Zobrazeno 1 - 10
of 72
pro vyhledávání: '"Qianxue Wang"'
Publikováno v:
Entropy, Vol 25, Iss 3, p 476 (2023)
Due to the equivalent keys revealed by a chosen-plaintext attack or a chosen-ciphertext attack, most of the existing chaotic image encryption schemes are demonstrated to be insecure. In order to improve security performance, some scholars have recent
Externí odkaz:
https://doaj.org/article/f3877372505948b88ce45f7223ccb1fa
Publikováno v:
Entropy, Vol 25, Iss 3, p 395 (2023)
This paper analyzes the security of an image encryption algorithm based on a two-dimensional hyperchaotic map. This encryption algorithm generated chaotic sequences through a combination of two one-dimensional chaotic maps and used them as the permut
Externí odkaz:
https://doaj.org/article/65b9232d23eb41429dc671d36fc3f230
Security Analysis of the Image Encryption Algorithm Based on a Two-Dimensional Infinite Collapse Map
Publikováno v:
Entropy, Vol 24, Iss 8, p 1023 (2022)
This paper analyzes the security of the image encryption algorithm based on a two-dimensional (2D) infinite collapse map. The encryption algorithm adopts a permutation–diffusion structure and can perform two or more rounds to achieve a higher level
Externí odkaz:
https://doaj.org/article/a83f007366c9499ebb4f6e1e80650fdb
Autor:
Zirui Zhang, Ping Chen, Weijun Li, Xiaoming Xiong, Qianxue Wang, Heping Wen, Songbin Liu, Shuting Cai
Publikováno v:
Entropy, Vol 23, Iss 11, p 1431 (2021)
In actual application scenarios of the real-time video confidential communication, encrypted videos must meet three performance indicators: security, real-time, and format compatibility. To satisfy these requirements, an improved bitstream-oriented e
Externí odkaz:
https://doaj.org/article/20e79b6f029b4a55a2f8c3206fe9f892
Publikováno v:
Multimedia Tools and Applications.
Autor:
Zitong Wang, Ziyu Gao, Yinghong Zheng, Jiayuan Kou, Dan Song, Xue Yu, Bowen Dong, Tianzuo Chen, Yan Yang, Xi Gao, Qianxue Wang, Ting Ye, Wei Yang, Xu Zhang, Hong Li, Liming Yang
Publikováno v:
Journal of Pineal Research. 74
The security analysis of the existing chaotic image encryption algorithm is mainly for the algorithm whose secret keys are independent of plaintext while few crytanalysis on plaintext-related scheme is released. This paper analyzes the security of a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b57f1c8a0aa4c00a02bd27cd37a84ce5
https://doi.org/10.21203/rs.3.rs-2482922/v1
https://doi.org/10.21203/rs.3.rs-2482922/v1
Autor:
Shuting Cai, Weijun Li, Xiaoming Xiong, Liu Songbin, Qianxue Wang, Chen Ping, Zhang Zirui, Heping Wen
Publikováno v:
Entropy, Vol 23, Iss 1431, p 1431 (2021)
Entropy
Volume 23
Issue 11
Entropy
Volume 23
Issue 11
In actual application scenarios of the real-time video confidential communication, encrypted videos must meet three performance indicators: security, real-time, and format compatibility. To satisfy these requirements, an improved bitstream-oriented e
Autor:
Shufeng Huang, Donghua Jiang, Qianxue Wang, Mingwei Guo, Linqing Huang, Weijun Li, Shuting Cai
Publikováno v:
Chaos, Solitons & Fractals. 163:112584
Publikováno v:
Optics Communications. 517:128365