UM

Browse/Search Results:  1-5 of 5 Help

Selected(0)Clear Items/Page:    Sort:
Cosine-transform-based chaotic system for image encryption Journal article
Hua, Zhongyun, Zhou, Yicong, Huang, Hejiao. Cosine-transform-based chaotic system for image encryption[J]. Information Sciences, 2019, 480, 403-419.
Authors:  Hua, Zhongyun;  Zhou, Yicong;  Huang, Hejiao
Favorite | TC[WOS]:512 TC[Scopus]:592  IF:0/0 | Submit date:2022/05/23
Chaos-based Encryption  Chaotic System  Cryptography  Image Encryption  Image Privacy  Security Analysis  
Image encryption using binary bitplane Journal article
Zhou Yicong, Cao Weijia, Philip Chen C.L.. Image encryption using binary bitplane[J]. Signal Processing, 2014, 100, 197-207.
Authors:  Zhou Yicong;  Cao Weijia;  Philip Chen C.L.
Favorite | TC[WOS]:154 TC[Scopus]:173 | Submit date:2018/10/30
Bit-level Permutation  Bitplane Decomposition  Image Encryption  Security Analysis  
A new 1D chaotic system for image encryption Journal article
Zhou Yicong, Bao Long, Chen C.L.P.. A new 1D chaotic system for image encryption[J]. Signal Processing, 2014, 97, 172-182.
Authors:  Zhou Yicong;  Bao Long;  Chen C.L.P.
Favorite | TC[WOS]:636 TC[Scopus]:751 | Submit date:2018/10/30
Chaotic System  Chosen-plaintext Attack  Image Encryption  Security Analysis  
Image encryption using a new parametric switching chaotic system Journal article
Zhou Yicong, Bao Long, Chen C.L.P.. Image encryption using a new parametric switching chaotic system[J]. Signal Processing, 2013, 93(11), 3039-3052.
Authors:  Zhou Yicong;  Bao Long;  Chen C.L.P.
Favorite | TC[WOS]:220 TC[Scopus]:244 | Submit date:2018/10/30
Image Encryption  Parametric Switching Chaotic System  Security Analysis  
Analyzing and verifying Petri net model of security protocol based on Maria Conference paper
Wang Y., Zhou J., Li H., Hao Y.. Analyzing and verifying Petri net model of security protocol based on Maria[C], 2010.
Authors:  Wang Y.;  Zhou J.;  Li H.;  Hao Y.
Favorite | TC[Scopus]:1 | Submit date:2018/12/22
Analysis And Verification  Maria  Petri Net  Security Protocol