UM

Browse/Search Results:  1-8 of 8 Help

Selected(0)Clear Items/Page:    Sort:
Cryptanalysis of Image Ciphers with Permutation-Substitution Network and Chaos Journal article
Chen, Junxin, Chen, Lei, Zhou, Yicong. Cryptanalysis of Image Ciphers with Permutation-Substitution Network and Chaos[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2021, 31(6), 2494-2508.
Authors:  Chen, Junxin;  Chen, Lei;  Zhou, Yicong
Favorite | TC[WOS]:38 TC[Scopus]:40  IF:8.3/7.1 | Submit date:2021/12/08
Chosen-ciphertext Attack  Permutation Substitution  Bit-wise Xor  Image Encryption  
Universal Chosen-Ciphertext Attack for a Family of Image Encryption Schemes Journal article
Chen, Junxin, Chen, Lei, Zhou, Yicong. Universal Chosen-Ciphertext Attack for a Family of Image Encryption Schemes[J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2020, 23, 2372-2385.
Authors:  Chen, Junxin;  Chen, Lei;  Zhou, Yicong
Favorite | TC[WOS]:39 TC[Scopus]:40  IF:8.4/8.0 | Submit date:2022/05/13
Chosen-ciphertext Attack  Cryptanalysis  Modular Addition  Substitution And Permutation  
Improved known-plaintext attack to permutation-only multimedia ciphers Journal article
Leo Yu Zhang, Yuansheng Liu, Cong Wang, Jiantao Zhou, Yushu Zhang, Guanrong Chen. Improved known-plaintext attack to permutation-only multimedia ciphers[J]. INFORMATION SCIENCES, 2017, 430, 228-239.
Authors:  Leo Yu Zhang;  Yuansheng Liu;  Cong Wang;  Jiantao Zhou;  Yushu Zhang; et al.
Adobe PDF | Favorite | TC[WOS]:60 TC[Scopus]:65  IF:0/0 | Submit date:2018/10/30
Cryptanalysis  Known-plaintext Attack (Kpa)  Multimedia Encryption  Permutation  Transposition  
A test for the complete independence of high-dimensional random vectors Journal article
Li W., Liu Z.. A test for the complete independence of high-dimensional random vectors[J]. Journal of Statistical Computation and Simulation, 2016, 86(16), 3135-3140.
Authors:  Li W.;  Liu Z.
Favorite | TC[WOS]:2 TC[Scopus]:2 | Submit date:2019/02/14
Correlation Matrix  Extreme Value Distribution  High-dimensional  Hypothesis Testing  Permutation Test  
Embedding cryptographic features in compressive sensing Journal article
Yushu Zhang, Jiantao Zhou, Fei Chen, Leo Yu Zhang, Kwok-Wo Wong, Xing He, Di Xiao. Embedding cryptographic features in compressive sensing[J]. Neurocomputing, 2016, 205, 472-480.
Authors:  Yushu Zhang;  Jiantao Zhou;  Fei Chen;  Leo Yu Zhang;  Kwok-Wo Wong; et al.
Adobe PDF | Favorite | TC[WOS]:84 TC[Scopus]:103  IF:5.5/5.5 | Submit date:2018/10/30
Parallel Compressive Sensing  Random Permutation  Secure Compressive Sensing  Symmetric-key Cipher  
Applying a Chaos-Based Firefly Algorithm to the Permutation Flow Shop Scheduling Problem Conference paper
Hui-long Lo, Simon Fong, Yan Zhuang, Xi Wang, Thomas Hanne. Applying a Chaos-Based Firefly Algorithm to the Permutation Flow Shop Scheduling Problem[C]:IEEE, 345 E 47TH ST, NEW YORK, NY 10017 USA, 2016, 51-57.
Authors:  Hui-long Lo;  Simon Fong;  Yan Zhuang;  Xi Wang;  Thomas Hanne
Favorite | TC[WOS]:3 TC[Scopus]:4 | Submit date:2019/02/13
Bio-inspired Optimization Algorithms  Permutation Flow Shop Scheduling Problem  Pfsp  Chaos-based Firefly Algorithm  Pso  Ga  
Image encryption using binary bitplane Journal article
Zhou Yicong, Cao Weijia, Philip Chen C.L.. Image encryption using binary bitplane[J]. Signal Processing, 2014, 100, 197-207.
Authors:  Zhou Yicong;  Cao Weijia;  Philip Chen C.L.
Favorite | TC[WOS]:153 TC[Scopus]:173 | Submit date:2018/10/30
Bit-level Permutation  Bitplane Decomposition  Image Encryption  Security Analysis  
Design of image cipher using latin squares Journal article
Wu Yue, Zhou Yicong, Noonan J.P., Agaian Sos. Design of image cipher using latin squares[J]. Information Sciences, 2014, 264, 317-339.
Authors:  Wu Yue;  Zhou Yicong;  Noonan J.P.;  Agaian Sos
Favorite | TC[WOS]:143 TC[Scopus]:161 | Submit date:2018/10/30
Confusion-diffusion  Error Tolerance  Image Encryption  Latin Square  Substitution-permutation Network