In this paper, a new and efficient pixel-level image encryption algorithm is presented. In contrast to the traditional permutation-diffusion architecture, the proposed method enhances the connection between position shuf...
SIGNAL PROCESSINGYe, Guodong Pan, Chen Dong, Youxia Shi, Yang Huang, Xiaoling 出版年:2020
Most current image encryption algorithms encrypt plain images directly into meaningless cipher images. Visually, a few of them are vulnerable to illegal attacks on a few sharing platforms or open channels when being tran...
Differing from the traditional permutation-diffusion architecture, an efficient symmetric image encryption algorithm is designed in this paper. To resolve the issue of low sensitivity of a plain-image, which is measured ...
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOSYe, Guodong Pan, Chen Huang, Xiaoling Zhao, Zhenyu He, Jianqing 出版年:2018
This paper proposes an image encryption algorithm based on a chaotic map and information entropy. Unlike Fridrich's structure, the proposed method contains permutation, modulation, and diffusion (PMD) operations. This me...
The weights of decision makers play an important role in group decision-making problems. Entropy is a very important measure in information science. This work models an approach to determine the weights of decision maker...
FRONTIERS OF COMPUTER SCIENCEHuang, Xiaoling Dong, Youxia Ye, Guodong Shi, Yang 出版年:2023
A new meaningful image encryption algorithm based on compressive sensing (CS) and integer wavelet transformation (IWT) is proposed in this study. First of all, the initial values of chaotic system are encrypted by RSA al...
This study proposes a quantum logistic image encryption algorithm based on the Rivest-Shamir-Adleman (RSA) and secure hash (SHA-3) algorithms. First, the asymmetric encryption algorithm RSA is used to randomly generate k...
ALEXANDRIA ENGINEERING JOURNALYe, Guodong Liu, Min Wu, Mingfa 出版年:2022
A new improved three-dimensional continuous chaotic system (ImproBsys) is designed in this paper. It can achieve from an ordinary chaotic state to a hyperchaotic state, that is, chaotic behavior tends to become more comp...
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOSYe, Guodong Jiao, Kaixin Wu, Huishan Pan, Chen Huang, Xiaoling 出版年:2020
Herein, an asymmetric image encryption algorithm based on RSA cryptosystem and a fractional-order chaotic system is proposed. Its security depends on RSA algorithm. First, a pair of public and private keys is generated b...
This paper presents a new asymmetric image encryption and hiding algorithm based on SHA-3 and compressive sensing. First, to resist the chosen-plaintext attack (CPA) and the knownplaintext attack (KPA), SHA-3 is employed...
The ranking of interval-valued intuitionistic fuzzy numbers (IVIFNs) is very important for fuzzy decision making problems. This paper presents a geometric approach for ranking IVIFNs. Based on the technique for order per...
Image encryption algorithm is an important telecommunication technology for protecting personal security. In this article, we propose a novel multi-image visual encryption algorithm based on compressive sensing (CS) and ...
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKINGLiu, Liqun Xu, Bing Zhang, Xiaoping Wu, Xianjun 出版年:2018
In order to improve the effectiveness of intrusion detection, an intrusion detection method of the Internet of Things (IoT) is proposed by suppressed fuzzy clustering (SFC) algorithm and principal component analysis (PCA...
An extended Vlsekriterijumska optimizacija i KOmpromisno Resenje (VIKOR) method in group decision-making (GDM) setting is developed in this paper. The decision information is characterized by picture fuzzy number. A new ...
SECURITY AND COMMUNICATION NETWORKSYe, Guodong Jiao, Kaixin Pan, Chen Huang, Xiaoling 出版年:2018
In this paper, an effective framework for chaotic encryption based on a three-dimensional logistic map is presented together with secure hash algorithm-3 (SHA-3) and electrocardiograph (ECG) signal. Following the analysi...
SECURITY AND COMMUNICATION NETWORKSLin, Riguang Li, Sheng 出版年:2021
This research proposes a new image encryption scheme based on Lorenz hyperchaotic system and Rivest-Shamir-Adleman (RSA) algorithm. Firstly, the initial values of the Lorenz hyperchaotic system are generated by RSA algor...
This study proposes a divergence-curl-driven framework for the perception of crowd motion states. In this framework, the characteristics of a flow field, divergence and curl, are used to analyze crowd states. As a collec...
In this paper, we present a high-sensitivity homogenous fused-silica low pressure sensor. It was constructed from the commercially available standard silica fiber, fused-silica diaphragm and ferrule through CO2 laser all...
SECURITY AND COMMUNICATION NETWORKSPan, Chen Ye, Guodong Huang, Xiaoling Zhou, Junwei 出版年:2019
This paper proposes a new image compression-encryption algorithm based on a meaningful image encryption framework. In block compressed sensing, the plain image is divided into blocks, and subsequently, each block is rend...
SECURITY AND COMMUNICATION NETWORKSJiao, Kaixin Ye, Guodong Dong, Youxia Huang, Xiaoling He, Jianqing 出版年:2020
This study proposes a new image encryption scheme based on a generalized Arnold map and Rivest-Shamir-Adleman (RSA) algorithm. First, the parameters of the generalized Arnold map are generated by an asymmetric encryption...
APPLIED NUMERICAL MATHEMATICSDu, Hong Chen, Zhong Yang, Tiejun 出版年:2020
A stable least residue method for solving a nonlinear fractional integro-differential equation with a weakly singular kernel in the reproducing kernel space is proposed. To solve the equation, the multiwavelets bases in ...
Most of existing image encryption schemes are proposed in the spatial domain which easily destroys the correlation between pixels. This paper proposes an image encryption scheme by employing discrete cosine transform (DC...
CHINESE PHYSICS BYe, Guo-Dong Huang, Xiao-Ling Zhang, Leo Yu Wang, Zheng-Xia 出版年:2017
In this paper, a novel image encryption algorithm is presented based on self-cited pixel summation. With the classical mechanism of permutation plus diffusion, a pixel summation of the plain image is employed to make a g...
MULTIMEDIA TOOLS AND APPLICATIONSHuang, Xiaoling Ye, Guodong 出版年:2018
For a gray image, every row (column) can be seen as an irregular wave. Activated by the architecture of permutation-diffusion based image encryption scheme, a chaotic image encryption algorithm is proposed to change the ...
IEEE ACCESSTian, Gang Wang, Qibo Zhao, Yi Guo, Lantian Sun, Zhonglin Lv, Liangyu 出版年:2020
With the number of smart contracts growing rapidly, retrieving the relevant smart contracts quickly and accurately has become an important issue. A key step for recognizing the related smart contracts is able to classify...
Objective: In order to avoid the unauthorized access to private images and make a secure communication, an asymmetric image encryption algorithm based on SHA-3 and compressive sensing is proposed.Methods: Firstly, a rand...
INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICSYue, Chuan 出版年:2018
Projection is an important measure in decision science, and it is also often used as a tool for various administrators. However, there are some defects in the existing projection models. To solve this significant scienti...