Wei Feng

ORCID: 0000-0003-3023-5225
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Chaos-based Image/Signal Encryption
  • Advanced Steganography and Watermarking Techniques
  • Nonlinear Waves and Solitons
  • Soil Moisture and Remote Sensing
  • Cellular Automata and Applications
  • Nonlinear Photonic Systems
  • Chaos control and synchronization
  • Cryptographic Implementations and Security
  • Additive Manufacturing Materials and Processes
  • Advanced Memory and Neural Computing
  • Coding theory and cryptography
  • Geophysical Methods and Applications
  • Additive Manufacturing and 3D Printing Technologies
  • Fractional Differential Equations Solutions
  • Advanced Vision and Imaging
  • DNA and Biological Computing
  • Advanced Mathematical Physics Problems
  • Differential Equations and Numerical Methods
  • Image Processing Techniques and Applications
  • Welding Techniques and Residual Stresses
  • Industrial Vision Systems and Defect Detection
  • stochastic dynamics and bifurcation
  • Algebraic structures and combinatorial models
  • Analytical Chemistry and Sensors
  • Seismic Waves and Analysis

Panzhihua University
2018-2025

Chongqing Jiaotong University
2025

Beijing Institute of Technology
2018-2024

Hohai University
2023-2024

North China Electric Power University
2024

Zhejiang University of Technology
2012-2022

Shenzhen Institutes of Advanced Technology
2022

Hunan Institute of Science and Technology
2019-2021

Hangzhou Dianzi University
2020

Wuhan University
2011-2019

Chaos-based image encryption has become a prominent area of research in recent years. In comparison to ordinary chaotic systems, fractional-order systems tend have greater number control parameters and more complex dynamical characteristics. Thus, an increasing researchers are introducing enhance the security chaos-based encryption. However, their suggested algorithms still suffer from some security, practicality, efficiency problems. To address these problems, we first constructed new 3D...

10.3390/fractalfract7120887 article EN cc-by Fractal and Fractional 2023-12-16

Image encryption is an effective way to protect image data. However, existing algorithms are still unable strike a good balance between security and efficiency. To overcome the shortcomings of these algorithms, algorithm based on plane-level filtering discrete logarithmic transformation (IEA-IF-DLT) proposed. By utilizing hash value more rationally, our proposed IEA-IF-DLT avoids overhead caused by repeated generations chaotic sequences further improves efficiency through three-dimensional...

10.3390/math10152751 article EN cc-by Mathematics 2022-08-03

Chaos-based encryption is promising for safeguarding digital images. Nonetheless, existing chaos-based algorithms still exhibit certain shortcomings. Given this, we propose a novel multi-channel image algorithm that leverages pixel reorganization and hyperchaotic maps (MIEA-PRHM). Our MIEA-PRHM employs two to jointly generate chaotic sequences, ensuring larger key space better randomness. During the process, first convert input images into fused matrices through reorganization. Then, apply...

10.3390/math12243917 article EN cc-by Mathematics 2024-12-12

In this digital era, social images are the most vital information carrier on multimedia platforms. More and more users interested in sharing with mobile terminals Social image also faces potential risks from malicious use, such as illegal sharing, piracy, misappropriation. This paper mainly concentrates secure sharing. To address how to share a safe way, security scheme is proposed. The technology addresses problem active tracing problem. First, discrete wavelet transform (DWT) performed...

10.3390/e27030276 article EN cc-by Entropy 2025-03-06

Over the past few years, chaotic image encryption has gained extensive attention. Nevertheless, current studies on still possess certain constraints. To break these constraints, we initially created a two-dimensional enhanced logistic modular map (2D-ELMM) and subsequently devised scheme based vector-level operations 2D-ELMM (CIES-DVEM). In contrast to some recent schemes, CIES-DVEM features remarkable advantages in several aspects. Firstly, is not only simpler structure, but its performance...

10.3390/e25081147 article EN cc-by Entropy 2023-07-31

In recent years, many scholars have been committed to improving the security and practicability of chaotic image encryption. addition, their proposed schemes mainly focus on two aspects, new or improved systems encryption processes. However, according cryptanalysis works scholars, processes deserve more attentions. this paper, a recently reported scheme named 2D logistic-adjusted-sine-map-based is comprehensively investigated, some security, practicability, rationality problems are found....

10.1109/access.2019.2893760 article EN cc-by-nc-nd IEEE Access 2019-01-01

Nowadays, the utilization of memristors to enhance dynamical properties chaotic systems has become a popular research topic. In this paper, we present design novel 2D memristor-enhanced polynomial hyper-chaotic map (2D-MPHM) by utilizing cross-coupling two TiO2 memristors. The 2D-MPHM were investigated using Lyapunov exponents, bifurcation diagrams, and trajectory diagrams. Additionally, Kolmogorov entropy sample also employed evaluate complexity 2D-MPHM. Numerical analysis demonstrated...

10.3390/mi14112090 article EN cc-by Micromachines 2023-11-12

In the application and promotion of UAV in future, remote sensing image information is transmitted frequently, its security issues will not be ignored. Aiming at privacy problem portrait images, this paper proposes a face protection technology scheme based on chaos DNA cryptography. Firstly, edge recognition detection used to identify information, corresponding matrix selected as object selective encryption. Then, hash eigenvalues encrypted are extracted, plaintext-associated chaotic...

10.1016/j.jksuci.2023.101871 article EN cc-by Journal of King Saud University - Computer and Information Sciences 2023-12-07

Abstract Most of the existing spatial domain image encryption techniques suffer from difficulty resisting cryptographic attacks. For this reason, paper proposes a frequency-domain based digital scheme by combining Integer Wavelet Transform (IWT), three-dimensional S-box and chaotic system. First, plaintext is decomposed into different frequency subbands IWT to map domain. Second, hash value selected as dynamic key, pseudo-random sequences with associations are generated, which used for each...

10.1088/1402-4896/ad30ec article EN Physica Scripta 2024-03-06

A multisection model is presented to simulate electromagnetic wave propagation in an unmatched time domain reflectometry (TDR) probe and layered soil system. The uses a linear‐time‐invariant feedback system each section links bottom‐up fashion. Multiple sections can be incorporated this by simple extension of single‐section An TDR modeled dividing it into equivalent matching the simulated waveform with actual waveform. excellent match between recorded waveforms verifies model. This...

10.1029/1999wr900123 article EN Water Resources Research 1999-08-01

In recent years, many researchers have leveraged various memristors to design novel memristive chaotic systems with complex dynamics. Compared other systems, applying these image encryption is expected solve some key problems in this field. Therefore, exploiting a recently reported system, paper proposes scheme based on the system and combining bidirectional bit-level cyclic shift dynamic DNA-level diffusion (IES-M-BD). First, discrete map employed generate sequences. Then, plaintext shifted...

10.3389/fphy.2022.963795 article EN cc-by Frontiers in Physics 2022-08-10

Large-scale surface soil moisture (SSM) distribution is very necessary for agricultural drought monitoring, water resource management, and climate change research. However, the current large-scale SSM products have relatively coarse spatial resolution, which limits their application. In this study, we estimate 1 km daily in China based on ensemble learning using a multi-source data set including situ measurements from 2980 meteorological stations, MODIS Surface Reflectance products, SMAP...

10.3390/rs15112786 article EN cc-by Remote Sensing 2023-05-26

This paper presents a low-cost low-power CMOS humidity sensor for passive RFID sensing applications. The element is implemented in standard technology without any further post-processing, which results low fabrication costs. interface of this employs PLL-based architecture transferring signal processing from the voltage domain to frequency domain. Therefore allows use fully digital circuit, can operate on ultra-low supply and thus achieves consumption. proposed has been fabricated TSMC 0.18...

10.3390/s140508728 article EN cc-by Sensors 2014-05-16

Robust chaos in the discrete system is suggested to have practical as well theoretical importance since it can obtain reliable operation chaotic mode. However, receives only moderate attention and focuses on a finite parameter space small Lyapunov exponents. This paper introduces two-dimensional smooth map studies its robustness of infinite space. Then, compound operation-based optimization control method introduced increase complexity measure exponent. The simple provides new pathway for...

10.1109/access.2019.2950457 article EN cc-by IEEE Access 2019-01-01

According to the research works of literatures on chaotic cryptanalysis, many recent image encryption algorithms cannot resist chosen-plaintext attack. Although some introduce plain-image information, they still violate design requirements modern cryptosystems. Therefore, after analyzing related encryption, we propose a plain-image-related algorithm based deoxyribonucleic acid (DNA) sequence operation and discrete logarithm. As know, logarithm calculation is complex non-linear calculation,...

10.1109/access.2019.2959137 article EN cc-by IEEE Access 2019-01-01
Coming Soon ...