UM

Browse/Search Results:  1-10 of 27 Help

Selected(0)Clear Items/Page:    Sort:
n-Dimensional Chaotic Map with application in secure communication Journal article
Chaos, Solitons and Fractals, 2022,Volume: 163
Authors:  Cao, Weijia;  Cai, Hang;  Hua, Zhongyun
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2022/11/07
Chaotic Map  Chaotic System  Image Encryption  Lyapunov Exponent  Secure Communication  
Cryptanalysis of Image Ciphers with Permutation-Substitution Network and Chaos Journal article
IEEE Transactions on Circuits and Systems for Video Technology, 2021,Volume: 31,Issue: 6,Page: 2494-2508
Authors:  Chen, Junxin;  Chen, Lei;  Zhou, Yicong
Favorite |  | TC[WOS]:21 TC[Scopus]:18 | Submit date:2021/12/08
Bit-wise Xor  Chosen-ciphertext Attack  Image Encryption  Permutation Substitution  
Cryptanalysis of a chaotic image cipher based on plaintext-related permutation and lookup table Journal article
Nonlinear Dynamics, 2020,Volume: 100,Issue: 4,Page: 3959-3978
Authors:  Chen, Lei;  Chen, Junxin;  Ma, Lisha;  Wang, Shihong
Favorite |  | TC[WOS]:6 TC[Scopus]:6 | Submit date:2021/12/06
Chaotic Cryptograph  Chaotic Dynamics  Chosen-plaintext Attack  Image Cryptanalysis  Latin Square  
Designing a 2D infinite collapse map for image encryption Journal article
Signal Processing, 2020,Volume: 171
Authors:  Cao, Weijia;  Mao, Yujun;  Zhou, Yicong
Favorite |  | TC[WOS]:45 TC[Scopus]:52 | Submit date:2021/12/06
2d Infinite Collapse Map  Confusion And Diffusion  Image Encryption  
Cosine-transform-based chaotic system for image encryption Journal article
Information Sciences, 2019,Volume: 480,Page: 403-419
Authors:  Hua, Zhongyun;  Zhou, Yicong;  Huang, Hejiao
Favorite |  | TC[WOS]:328 TC[Scopus]:358 | Submit date:2022/05/23
Chaos-based Encryption  Chaotic System  Cryptography  Image Encryption  Image Privacy  Security Analysis  
Improved known-plaintext attack to permutation-only multimedia ciphers Journal article
INFORMATION SCIENCES, 2017,Volume: 430,Page: 228-239
Authors:  Leo Yu Zhang;  Yuansheng Liu;  Cong Wang;  Jiantao Zhou;  Yushu Zhang;  Guanrong Chen
Adobe PDF | Favorite |  | TC[WOS]:43 TC[Scopus]:46 | Submit date:2018/10/30
Cryptanalysis  Known-plaintext Attack (Kpa)  Multimedia Encryption  Permutation  Transposition  
Development of Multimedia Encryption Algorithms Using a New Chaotic System for Security and Medical Applications Project
项目类型: SRG, 项目编号: SRG007-FST12-ZYC, 2017-
Authors:  SENGFONG
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2022/02/16
Medical image encryption using edge maps Journal article
Signal Processing, 2017,Volume: 132,Page: 96-109
Authors:  Cao, Weijia;  Zhou, Yicong;  Chen, C. L. Philip;  Xia, Liming
Favorite |  | TC[WOS]:86 TC[Scopus]:109 | Submit date:2018/10/30
Bit-plane Decomposition  Chaotic Map  Dge Map  Medical Image Encryption  
A block compressive sensing based scalable encryption framework for protecting significant image regions Journal article
International Journal of Bifurcation and Chaos, 2016,Volume: 26,Issue: 11
Authors:  Yushu Zhang;  Jiantao Zhou;  Fei Chen;  Leo Yu Zhang;  Di Xiao;  Bin Chen;  Xiaofeng Liao
Favorite |  | TC[WOS]:20 TC[Scopus]:26 | Submit date:2018/12/22
Block Compressive Sensing  Insignificant Block Encryption  Scalable Encryption Framework  Significant Block Encryption  
Bi-level protected compressive sampling Journal article
IEEE Transactions on Multimedia, 2016,Volume: 18,Issue: 9,Page: 1720-1732
Authors:  Leo Yu Zhang;  Kwok-Wo Wong;  Yushu Zhang;  Jiantao Zhou
Adobe PDF | Favorite |  | TC[WOS]:65 TC[Scopus]:65 | Submit date:2018/12/22
Compressive Sampling (Cs)  Encryption  Known/chosen-plaintext Attack  Random Projection  Restricted Isometry Property (Rip)