UM

Browse/Search Results:  1-10 of 18 Help

Selected(0)Clear Items/Page:    Sort:
Sine Chaotification Model for Enhancing Chaos and Its Hardware Implementation Journal article
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2019,Volume: 66,Issue: 2,Page: 1273-1284
Authors:  Hua, Zhongyun;  Zhou, Binghang;  Zhou, Yicong
Favorite  |  View/Download:45/0  |  Submit date:2018/10/30
Chaotic System  Chaotification  Chaos-based Application  Cryptography  Field-programmable Gate Array (Fpga) Implementation  Nonlinear Control  
Design of Highly Nonlinear Substitution Boxes Based on I-Ching Operators Journal article
IEEE TRANSACTIONS ON CYBERNETICS, 2018,Volume: 48,Issue: 12,Page: 3349-3358
Authors:  Zhang, Tong;  Chen, C. L. Philip;  Chen, Long;  Xu, Xiangmin;  Hu, Bin
Favorite  |  View/Download:3/0  |  Submit date:2019/01/17
Boolean function  I-Ching  I-Ching operators 23 (ICOs)  periodic iterated function (PIF)  substitution box (S-Box)  
Design of highly nonlinear substitution boxes based on I-Ching operators Journal article
IEEE Transactions on Cybernetics, 2018,Volume: 48,Issue: 12,Page: 3349-3358
Authors:  Zhang T.;  Chen C.L.P.;  Chen L.;  Xu X.;  Hu B.
Favorite  |  View/Download:2/0  |  Submit date:2019/02/13
Boolean function  I-Ching  I-Ching operators (ICOs)  periodic iterated function (PIF)  substitution box (S-Box)  
A RFID Anonymous Grouping Proof Protocol Using Dual-Layer Verification 一种采用双层校验的RFID离线匿名群证明协议 Journal article
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2018,Volume: 55,Issue: 12,Page: 2674-2684
Authors:  Zhou Z.;  Wang G.;  Liu Q.;  Jia W.
Favorite  |  View/Download:1/0  |  Submit date:2019/04/04
Anonymous  Elliptic curve cryptography  Grouping-proof  Privacy  RFID security  
Optimal LSBs-based quantum watermarking with lower distortion Journal article
International Journal of Quantum Information, 2018,Volume: 16,Issue: 7
Authors:  Zhou R.-G.;  Hu W.W.;  Luo G.F.;  Fan P.;  Ian H.
Favorite  |  View/Download:0/0  |  Submit date:2019/04/08
computational complexity  LSBs steganography  optimal LSBs based  Quantum watermarking  visual effect  
Combination of Sharing Matrix and Image Encryption for Lossless (k,n)-Secret Image Sharing Journal article
IEEE Transactions on Image Processing, 2017,Volume: 26,Issue: 12,Page: 5618-5631
Authors:  Bao L.;  Yi S.;  Zhou Y.
Favorite  |  View/Download:1/0  |  Submit date:2018/12/21
image encryption  Secret image sharing  sharing matrix  visual cryptography  
Combination of Sharing Matrix and Image Encryption for Lossless (k, n)-Secret Image Sharing Journal article
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2017,Volume: 26,Issue: 12,Page: 5618-5631
Authors:  Bao, Long;  Yi, Shuang;  Zhou, Yicong
Favorite  |  View/Download:9/0  |  Submit date:2018/10/30
Secret Image Sharing  Visual Cryptography  Sharing Matrix  Image Encryption  
An image encryption system based on 2-dimensional quantum random walks Conference paper
International Conference on Wavelet Analysis and Pattern Recognition
Authors:  Li L.;  Pang B.;  Tang Y.
Favorite  |  View/Download:0/0  |  Submit date:2019/02/11
Image Encryption  Pseudo-Random Number Generator  Quantum Random Walk  
AN IMAGE ENCRYPTION SYSTEM BASED ON 2-DIMENSIONAL QUANTUM RANDOM WALKS Conference paper
Authors:  Li, Lingfeng;  Pang, Bo;  Tang, Yuanyan;  IEEE
Favorite  |  View/Download:1/0  |  Submit date:2018/10/30
Quantum Random Walk  Image Encryption  Pseudo-Random Number Generator  
Image encryption using 2D Logistic-adjusted-Sine map Journal article
Information Sciences, 2016,Volume: 339,Page: 237
Authors:  Hua Z.;  Zhou Y.
Favorite  |  View/Download:4/0  |  Submit date:2018/10/30
Chaotic Encryption  Chaotic Map  Confusion And Diffusion  Image Encryption