Zhai Ping

ORCID: 0009-0003-9742-7683
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Steganography and Watermarking Techniques
  • Digital Media Forensic Detection
  • Chaos-based Image/Signal Encryption
  • Cloud Computing and Resource Management
  • High-Voltage Power Transmission Systems
  • Icing and De-icing Technologies
  • Cryptographic Implementations and Security
  • Lightning and Electromagnetic Phenomena

Qiqihar University
2023-2024

Existing optical information hiding algorithms for multiple images require generating hidden keys embedded images, resulting in the transmission of numerous keys. This challenge undermines usage these low-quality networks. To address this issue and enhance efficiency, we present a multi-image algorithm based on Fourier transformation principles, which is employed to generate frequency maps carrier maps. Specific low-frequency zones are extracted within A chaotic system integrates phase mask,...

10.1364/ao.509301 article EN Applied Optics 2024-01-16

In recent years, in order to meet the huge demand for electricity brought about by economic development, many ultra-high voltage project lines China have been built one after another, alternating vertically and horizontally, gradually forming a large-scale high-voltage trunk line network. transmission world, there is lack of relevant standards operational experience. Lightning strikes as most profound influence on stable operation current line. This paper conducts an in-depth study how...

10.1049/icp.2023.0166 article EN IET conference proceedings. 2023-02-08

To address the problem of weak robustness some current image encryption algorithms, this paper proposes a strong robust algorithm. The Logistic chaotic system is improved to produce more random sequence distribution. plaintext hash used construct initial key and spiral matrix transformation for first scrambling. A novel cross-diffusion method constructed by introducing two values correlation val1 val2. Through sequences, it improves sensitivity, which can resist selective attack, has...

10.1109/cisp-bmei60920.2023.10373275 article EN 2021 14th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI) 2023-10-28

How to maximize embedding capacity is one of the current challenges in field reversible data hiding. A hiding scheme proposed based on rearrangement and compression prediction error bit-planes this paper. The image holder first predicts pixels obtain map, then decomposes them into bit-planes, rearranges compresses space, embeds auxiliary information secret freed space according certain rules generate a cryptographic image. After acquiring image, receiver extracts embedded recovers original...

10.1109/ispa-bdcloud-socialcom-sustaincom59178.2023.00177 article EN 2023-12-21
Coming Soon ...