- Chaos-based Image/Signal Encryption
- Advanced Steganography and Watermarking Techniques
- Nonlinear Waves and Solitons
- Soil Moisture and Remote Sensing
- Cellular Automata and Applications
- Nonlinear Photonic Systems
- Chaos control and synchronization
- Cryptographic Implementations and Security
- Additive Manufacturing Materials and Processes
- Advanced Memory and Neural Computing
- Coding theory and cryptography
- Geophysical Methods and Applications
- Additive Manufacturing and 3D Printing Technologies
- Fractional Differential Equations Solutions
- Advanced Vision and Imaging
- DNA and Biological Computing
- Advanced Mathematical Physics Problems
- Differential Equations and Numerical Methods
- Image Processing Techniques and Applications
- Welding Techniques and Residual Stresses
- Industrial Vision Systems and Defect Detection
- stochastic dynamics and bifurcation
- Algebraic structures and combinatorial models
- Analytical Chemistry and Sensors
- Seismic Waves and Analysis
Panzhihua University
2018-2025
Chongqing Jiaotong University
2025
Beijing Institute of Technology
2018-2024
Hohai University
2023-2024
North China Electric Power University
2024
Zhejiang University of Technology
2012-2022
Shenzhen Institutes of Advanced Technology
2022
Hunan Institute of Science and Technology
2019-2021
Hangzhou Dianzi University
2020
Wuhan University
2011-2019
Chaos-based image encryption has become a prominent area of research in recent years. In comparison to ordinary chaotic systems, fractional-order systems tend have greater number control parameters and more complex dynamical characteristics. Thus, an increasing researchers are introducing enhance the security chaos-based encryption. However, their suggested algorithms still suffer from some security, practicality, efficiency problems. To address these problems, we first constructed new 3D...
Image encryption is an effective way to protect image data. However, existing algorithms are still unable strike a good balance between security and efficiency. To overcome the shortcomings of these algorithms, algorithm based on plane-level filtering discrete logarithmic transformation (IEA-IF-DLT) proposed. By utilizing hash value more rationally, our proposed IEA-IF-DLT avoids overhead caused by repeated generations chaotic sequences further improves efficiency through three-dimensional...
Chaos-based encryption is promising for safeguarding digital images. Nonetheless, existing chaos-based algorithms still exhibit certain shortcomings. Given this, we propose a novel multi-channel image algorithm that leverages pixel reorganization and hyperchaotic maps (MIEA-PRHM). Our MIEA-PRHM employs two to jointly generate chaotic sequences, ensuring larger key space better randomness. During the process, first convert input images into fused matrices through reorganization. Then, apply...
In this digital era, social images are the most vital information carrier on multimedia platforms. More and more users interested in sharing with mobile terminals Social image also faces potential risks from malicious use, such as illegal sharing, piracy, misappropriation. This paper mainly concentrates secure sharing. To address how to share a safe way, security scheme is proposed. The technology addresses problem active tracing problem. First, discrete wavelet transform (DWT) performed...
Over the past few years, chaotic image encryption has gained extensive attention. Nevertheless, current studies on still possess certain constraints. To break these constraints, we initially created a two-dimensional enhanced logistic modular map (2D-ELMM) and subsequently devised scheme based vector-level operations 2D-ELMM (CIES-DVEM). In contrast to some recent schemes, CIES-DVEM features remarkable advantages in several aspects. Firstly, is not only simpler structure, but its performance...
In recent years, many scholars have been committed to improving the security and practicability of chaotic image encryption. addition, their proposed schemes mainly focus on two aspects, new or improved systems encryption processes. However, according cryptanalysis works scholars, processes deserve more attentions. this paper, a recently reported scheme named 2D logistic-adjusted-sine-map-based is comprehensively investigated, some security, practicability, rationality problems are found....
Nowadays, the utilization of memristors to enhance dynamical properties chaotic systems has become a popular research topic. In this paper, we present design novel 2D memristor-enhanced polynomial hyper-chaotic map (2D-MPHM) by utilizing cross-coupling two TiO2 memristors. The 2D-MPHM were investigated using Lyapunov exponents, bifurcation diagrams, and trajectory diagrams. Additionally, Kolmogorov entropy sample also employed evaluate complexity 2D-MPHM. Numerical analysis demonstrated...
In the application and promotion of UAV in future, remote sensing image information is transmitted frequently, its security issues will not be ignored. Aiming at privacy problem portrait images, this paper proposes a face protection technology scheme based on chaos DNA cryptography. Firstly, edge recognition detection used to identify information, corresponding matrix selected as object selective encryption. Then, hash eigenvalues encrypted are extracted, plaintext-associated chaotic...
Abstract Most of the existing spatial domain image encryption techniques suffer from difficulty resisting cryptographic attacks. For this reason, paper proposes a frequency-domain based digital scheme by combining Integer Wavelet Transform (IWT), three-dimensional S-box and chaotic system. First, plaintext is decomposed into different frequency subbands IWT to map domain. Second, hash value selected as dynamic key, pseudo-random sequences with associations are generated, which used for each...
A multisection model is presented to simulate electromagnetic wave propagation in an unmatched time domain reflectometry (TDR) probe and layered soil system. The uses a linear‐time‐invariant feedback system each section links bottom‐up fashion. Multiple sections can be incorporated this by simple extension of single‐section An TDR modeled dividing it into equivalent matching the simulated waveform with actual waveform. excellent match between recorded waveforms verifies model. This...
In recent years, many researchers have leveraged various memristors to design novel memristive chaotic systems with complex dynamics. Compared other systems, applying these image encryption is expected solve some key problems in this field. Therefore, exploiting a recently reported system, paper proposes scheme based on the system and combining bidirectional bit-level cyclic shift dynamic DNA-level diffusion (IES-M-BD). First, discrete map employed generate sequences. Then, plaintext shifted...
Large-scale surface soil moisture (SSM) distribution is very necessary for agricultural drought monitoring, water resource management, and climate change research. However, the current large-scale SSM products have relatively coarse spatial resolution, which limits their application. In this study, we estimate 1 km daily in China based on ensemble learning using a multi-source data set including situ measurements from 2980 meteorological stations, MODIS Surface Reflectance products, SMAP...
This paper presents a low-cost low-power CMOS humidity sensor for passive RFID sensing applications. The element is implemented in standard technology without any further post-processing, which results low fabrication costs. interface of this employs PLL-based architecture transferring signal processing from the voltage domain to frequency domain. Therefore allows use fully digital circuit, can operate on ultra-low supply and thus achieves consumption. proposed has been fabricated TSMC 0.18...
Robust chaos in the discrete system is suggested to have practical as well theoretical importance since it can obtain reliable operation chaotic mode. However, receives only moderate attention and focuses on a finite parameter space small Lyapunov exponents. This paper introduces two-dimensional smooth map studies its robustness of infinite space. Then, compound operation-based optimization control method introduced increase complexity measure exponent. The simple provides new pathway for...
According to the research works of literatures on chaotic cryptanalysis, many recent image encryption algorithms cannot resist chosen-plaintext attack. Although some introduce plain-image information, they still violate design requirements modern cryptosystems. Therefore, after analyzing related encryption, we propose a plain-image-related algorithm based deoxyribonucleic acid (DNA) sequence operation and discrete logarithm. As know, logarithm calculation is complex non-linear calculation,...