Zefeng Chen

ORCID: 0000-0003-1817-831X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Chaos-based Image/Signal Encryption
  • Advanced Steganography and Watermarking Techniques
  • Digital Media Forensic Detection
  • Video Analysis and Summarization
  • Cryptography and Data Security
  • Cellular Automata and Applications

University of Electronic Science and Technology of China
2022

Xiamen University of Technology
2015

With the aim of tackling insufficient security in chaotic encryption algorithm for digital images Optical Access Network, a color image scheme combining non-degenerate discrete hyperchaotic system and deoxyribonucleic acid (DNA) dynamic encoding is proposed. First, new constructed with all positive Lyapunov more complex characteristics. Furthermore, key sequence based on generated using plaintext correlation to achieve effect secret key. Next, binary bit-planes permutation performed one...

10.3390/math10173180 article EN cc-by Mathematics 2022-09-03

With the arrival of age big data, amount and types data in process information transmission have increased significantly, full-disk encryption mode used by traditional algorithms has certain limitations times. In order to further improve bandwidth efficiency digital images effectiveness image transmission, this paper proposes an algorithm high-quality restoration using DCT frequency-domain compression coding chaos. Firstly, hash value is for generation key with plaintext correlation, then...

10.1038/s41598-022-20145-3 article EN cc-by Scientific Reports 2022-10-03

In order to further improve the information effectiveness of digital image transmission, an image-encryption algorithm based on 2D-Logistic-adjusted-Sine map (2D-LASM) and Discrete Wavelet Transform (DWT) is proposed. First, a dynamic key with plaintext correlation generated using Message-Digest Algorithm 5 (MD5), 2D-LASM chaos obtain chaotic pseudo-random sequence. Secondly, we perform DWT from time domain frequency decompose low-frequency (LF) coefficient high-frequency (HF) coefficient....

10.3390/e24101332 article EN cc-by Entropy 2022-09-22

The era characterized by an exponential increase in data has led to the widespread adoption of intelligence as a crucial task. Within field mining, frequent episode mining emerged effective tool for extracting valuable and essential information from event sequences. Various algorithms have been developed discover episodes subsequently derive rules using frequency function anti-monotonicity principles. However, currently, there is lack specifically designed that encompass user-specified query...

10.48550/arxiv.2406.05070 preprint EN arXiv (Cornell University) 2024-06-07

Microsoft Office is the most popular office software. document security mainly carried out through encryption by software function. But as new decoding method put forward and computer speed accelerated rapidly, has been questioned. This paper analyzed whole process of 2013 file encryption/decryption, designed a contrast experiment with former version 2010, then cracked respectively password on CPU computing GPU platform brute-force method, experimental data were obtained time indicator. It...

10.1109/icasid.2015.7405655 article EN 2015-09-01
Coming Soon ...