UM

Browse/Search Results:  1-10 of 18 Help

Selected(0)Clear Items/Page:    Sort:
A cloud image data protection algorithm with multilevel encryption scheme and automated- selection mechanism Journal article
Applied Sciences (Switzerland), 2019,Volume: 9,Issue: 23
Authors:  Shih-Yu Li;  Miguel Angel Benalcázar Hernández;  Lap-Mou Tam;  Chin-Sheng Chen
Favorite |  | TC[WOS]:1 TC[Scopus]:1 | Submit date:2021/03/09
Smart Automation  Cyberphysical Systems  Cloud Data Protection  Cryptography  
Sine Chaotification Model for Enhancing Chaos and Its Hardware Implementation Journal article
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2019,Volume: 66,Issue: 2,Page: 1273-1284
Authors:  Hua, Zhongyun;  Zhou, Binghang;  Zhou, Yicong
Favorite |  | TC[WOS]:64 TC[Scopus]:67 | Submit date:2018/10/30
Chaotic System  Chaotification  Chaos-based Application  Cryptography  Field-programmable Gate Array (Fpga) Implementation  Nonlinear Control  
A RFID Anonymous Grouping Proof Protocol Using Dual-Layer Verification 一种采用双层校验的RFID离线匿名群证明协议 Journal article
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2018,Volume: 55,Issue: 12,Page: 2674-2684
Authors:  Zhou Z.;  Wang G.;  Liu Q.;  Jia W.
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/04/04
Anonymous  Elliptic curve cryptography  Grouping-proof  Privacy  RFID security  
Design of Highly Nonlinear Substitution Boxes Based on I-Ching Operators Journal article
IEEE TRANSACTIONS ON CYBERNETICS, 2018,Volume: 48,Issue: 12,Page: 3349-3358
Authors:  Zhang, Tong;  Chen, C. L. Philip;  Chen, Long;  Xu, Xiangmin;  Hu, Bin
Favorite |  | TC[WOS]:105 TC[Scopus]:119 | Submit date:2019/01/17
Boolean Function  I-ching  I-ching Operators 23 (Icos)  Periodic Iterated Function (Pif)  Substitution Box (s-Box)  
Optimal LSBs-based quantum watermarking with lower distortion Journal article
International Journal of Quantum Information, 2018,Volume: 16,Issue: 7
Authors:  Zhou R.-G.;  Hu W.W.;  Luo G.F.;  Fan P.;  Ian H.
Favorite |  | TC[WOS]:3 TC[Scopus]:4 | Submit date:2019/04/08
Computational Complexity  Lsbs Steganography  Optimal Lsbs Based  Quantum Watermarking  Visual Effect  
Combination of Sharing Matrix and Image Encryption for Lossless (k,n)-Secret Image Sharing Journal article
IEEE Transactions on Image Processing, 2017,Volume: 26,Issue: 12,Page: 5618-5631
Authors:  Bao L.;  Yi S.;  Zhou Y.
Favorite |  | TC[WOS]:29 TC[Scopus]:34 | Submit date:2018/12/21
image encryption  Secret image sharing  sharing matrix  visual cryptography  
Combination of Sharing Matrix and Image Encryption for Lossless (k, n)-Secret Image Sharing Journal article
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2017,Volume: 26,Issue: 12,Page: 5618-5631
Authors:  Bao, Long;  Yi, Shuang;  Zhou, Yicong
Favorite |  | TC[WOS]:29 TC[Scopus]:34 | Submit date:2018/10/30
Secret Image Sharing  Visual Cryptography  Sharing Matrix  Image Encryption  
An image encryption system based on 2-dimensional quantum random walks Conference paper
International Conference on Wavelet Analysis and Pattern Recognition
Authors:  Li L.;  Pang B.;  Tang Y.
Favorite |  | TC[WOS]:0 TC[Scopus]:2 | Submit date:2019/02/11
Image Encryption  Pseudo-Random Number Generator  Quantum Random Walk  
AN IMAGE ENCRYPTION SYSTEM BASED ON 2-DIMENSIONAL QUANTUM RANDOM WALKS Conference paper
Authors:  Li, Lingfeng;  Pang, Bo;  Tang, Yuanyan;  IEEE
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2018/10/30
Quantum Random Walk  Image Encryption  Pseudo-Random Number Generator  
Embedding cryptographic features in compressive sensing Journal article
Neurocomputing, 2016,Volume: 205,Page: 472
Authors:  Yushu Zhang;  Jiantao Zhou;  Fei Chen;  Leo Yu Zhang;  Kwok-Wo Wong;  Xing He;  Di Xiao
Favorite |  | TC[WOS]:72 TC[Scopus]:84 | Submit date:2018/10/30
Parallel Compressive Sensing  Random Permutation  Secure Compressive Sensing  Symmetric-key Cipher