Hefeng Chen

ORCID: 0000-0002-7272-0563
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Chaos-based Image/Signal Encryption
  • Petri Nets in System Modeling
  • Flexible and Reconfigurable Manufacturing Systems
  • Advanced Steganography and Watermarking Techniques
  • Complexity and Algorithms in Graphs
  • Digital Media Forensic Detection
  • Security in Wireless Sensor Networks
  • Geometric and Algebraic Topology
  • Privacy-Preserving Technologies in Data
  • Cloud Data Security Solutions
  • Access Control and Trust
  • Advanced Algorithms and Applications
  • Formal Methods in Verification
  • Real-Time Systems Scheduling
  • IPv6, Mobility, Handover, Networks, Security
  • Generative Adversarial Networks and Image Synthesis
  • Cryptographic Implementations and Security
  • Automated Road and Building Extraction
  • Synthetic Aperture Radar (SAR) Applications and Techniques
  • advanced mathematical theories
  • Text and Document Classification Technologies
  • Military Defense Systems Analysis
  • Advanced Clustering Algorithms Research
  • Artificial Intelligence in Games

Jimei University
2017-2023

Guangdong University of Technology
2006-2023

University of Kassel
2020

Xidian University
2013-2014

Shaoxing University
2011

Henan Agricultural University
2011

Chery Automobile (China)
2009

JPEG steganalysis aims to detect stego images. For some robust steganography methods, in order enhance images' robustness of resisting recompression from lossy channel such SNS or photo sharing websites, steganographer may intentionally recompress cover image several times with quantization matrix targeted channel, which thereby make it possible transmit data for better disguise. In addition, there are huge number images be recompressed various reasons, as processing by tools. Thus a method...

10.1109/tcsvt.2022.3155758 article EN IEEE Transactions on Circuits and Systems for Video Technology 2022-03-02

Blockchain is an emerging technology that promises many exciting applications in various fields, including financial, medical, energy, and logistics management. However, there are still some limitations the existing blockchain framework prevents its widespread adoption commercial world. One important limitation storage requirement, wherein each node has to store a copy of distributed ledger. Thus, as number transactions increases, this requirement grows quadratically, eventually limiting...

10.1155/2019/9060756 article EN cc-by Security and Communication Networks 2019-10-16

10.1016/j.cam.2023.115215 article EN Journal of Computational and Applied Mathematics 2023-03-13

The <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" id="M2"><mml:mrow><mml:mfenced separators="|"><mml:mrow><mml:mi>t</mml:mi><mml:mo>,</mml:mo><mml:mi>n</mml:mi></mml:mrow></mml:mfenced></mml:mrow></mml:math> secret sharing scheme is used to protect the privacy of information by distribution. More specifically, a dealer splits into n shares and distributes them privately participants, in such way that any t or more participants can reconstruct secret, but no group fewer than who...

10.1155/2019/2387358 article EN Security and Communication Networks 2019-04-01

The resource-oriented Petri net (ROPN) modeling method is applied in this paper to model a class of automated manufacturing systems (AMS) named disjunctive and strict single-type AMSs (DS-AMS), where multiple units single resource type are required support processing stage. This more compact intuitive than the existing ones contemporary literature, weighted simple sequential processes with resources. Based on ROPN model, significant result re-proved different way, which succinct...

10.1109/access.2019.2896254 article EN cc-by-nc-nd IEEE Access 2019-01-01

Based on the systems of simple sequential processes with resources (S3PR) model, existing methods involve prohibitive computation to synthesize a deadlock prevention controller for automated manufacturing (AMS). To reduce computation, this work studies problem by using resource-oriented Petri net (ROPN) model. By revealing relationship between bad markings and structural properties an ROPN, it presents method such that can be obtained calculation. controller, each strongly connected subnet...

10.1109/smc.2015.101 article EN 2015-10-01

The supervisor simplification problem for automated manufacturing systems (AMSs) has been receiving increasing attention in recent years. This article uses a well-known class of Petri nets, namely, sequential with shared resources (S4Rs) to model general AMSs. We aim simplify the liveness-enforcing S4R by using concept transition cover (TC). Deadlocks can be characterized kind special structural object called perfect activity circuits (PACs). First, set PACs are defined as TC and its...

10.1109/tsmc.2022.3209156 article EN IEEE Transactions on Systems Man and Cybernetics Systems 2022-10-14

Reversible data hiding (RDH) is a method that allows cover image to be completely recovered from its corresponding stego without distortion after the embedded secret messages have been extracted. Prediction-error expansion (PEE), as classic RDH scheme, has studied extensively due high quality of images. Based on prediction errors, threshold values, and relative distances between each bin zero bin, we present bidirectional shift double-way strategy solve multiple embedding problem. Compared...

10.1155/2019/3031506 article EN Security and Communication Networks 2019-12-26

10.4156/ijact.vol4.issue11.4 article International Journal of Advancements in Computing Technology 2012-06-27

Label information in the corresponding semi-supervised fuzzy clustering cannot be used efficiently due to feature redundancy. To address problem, we propose an adaptive approach of selection applied clustering. There are three phases our approach: 1) feature-score by fisher-score; 2) Min Mean Square Error Feature Select criterion; 3) number features is selected criterion. We apply methods. Experiments show that can improve performance.

10.1145/3443467.3443843 article EN Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering 2020-11-06

Group signature schemes are fundamental cryptographic tools. A group scheme allows members of a to anonymously sign messages. To counter misuse, the anonymity can be revoked by manager. The joining operation is critical component scheme, framing attack prevented processes. This paper presents an efficient with simple protocol that based on "single message and response" interaction between prospective user security our Discrete Logarithm assumption Decisional Linear Diffie-Hellman assumption....

10.1109/cc.2014.7004527 article EN China Communications 2014-11-01

Secret image sharing has been widely used in numerous areas such as remote sensing and information security. The goal is to share recover one or more images using several shares. However, most schemes only consider ordered In addition, the dependency between determined, that is, which belongs determined. this paper, by generalized Chinese remainder theorem method, we propose a secret scheme threshold pairs of unordered shares, where t out n are needed original images, even if affiliation...

10.1109/access.2019.2936824 article EN cc-by IEEE Access 2019-01-01

Multisecret sharing schemes have been widely used in the area of information security, such as cloud storage, group authentication, and secure parallel communications. One issues for these is to share recover multisecret from their shareholders. However, existing works consider recovery only when correspondences between secrets shares are definite. In this paper, we propose a scheme two among participants based on generalized Chinese Remainder Theorem (GCRT), where unordered. To overcome...

10.1155/2020/6073721 article EN cc-by Security and Communication Networks 2020-07-14

In this paper, we consider the problem of constructing new plaintext aware encryption in standard model. A hybrid asymmetric scheme is presented using a key encapsulation method and data method. To prove simulatable, put forward some sufficient conditions for judging group to be simulatable. By introducing assumption called linear Diffie-Hellman knowledge assumption, proposed PA2.

10.1504/ijcse.2020.107349 article EN International Journal of Computational Science and Engineering 2020-01-01

Group signature schemes are fundamental cryptographic tools, in which messages allowed to be signed anonymously. Full-traceability and full anonymity two important security requirements for group signatures. Response the misapplication, manager is able revoke anonymity. The joining protocol a crucial ingredient of scheme, if devised carefully, manager's forgery would prevented. This paper presents new efficient scheme with simple possesses properties full-traceability our construction based...

10.1049/cp.2014.0760 article EN 2014-01-01

In this paper, we consider the problem of constructing new plaintext aware encryption in standard model. A hybrid asymmetric scheme is presented using a key encapsulation method and data method. To prove simulatable, put forward some sufficient conditions for judging group to be simulatable. By introducing assumption called linear Diffie-Hellman knowledge assumption, proposed PA2.

10.1504/ijcse.2020.10029387 article EN International Journal of Computational Science and Engineering 2020-01-01

10.1016/j.jvcir.2021.103333 article EN Journal of Visual Communication and Image Representation 2021-10-06
Coming Soon ...