on SHA-3 and compressive sensing. First, to resist the chosen-plaintext attack (CPA) and the knownplaintext attack (KPA), SHA-3 is employed...
An extended Vlsekriterijumska optimizacija i KOmpromisno Resenje (VIKOR) method in group decision-making (GDM) setting is developed in this paper. The decision information is characterized by picture fuzzy number. A new ...
EXPERT SYSTEMS WITH APPLICATIONSYe, Guodong Wu, Huishan Liu, Min Shi, Yang 出版年:2022
In this paper, a new improved Lorenz system (ImproLS) is designed with a better behavior due to a larger positive Lyapunov exponent. Then, an asymmetric image encryption scheme is presented based on blind signature and t...
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKINGLiu, Liqun Xu, Bing Zhang, Xiaoping Wu, Xianjun 出版年:2018
In order to improve the effectiveness of intrusion detection, an intrusion detection method of the Internet of Things (IoT) is proposed by suppressed fuzzy clustering (SFC) algorithm and principal component analysis (PCA...
FRONTIERS OF COMPUTER SCIENCEHuang, Xiaoling Dong, Youxia Ye, Guodong Shi, Yang 出版年:2023
A new meaningful image encryption algorithm based on compressive sensing (CS) and integer wavelet transformation (IWT) is proposed in this study. First of all, the initial values of chaotic system are encrypted by RSA al...
This study proposes a divergence-curl-driven framework for the perception of crowd motion states. In this framework, the characteristics of a flow field, divergence and curl, are used to analyze crowd states. As a collec...
SECURITY AND COMMUNICATION NETWORKSPan, Chen Ye, Guodong Huang, Xiaoling Zhou, Junwei 出版年:2019
This paper proposes a new image compression-encryption algorithm based on a meaningful image encryption framework. In block compressed sensing, the plain image is divided into blocks, and subsequently, each block is rend...
CHINESE PHYSICS BYe, Guo-Dong Huang, Xiao-Ling Zhang, Leo Yu Wang, Zheng-Xia 出版年:2017
In this paper, a novel image encryption algorithm is presented based on self-cited pixel summation. With the classical mechanism of permutation plus diffusion, a pixel summation of the plain image is employed to make a g...
SECURITY AND COMMUNICATION NETWORKSYe, Guodong Jiao, Kaixin Pan, Chen Huang, Xiaoling 出版年:2018
In this paper, an effective framework for chaotic encryption based on a three-dimensional logistic map is presented together with secure hash algorithm-3 (SHA-3) and electrocardiograph (ECG) signal. Following the analysi...
INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICSYue, Chuan 出版年:2018
Projection is an important measure in decision science, and it is also often used as a tool for various administrators. However, there are some defects in the existing projection models. To solve this significant scienti...
MULTIMEDIA TOOLS AND APPLICATIONSHuang, Xiaoling Ye, Guodong 出版年:2018
For a gray image, every row (column) can be seen as an irregular wave. Activated by the architecture of permutation-diffusion based image encryption scheme, a chaotic image encryption algorithm is proposed to change the ...
JOURNAL OF INTELLIGENT & FUZZY SYSTEMSYue, Chuan 出版年:2017
Projection can measure not only the distance but also the angle between two decision objects. It has become one of important tools for complex decisions. This research finds that the existing projection formulae are unre...
SECURITY AND COMMUNICATION NETWORKSLin, Riguang Li, Sheng 出版年:2021
This research proposes a new image encryption scheme based on Lorenz hyperchaotic system and Rivest-Shamir-Adleman (RSA) algorithm. Firstly, the initial values of the Lorenz hyperchaotic system are generated by RSA algor...
Group decision-making (GDM) is regarded as a main part of modem decision science. The weights of decision makers (DMs) are very important in the actual GDM process. How to determine the weights of DMs and to identify the...
Projection is a very important measure in decision science. However, this research finds that the existing projection measures are not always reasonable in intuitionistic fuzzy settings. To solve this problem, this work ...
SECURITY AND COMMUNICATION NETWORKSJiao, Kaixin Ye, Guodong Dong, Youxia Huang, Xiaoling He, Jianqing 出版年:2020
This study proposes a new image encryption scheme based on a generalized Arnold map and Rivest-Shamir-Adleman (RSA) algorithm. First, the parameters of the generalized Arnold map are generated by an asymmetric encryption...
Projection measure is one of the most important tools for group decision-making (GDM) problems. However, this research finds that the existing projection measure is not always reasonable in interval-valued intuitionistic...