Guodong Ye

ORCID: 0000-0003-4222-1824
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Chaos-based Image/Signal Encryption
  • Advanced Steganography and Watermarking Techniques
  • Digital Media Forensic Detection
  • Cellular Automata and Applications
  • Mathematical Dynamics and Fractals
  • Cryptographic Implementations and Security
  • Coding theory and cryptography
  • Sparse and Compressive Sensing Techniques
  • Advanced Image Processing Techniques
  • DNA and Biological Computing
  • Face and Expression Recognition
  • Blockchain Technology Applications and Security
  • Fuzzy Systems and Optimization
  • Network Security and Intrusion Detection
  • Advanced Image and Video Retrieval Techniques
  • Image and Video Stabilization
  • Ferroptosis and cancer prognosis
  • Cancer Cells and Metastasis
  • Optical Polarization and Ellipsometry
  • Educational Technology and Pedagogy
  • Optimization and Mathematical Programming
  • Cybercrime and Law Enforcement Studies
  • Blind Source Separation Techniques
  • Biometric Identification and Security
  • Nutrition and Health in Aging

Lanzhou University
2017-2025

Guangdong Ocean University
2015-2024

Wuhan University of Technology
2022

American Jewish Committee
2022

Shenzhen University
2022

Deakin University
2022

Guangzhou Medical University
2021

State Key Laboratory of Respiratory Disease
2021

Jinan University
2020

Qinghai University Affiliated Hospital
2019

10.1016/j.patrec.2009.11.008 article EN Pattern Recognition Letters 2009-11-17

10.1007/s11042-012-1331-6 article EN Multimedia Tools and Applications 2012-12-28

This paper proposes an image encryption algorithm based on a chaotic map and information entropy. Unlike Fridrich’s structure, the proposed method contains permutation, modulation, diffusion (PMD) operations. avoids shortcoming in traditional schemes of strictly shuffling pixel positions before encryption. Information entropy is employed to influence generation keystream. The initial keys used permutation stages interact with each other. As result, acts as indivisible entity enhance...

10.1142/s0218127418500104 article EN International Journal of Bifurcation and Chaos 2018-01-01

A new improved three-dimensional continuous chaotic system (ImproBsys) is designed in this paper. It can achieve from an ordinary state to a hyperchaotic state, that is, behavior tends become more complex. Furthermore, by using ImproBsys, paper proposes double image encryption algorithm based on compressive sensing and public key elliptic curve. First, the two plain images of same size are excuted discrete wavelet transformation (DWT), then DWT coefficients thresholded. Second, quantization...

10.1016/j.aej.2021.12.023 article EN cc-by-nc-nd Alexandria Engineering Journal 2021-12-18

This paper presents a new asymmetric image encryption and hiding algorithm based on SHA-3 compressive sensing. First, to resist the chosen-plaintext attack (CPA) known-plaintext (KPA), is employed calculate hash values of plain image, they are transformed into initial chaotic map. Second, divided blocks which processed by sparse transform, scrambling, measurement, merged. Then quantized scrambled again get an encrypted image. Third, filled with zeros same size as three numbers from hundreds...

10.1016/j.aej.2022.01.015 article EN cc-by-nc-nd Alexandria Engineering Journal 2022-01-13

Traditional image encryption algorithms transform a plain into noise-like image. To lower the chances for encrypted being detected by attacker during transmission, visually meaningful scheme is suggested to hide using another carrier This paper proposes algorithm that hides secret and digital signature which provides authenticity confidentiality. The recovered used purpose of identity authentication while protect its Least Significant Bit (LSB) method embed on Lifting Wavelet Transform (LWT)...

10.1016/j.dcan.2022.04.028 article EN cc-by-nc-nd Digital Communications and Networks 2022-05-04

10.1016/j.cnsns.2014.04.012 article EN Communications in Nonlinear Science and Numerical Simulation 2014-04-24

Herein, an asymmetric image encryption algorithm based on RSA cryptosystem and a fractional-order chaotic system is proposed. Its security depends algorithm. First, pair of public private keys generated by Subsequently, random message shown as plaintext key information encrypted the to achieve ciphertext information. Next, new transformation map established generate initial according substituted into fractional hyperchaotic equation calculate keystream. Finally, permutation diffusion...

10.1142/s0218127420502338 article EN International Journal of Bifurcation and Chaos 2020-12-09

Rationale: The prognosis of gastric cancer (GC) patients is poor, and there limited therapeutic efficacy due to genetic heterogeneity difficulty in early-stage screening. Here, we developed validated an individualized gene set-based prognostic signature for (GPSGC) further explored survival-related regulatory mechanisms as well targets GC. Methods: By implementing machine learning, a model was established based on expression datasets from 1699 five independent cohorts with reported full...

10.7150/thno.47938 article EN cc-by Theranostics 2020-01-01

In this paper, an effective framework for chaotic encryption based on a three-dimensional logistic map is presented together with secure hash algorithm-3 (SHA-3) and electrocardiograph (ECG) signal. Following the analysis of drawbacks, namely, fixed key low sensitivity, some current algorithms, work tries to solve these two problems includes contributions: <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" id="M1"><mml:mo stretchy="false">(</mml:mo><mml:mn...

10.1155/2018/8402578 article EN cc-by Security and Communication Networks 2018-10-21

Abstract Image encryption algorithm is an important telecommunication technology for protecting personal security. In this article, we propose a novel multi‐image visual based on compressive sensing (CS) and Schur decomposition. First, multiple images are sparsed by discrete wavelet transform, the compressed obtained zigzag confusion CS. Second, these combined according to random sequences scrambled again obtain secret image. Third, carrier image subjected two‐level lifting transform where...

10.1002/ett.4071 article EN Transactions on Emerging Telecommunications Technologies 2020-08-10

An asymmetric image encryption algorithm based on integer wavelet transformation (IWT) and Rivest-Shamir-Adleman (RSA) is proposed. Firstly, two plain characteristic parameters (PCP) of the are extracted random numbers chosen. Then, a new parameter model (PTM) constructed to do nonlinear processing for them, three cipher (CCP) got. After applying RSA operation CCP (seen as messages), messages obtained. Secondly, initial value obtaining (IOM) all established, by which values 3D chaotic system...

10.1016/j.aej.2022.10.066 article EN cc-by-nc-nd Alexandria Engineering Journal 2022-11-22
Coming Soon ...