UM

Browse/Search Results:  1-10 of 19 Help

Selected(0)Clear Items/Page:    Sort:
A cloud image data protection algorithm with multilevel encryption scheme and automated- selection mechanism Journal article
Applied Sciences (Switzerland), 2019,Volume: 9,Issue: 23
Authors:  Shih-Yu Li;  Miguel Angel Benalcázar Hernández;  Lap-Mou Tam;  Chin-Sheng Chen
Favorite |  | TC[WOS]:1 TC[Scopus]:1 | Submit date:2021/03/09
Smart Automation  Cyberphysical Systems  Cloud Data Protection  Cryptography  
Sine Chaotification Model for Enhancing Chaos and Its Hardware Implementation Journal article
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2019,Volume: 66,Issue: 2,Page: 1273-1284
Authors:  Hua, Zhongyun;  Zhou, Binghang;  Zhou, Yicong
Favorite |  | TC[WOS]:60 TC[Scopus]:63 | Submit date:2018/10/30
Chaotic System  Chaotification  Chaos-based Application  Cryptography  Field-programmable Gate Array (Fpga) Implementation  Nonlinear Control  
A RFID Anonymous Grouping Proof Protocol Using Dual-Layer Verification 一种采用双层校验的RFID离线匿名群证明协议 Journal article
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2018,Volume: 55,Issue: 12,Page: 2674-2684
Authors:  Zhou Z.;  Wang G.;  Liu Q.;  Jia W.
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/04/04
Anonymous  Elliptic curve cryptography  Grouping-proof  Privacy  RFID security  
Design of highly nonlinear substitution boxes based on I-Ching operators Journal article
IEEE Transactions on Cybernetics, 2018,Volume: 48,Issue: 12,Page: 3349-3358
Authors:  Zhang T.;  Chen C.L.P.;  Chen L.;  Xu X.;  Hu B.
Favorite |  | TC[WOS]:100 TC[Scopus]:115 | Submit date:2019/02/13
Boolean function  I-Ching  I-Ching operators (ICOs)  periodic iterated function (PIF)  substitution box (S-Box)  
Design of Highly Nonlinear Substitution Boxes Based on I-Ching Operators Journal article
IEEE TRANSACTIONS ON CYBERNETICS, 2018,Volume: 48,Issue: 12,Page: 3349-3358
Authors:  Zhang, Tong;  Chen, C. L. Philip;  Chen, Long;  Xu, Xiangmin;  Hu, Bin
Favorite |  | TC[WOS]:101 TC[Scopus]:115 | Submit date:2019/01/17
Boolean function  I-Ching  I-Ching operators 23 (ICOs)  periodic iterated function (PIF)  substitution box (S-Box)  
Optimal LSBs-based quantum watermarking with lower distortion Journal article
International Journal of Quantum Information, 2018,Volume: 16,Issue: 7
Authors:  Zhou R.-G.;  Hu W.W.;  Luo G.F.;  Fan P.;  Ian H.
Favorite |  | TC[WOS]:3 TC[Scopus]:4 | Submit date:2019/04/08
computational complexity  LSBs steganography  optimal LSBs based  Quantum watermarking  visual effect  
Combination of Sharing Matrix and Image Encryption for Lossless (k, n)-Secret Image Sharing Journal article
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2017,Volume: 26,Issue: 12,Page: 5618-5631
Authors:  Bao, Long;  Yi, Shuang;  Zhou, Yicong
Favorite |  | TC[WOS]:27 TC[Scopus]:31 | Submit date:2018/10/30
Secret Image Sharing  Visual Cryptography  Sharing Matrix  Image Encryption  
Combination of Sharing Matrix and Image Encryption for Lossless (k,n)-Secret Image Sharing Journal article
IEEE Transactions on Image Processing, 2017,Volume: 26,Issue: 12,Page: 5618-5631
Authors:  Bao L.;  Yi S.;  Zhou Y.
Favorite |  | TC[WOS]:27 TC[Scopus]:31 | Submit date:2018/12/21
image encryption  Secret image sharing  sharing matrix  visual cryptography  
An image encryption system based on 2-dimensional quantum random walks Conference paper
International Conference on Wavelet Analysis and Pattern Recognition
Authors:  Li L.;  Pang B.;  Tang Y.
Favorite |  | TC[WOS]:0 TC[Scopus]:1 | Submit date:2019/02/11
Image Encryption  Pseudo-Random Number Generator  Quantum Random Walk  
AN IMAGE ENCRYPTION SYSTEM BASED ON 2-DIMENSIONAL QUANTUM RANDOM WALKS Conference paper
Authors:  Li, Lingfeng;  Pang, Bo;  Tang, Yuanyan;  IEEE
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2018/10/30
Quantum Random Walk  Image Encryption  Pseudo-Random Number Generator