- Chaos-based Image/Signal Encryption
- Advanced Steganography and Watermarking Techniques
- Digital Media Forensic Detection
- Cellular Automata and Applications
- Mathematical Dynamics and Fractals
- Cryptographic Implementations and Security
- Coding theory and cryptography
- Sparse and Compressive Sensing Techniques
- Advanced Image Processing Techniques
- DNA and Biological Computing
- Face and Expression Recognition
- Blockchain Technology Applications and Security
- Fuzzy Systems and Optimization
- Network Security and Intrusion Detection
- Advanced Image and Video Retrieval Techniques
- Image and Video Stabilization
- Ferroptosis and cancer prognosis
- Cancer Cells and Metastasis
- Optical Polarization and Ellipsometry
- Educational Technology and Pedagogy
- Optimization and Mathematical Programming
- Cybercrime and Law Enforcement Studies
- Blind Source Separation Techniques
- Biometric Identification and Security
- Nutrition and Health in Aging
Lanzhou University
2017-2025
Guangdong Ocean University
2015-2024
Wuhan University of Technology
2022
American Jewish Committee
2022
Shenzhen University
2022
Deakin University
2022
Guangzhou Medical University
2021
State Key Laboratory of Respiratory Disease
2021
Jinan University
2020
Qinghai University Affiliated Hospital
2019
This paper proposes an image encryption algorithm based on a chaotic map and information entropy. Unlike Fridrich’s structure, the proposed method contains permutation, modulation, diffusion (PMD) operations. avoids shortcoming in traditional schemes of strictly shuffling pixel positions before encryption. Information entropy is employed to influence generation keystream. The initial keys used permutation stages interact with each other. As result, acts as indivisible entity enhance...
A new improved three-dimensional continuous chaotic system (ImproBsys) is designed in this paper. It can achieve from an ordinary state to a hyperchaotic state, that is, behavior tends become more complex. Furthermore, by using ImproBsys, paper proposes double image encryption algorithm based on compressive sensing and public key elliptic curve. First, the two plain images of same size are excuted discrete wavelet transformation (DWT), then DWT coefficients thresholded. Second, quantization...
This paper presents a new asymmetric image encryption and hiding algorithm based on SHA-3 compressive sensing. First, to resist the chosen-plaintext attack (CPA) known-plaintext (KPA), is employed calculate hash values of plain image, they are transformed into initial chaotic map. Second, divided blocks which processed by sparse transform, scrambling, measurement, merged. Then quantized scrambled again get an encrypted image. Third, filled with zeros same size as three numbers from hundreds...
Traditional image encryption algorithms transform a plain into noise-like image. To lower the chances for encrypted being detected by attacker during transmission, visually meaningful scheme is suggested to hide using another carrier This paper proposes algorithm that hides secret and digital signature which provides authenticity confidentiality. The recovered used purpose of identity authentication while protect its Least Significant Bit (LSB) method embed on Lifting Wavelet Transform (LWT)...
Herein, an asymmetric image encryption algorithm based on RSA cryptosystem and a fractional-order chaotic system is proposed. Its security depends algorithm. First, pair of public private keys generated by Subsequently, random message shown as plaintext key information encrypted the to achieve ciphertext information. Next, new transformation map established generate initial according substituted into fractional hyperchaotic equation calculate keystream. Finally, permutation diffusion...
Rationale: The prognosis of gastric cancer (GC) patients is poor, and there limited therapeutic efficacy due to genetic heterogeneity difficulty in early-stage screening. Here, we developed validated an individualized gene set-based prognostic signature for (GPSGC) further explored survival-related regulatory mechanisms as well targets GC. Methods: By implementing machine learning, a model was established based on expression datasets from 1699 five independent cohorts with reported full...
In this paper, an effective framework for chaotic encryption based on a three-dimensional logistic map is presented together with secure hash algorithm-3 (SHA-3) and electrocardiograph (ECG) signal. Following the analysis of drawbacks, namely, fixed key low sensitivity, some current algorithms, work tries to solve these two problems includes contributions: <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" id="M1"><mml:mo stretchy="false">(</mml:mo><mml:mn...
Abstract Image encryption algorithm is an important telecommunication technology for protecting personal security. In this article, we propose a novel multi‐image visual based on compressive sensing (CS) and Schur decomposition. First, multiple images are sparsed by discrete wavelet transform, the compressed obtained zigzag confusion CS. Second, these combined according to random sequences scrambled again obtain secret image. Third, carrier image subjected two‐level lifting transform where...
An asymmetric image encryption algorithm based on integer wavelet transformation (IWT) and Rivest-Shamir-Adleman (RSA) is proposed. Firstly, two plain characteristic parameters (PCP) of the are extracted random numbers chosen. Then, a new parameter model (PTM) constructed to do nonlinear processing for them, three cipher (CCP) got. After applying RSA operation CCP (seen as messages), messages obtained. Secondly, initial value obtaining (IOM) all established, by which values 3D chaotic system...