Y Xian, X Wang - Information Sciences, 2021 - Elsevier
This article creatively proposes a class of sorting matrices with fractal characteristics, named the fractal sorting matrix (FSM), and introduces its iterative calculation method. The FSM is …
X Wang, P Liu - IEEE Transactions on Circuits and Systems I …, 2021 - ieeexplore.ieee.org
Since chaotic cryptography has a long-term problem of dynamic degradation, this paper presents proof that chaotic systems resist dynamic degradation through theoretical analysis …
L Teng, X Wang, Y Xian - Information Sciences, 2022 - Elsevier
A two-dimensional cross-mode hyperchaotic map based on logistic and sine maps (2D- CLSS) is presented. The hyperchaotic map consists of a logistic map and two sine maps …
X Wang, S Gao - Information sciences, 2020 - Elsevier
This paper studies chaotic image encryption technology and an application of matrix semi- tensor product theory, and a Boolean network encryption algorithm for a synchronous …
J Yu, W Xie, Z Zhong, H Wang - Chaos, Solitons & Fractals, 2022 - Elsevier
As the application of multimedia technology intensifies recently, more and more attention has been paid to privacy protection in image data. The interest in DNA-based image …
X Wang, Y Su - Signal Processing: Image Communication, 2021 - Elsevier
An image encryption scheme based on a four-wing hyperchaotic system combined with compressed sensing and DNA coding is proposed. The scheme uses compressed sensing …
X Chai, H Wu, Z Gan, D Han, Y Zhang, Y Chen - Information Sciences, 2021 - Elsevier
An efficient visually meaningful double color image encryption algorithm is proposed by combining 2D compressive sensing (CS) with an embedding technique. First, two color …
KC Jithin, S Sankar - Journal of Information Security and Applications, 2020 - Elsevier
The third party misuse and manipulation of digital images is a threat to security and privacy of human subjects. The requirements to fulfil the security needs of digital images have led to …
L Zhu, D Jiang, J Ni, X Wang, X Rong, M Ahmad… - Signal Processing, 2022 - Elsevier
In order to safely and covertly protect the digital image information during public channel transmission and localized storage, a stable image visually secure encryption algorithm by …