UM

Browse/Search Results:  1-4 of 4 Help

Selected(0)Clear Items/Page:    Sort:
Cosine-transform-based chaotic system for image encryption Journal article
Hua, Zhongyun, Zhou, Yicong, Huang, Hejiao. Cosine-transform-based chaotic system for image encryption[J]. Information Sciences, 2019, 480, 403-419.
Authors:  Hua, Zhongyun;  Zhou, Yicong;  Huang, Hejiao
Favorite | TC[WOS]:511 TC[Scopus]:591  IF:0/0 | Submit date:2022/05/23
Chaos-based Encryption  Chaotic System  Cryptography  Image Encryption  Image Privacy  Security Analysis  
Sine Chaotification Model for Enhancing Chaos and Its Hardware Implementation Journal article
Hua, Zhongyun, Zhou, Binghang, Zhou, Yicong. Sine Chaotification Model for Enhancing Chaos and Its Hardware Implementation[J]. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2019, 66(2), 1273-1284.
Authors:  Hua, Zhongyun;  Zhou, Binghang;  Zhou, Yicong
Favorite | TC[WOS]:177 TC[Scopus]:198  IF:7.5/8.0 | Submit date:2018/10/30
Chaotic System  Chaotification  Chaos-based Application  Cryptography  Field-programmable Gate Array (Fpga) Implementation  Nonlinear Control  
Cryptanalysis and Improvement of a Chaos-Based Watermarking Scheme Journal article
Chen, Lei, Chen, Junxin, Zhao, Geng, Wang, Shihong. Cryptanalysis and Improvement of a Chaos-Based Watermarking Scheme[J]. IEEE Access, 2019, 7, 97549-97565.
Authors:  Chen, Lei;  Chen, Junxin;  Zhao, Geng;  Wang, Shihong
Favorite | TC[WOS]:12 TC[Scopus]:16  IF:3.4/3.7 | Submit date:2022/05/23
Chaotic Cryptography  Cryptanalysis  Feature Codes  Image Security  Secure Watermarking  
Asymptotic model of deterministic randomness and its application to secure communications Journal article
Zhou J., Pei W., Wang K., He Z., Au O.. Asymptotic model of deterministic randomness and its application to secure communications[J]. WSEAS Transactions on Circuits and Systems, 2006, 5(3), 305-310.
Authors:  Zhou J.;  Pei W.;  Wang K.;  He Z.;  Au O.
Favorite |  | Submit date:2018/12/22
Chaotic cryptography  Deterministic randomness  Lissajous map