Lvchen Cao

Orcid: 0000-0002-6227-9639

According to our database1, Lvchen Cao authored at least 30 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
TCPCNet: a transformer-CNN parallel cooperative network for low-light image enhancement.
Multim. Tools Appl., May, 2024

Adaptive enhancement of cataractous retinal images for contrast standardization.
Medical Biol. Eng. Comput., February, 2024

TSSFN: Transformer-based self-supervised fusion network for low-quality fundus image enhancement.
Biomed. Signal Process. Control., 2024

2023
Pairwise open-sourced dataSet protection based on adaptive blind watermarking.
Appl. Intell., July, 2023

Exploiting 3D fractal cube and chaos for effective multi-image compression and encryption.
J. King Saud Univ. Comput. Inf. Sci., March, 2023

Double Color Image Visual Encryption Based on Digital Chaos and Compressed Sensing.
Int. J. Bifurc. Chaos, March, 2023

Retinal image enhancement with artifact reduction and structure retention.
Pattern Recognit., 2023

2022
Machine Learning-Based Similarity Attacks for Chaos-Based Cryptosystems.
IEEE Trans. Emerg. Top. Comput., 2022

An image encryption scheme based on particle swarm optimization algorithm and hyperchaotic system.
Soft Comput., 2022

Image encryption using chaotic map and cellular automata.
Multim. Tools Appl., 2022

Cryptanalyzing a Feistel Chaotic Block Cryptosystem Based on Correlation Power Analysis.
Int. J. Bifurc. Chaos, 2022

2021
A multi-scale image watermarking based on integer wavelet transform and singular value decomposition.
Expert Syst. Appl., 2021

Detail-richest-channel based enhancement for retinal image and beyond.
Biomed. Signal Process. Control., 2021

2020
Retinal image enhancement using low-pass filtering and α-rooting.
Signal Process., 2020

Image encryption algorithm using chaotic maps and cellular automata.
EAI Endorsed Trans. Security Safety, 2020

Enhancement of blurry retinal image based on non-uniform contrast stretching and intensity transfer.
Medical Biol. Eng. Comput., 2020

Hierarchical method for cataract grading based on retinal images using improved Haar wavelet.
Inf. Fusion, 2020

Cryptanalysis of a Chaotic Block Cryptographic System Against Template Attacks.
Int. J. Bifurc. Chaos, 2020

Cryptanalysis of a Chaos-based Block Cryptosystem Using Multiple Samples Correlation Power Analysis.
Proceedings of the 19th IEEE International Conference on Trust, 2020

2019
A robust image encryption algorithm based on Chua's circuit and compressive sensing.
Signal Process., 2019

An Image Encryption Method Based on Elliptic Curve Elgamal Encryption and Chaotic Systems.
IEEE Access, 2019

An Optimized Image Watermarking Method Based on HD and SVD in DWT Domain.
IEEE Access, 2019

Data-Driven Enhancement of Blurry Retinal Images via Generative Adversarial Networks.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2019, 2019

A Block Cryptographic Algorithm for Wireless Sensor Networks Based on Hybrid Chaotic Map.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

A Colour Image Encryption Using Genetic Operators and Generalized Henon Chaotic Mapping.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

2018
A Double-Image Encryption Scheme Based on Amplitude-Phase Encoding and Discrete Complex Random Transformation.
IEEE Access, 2018

2017
Counteracting Dynamical Degradation of Digital Chaotic Chebyshev Map via Perturbation.
Int. J. Bifurc. Chaos, 2017

A chaos-based self-adapting RGB image permutation scheme.
Proceedings of the 13th International Conference on Natural Computation, 2017

2015
An authentication strategy based on spatiotemporal chaos for software copyright protection.
Secur. Commun. Networks, 2015

2014
Hardware Implementation of Cryptographic Hash Function Based on Spatiotemporal Chaos.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014


  Loading...