Yushu Zhang

Orcid: 0000-0001-8183-8435

Affiliations:
  • Nanjing University of Aeronautics and Astronautics, Nanjing, China


According to our database1, Yushu Zhang authored at least 207 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A privacy-preserving image retrieval scheme with access control based on searchable encryption in media cloud.
Cybersecur., December, 2024

PS-Net: A Learning Strategy for Accurately Exposing the Professional Photoshop Inpainting.
IEEE Trans. Neural Networks Learn. Syst., October, 2024

FairCMS: Cloud Media Sharing With Fair Copyright Protection.
IEEE Trans. Comput. Soc. Syst., October, 2024

Representing Noisy Image Without Denoising.
IEEE Trans. Pattern Anal. Mach. Intell., October, 2024

Combining Semi-Tensor Product Compressed Sensing and Session Keys for Low-Cost Encryption of Batch Information in WBANs.
IEEE Internet Things J., October, 2024

An Explainable Intellectual Property Protection Method for Deep Neural Networks Based on Intrinsic Features.
IEEE Trans. Artif. Intell., September, 2024

Adaptive 3D Mesh Steganography Based on Feature-Preserving Distortion.
IEEE Trans. Vis. Comput. Graph., August, 2024

Visually Semantics-Aware Color Image Encryption Based on Cross-Plane Substitution and Permutation.
IEEE Trans. Ind. Informatics, August, 2024

Exploiting Four-Dimensional Chaotic Systems With Dissipation and Optimized Logical Operations for Secure Image Compression and Encryption.
IEEE Trans. Circuits Syst. Video Technol., August, 2024

E-TPE: Efficient Thumbnail-Preserving Encryption for Privacy Protection in Visual Sensor Networks.
ACM Trans. Sens. Networks, July, 2024

Empowering Semantic Segmentation With Selective Frequency Enhancement and Attention Mechanism for Tampering Detection.
IEEE Trans. Artif. Intell., June, 2024

RAE-VWP: A Reversible Adversarial Example-Based Privacy and Copyright Protection Method of Medical Images for Internet of Medical Things.
IEEE Internet Things J., June, 2024

Bi-directional Block Encoding for Reversible Data Hiding over Encrypted Images.
ACM Trans. Multim. Comput. Commun. Appl., May, 2024

A New Hyperchaotic Map Based on Discrete Memristor and Meminductor: Dynamics Analysis, Encryption Application, and DSP Implementation.
IEEE Trans. Ind. Electron., May, 2024

Exploiting Size-Compatible-Match Block Technique for Arbitrary-Size Thumbnail-Preserving Encryption.
IEEE Internet Things J., May, 2024

A Novel Memcapacitive-Synapse Neuron: Bionic Modeling, Complex Dynamics Analysis and Circuit Implementation.
IEEE Trans. Circuits Syst. I Regul. Pap., April, 2024

Untargeted Backdoor Attack Against Deep Neural Networks With Imperceptible Trigger.
IEEE Trans. Ind. Informatics, March, 2024

Exploiting Flexible and Secure Cryptographic Technique for Multidimensional Image Based on Graph Data Structure and Three-Input Majority Gate.
IEEE Trans. Ind. Informatics, March, 2024

Reversible Data Hiding Over Encrypted Images via Preprocessing-Free Matrix Secret Sharing.
IEEE Trans. Circuits Syst. Video Technol., March, 2024

3D mesh encryption with differentiated visual effect and high efficiency based on chaotic system.
Expert Syst. Appl., March, 2024

Privacy-Preserving TPE-Based JPEG Image Retrieval in Cloud-Assisted Internet of Things.
IEEE Internet Things J., February, 2024

Efficient Byzantine-Robust and Privacy-Preserving Federated Learning on Compressive Domain.
IEEE Internet Things J., February, 2024

Indexing dynamic encrypted database in cloud for efficient secure k-nearest neighbor query.
Frontiers Comput. Sci., February, 2024

Visual Security Index Combining CNN and Filter for Perceptually Encrypted Light Field Images.
ACM Trans. Multim. Comput. Commun. Appl., January, 2024

A secure dynamic cross-chain decentralized data consistency verification model.
J. King Saud Univ. Comput. Inf. Sci., January, 2024

Imperceptible and multi-channel backdoor attack.
Appl. Intell., January, 2024

Uformer-ICS: A U-Shaped Transformer for Image Compressive Sensing Service.
IEEE Trans. Serv. Comput., 2024

Blockchain-Assisted Secure Deduplication for Large-Scale Cloud Storage Service.
IEEE Trans. Serv. Comput., 2024

Joint Coverless Steganography and Image Transformation for Covert Communication of Secret Messages.
IEEE Trans. Netw. Sci. Eng., 2024

Exploiting Substitution Box for Cryptanalyzing Image Encryption Schemes With DNA Coding and Nonlinear Dynamics.
IEEE Trans. Multim., 2024

PPM-SEM: A Privacy-Preserving Mechanism for Sharing Electronic Patient Records and Medical Images in Telemedicine.
IEEE Trans. Multim., 2024

TPE-ADE: Thumbnail-Preserving Encryption Based on Adaptive Deviation Embedding for JPEG Images.
IEEE Trans. Multim., 2024

Heavy Hitter Identification Over Large-Domain Set-Valued Data With Local Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2024

Understanding Visual Privacy Protection: A Generalized Framework With an Instance on Facial Privacy.
IEEE Trans. Inf. Forensics Secur., 2024

PRO-Face C: Privacy-Preserving Recognition of Obfuscated Face via Feature Compensation.
IEEE Trans. Inf. Forensics Secur., 2024

Client-Side Embedding of Screen-Shooting Resilient Image Watermarking.
IEEE Trans. Inf. Forensics Secur., 2024

PPGloVe: Privacy-Preserving GloVe for Training Word Vectors in the Dark.
IEEE Trans. Inf. Forensics Secur., 2024

4DPM: Deepfake Detection With a Denoising Diffusion Probabilistic Mask.
IEEE Signal Process. Lett., 2024

Client-Side Watermarking for Images With Solid-Color Backgrounds.
IEEE Signal Process. Lett., 2024

TPE-DF: Thumbnail Preserving Encryption via Dual-2DCS Fusion.
IEEE Signal Process. Lett., 2024

Reversible gender privacy enhancement via adversarial perturbations.
Neural Networks, 2024

Efficient and adaptive secure cross-domain recommendations.
Expert Syst. Appl., 2024

FTPE-BC: Fast thumbnail-preserving image encryption using block-churning.
Expert Syst. Appl., 2024

Reservoir computing based encryption-then-compression scheme of image achieving lossless compression.
Expert Syst. Appl., 2024

Exploiting robust quadratic polynomial hyperchaotic map and pixel fusion strategy for efficient image encryption.
Expert Syst. Appl., 2024

AIGC-Chain: A Blockchain-Enabled Full Lifecycle Recording System for AIGC Product Copyright Management.
CoRR, 2024

Hierarchical Invariance for Robust and Interpretable Vision Tasks at Larger Scales.
CoRR, 2024

SE-NDEND: A novel symmetric watermarking framework with neural network-based chaotic encryption for Internet of Medical Things.
Biomed. Signal Process. Control., 2024

High-capacity reversible data hiding in encrypted medical images using adaptive pixel-modulation and HBP-RMC.
Biomed. Signal Process. Control., 2024

TPE-MM: Thumbnail preserving encryption scheme based on Markov model for JPEG images.
Appl. Intell., 2024

An Imperceptible and Owner-unique Watermarking Method for Graph Neural Networks.
Proceedings of the ACM Turing Award Celebration Conference 2024, 2024

Tracking the Leaker: An Encodable Watermarking Method for Dataset Intellectual Property Protection.
Proceedings of the ACM Turing Award Celebration Conference 2024, 2024

Conditional Backdoor Attack via JPEG Compression.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
APCAS: Autonomous Privacy Control and Authentication Sharing in Social Networks.
IEEE Trans. Comput. Soc. Syst., December, 2023

Recording Behaviors of Artificial Intelligence in Blockchains.
IEEE Trans. Artif. Intell., December, 2023

Blockchain-based reliable image copyright protection.
IET Blockchain, December, 2023

Anomaly detection of vectorized time series on aircraft battery data.
Expert Syst. Appl., October, 2023

FingerChain: Copyrighted Multi-Owner Media Sharing by Introducing Asymmetric Fingerprinting Into Blockchain.
IEEE Trans. Netw. Serv. Manag., September, 2023

Compression-resistant backdoor attack against deep neural networks.
Appl. Intell., September, 2023

TPE-H2MWD: an exact thumbnail preserving encryption scheme with hidden Markov model and weighted diffusion.
Frontiers Inf. Technol. Electron. Eng., August, 2023

Detecting backdoor in deep neural networks via intentional adversarial perturbations.
Inf. Sci., July, 2023

Localization of Inpainting Forgery With Feature Enhancement Network.
IEEE Trans. Big Data, June, 2023

A multi-level approach with visual information for encrypted H.265/HEVC videos.
Multim. Syst., June, 2023

A Principled Design of Image Representation: Towards Forensic Tasks.
IEEE Trans. Pattern Anal. Mach. Intell., May, 2023

Authenticable medical image-sharing scheme based on embedded small shadow QR code and blockchain framework.
Multim. Syst., April, 2023

Dataset authorization control: protect the intellectual property of dataset via reversible feature space adversarial examples.
Appl. Intell., March, 2023

Heterogeneous and Customized Cost-Efficient Reversible Image Degradation for Green IoT.
IEEE Internet Things J., February, 2023

TPE-ISE: approximate thumbnail preserving encryption based on multilevel DWT information self-embedding.
Appl. Intell., February, 2023

BPPIR: Blockchain-assisted privacy-preserving similarity image retrieval over multiple clouds.
J. King Saud Univ. Comput. Inf. Sci., January, 2023

A Lightweight Model-Based Evolutionary Consensus Protocol in Blockchain as a Service for IoT.
IEEE Trans. Serv. Comput., 2023

Fair Outsourcing Paid in Fiat Money Using Blockchain.
IEEE Trans. Serv. Comput., 2023

PRNU-based Image Forgery Localization with Deep Multi-scale Fusion.
ACM Trans. Multim. Comput. Commun. Appl., 2023

Detection of Recolored Image by Texture Features in Chrominance Components.
ACM Trans. Multim. Comput. Commun. Appl., 2023

F-TPE: Flexible Thumbnail-Preserving Encryption Based on Multi-Pixel Sum-Preserving Encryption.
IEEE Trans. Multim., 2023

A Reversible Framework for Efficient and Secure Visual Privacy Protection.
IEEE Trans. Inf. Forensics Secur., 2023

RAPP: Reversible Privacy Preservation for Various Face Attributes.
IEEE Trans. Inf. Forensics Secur., 2023

Shrinking the Semantic Gap: Spatial Pooling of Local Moment Invariants for Copy-Move Forgery Detection.
IEEE Trans. Inf. Forensics Secur., 2023

Use the Spear as a Shield: An Adversarial Example Based Privacy-Preserving Technique Against Membership Inference Attacks.
IEEE Trans. Emerg. Top. Comput., 2023

AdvParams: An Active DNN Intellectual Property Protection Technique via Adversarial Perturbation Based Parameter Encryption.
IEEE Trans. Emerg. Top. Comput., 2023

Color-Gray Multi-Image Hybrid Compression-Encryption Scheme Based on BP Neural Network and Knight Tour.
IEEE Trans. Cybern., 2023

BeDCV: Blockchain-Enabled Decentralized Consistency Verification for Cross-Chain Calculation.
IEEE Trans. Cloud Comput., 2023

An Efficient Oblivious Random Data Access Scheme in Cloud Computing.
IEEE Trans. Cloud Comput., 2023

Joint Controller Placement and Control-Service Connection in Hybrid-Band Control.
IEEE Trans. Cloud Comput., 2023

SSVS-SSVD Based Desynchronization Attacks Resilient Watermarking Method for Stereo Signals.
IEEE ACM Trans. Audio Speech Lang. Process., 2023

Adversarial Thumbnail-Preserving Transformation for Facial Images Based on GAN.
IEEE Signal Process. Lett., 2023

Usability Enhanced Thumbnail-Preserving Encryption Based on Data Hiding for JPEG Images.
IEEE Signal Process. Lett., 2023

Identifiable Face Privacy Protection via Virtual Identity Transformation.
IEEE Signal Process. Lett., 2023

TI-BIoV: Traffic Information Interaction for Blockchain-Based IoV With Trust and Incentive.
IEEE Internet Things J., 2023

Exploiting Semi-Tensor Product Compressed Sensing and Hybrid Cloud for Secure Medical Image Transmission.
IEEE Internet Things J., 2023

ActiveGuard: An active intellectual property protection technique for deep neural networks by leveraging adversarial examples as users' fingerprints.
IET Comput. Digit. Tech., 2023

A Survey of Orthogonal Moments for Image Representation: Theory, Implementation, and Evaluation.
ACM Comput. Surv., 2023

Turn Passive to Active: A Survey on Active Intellectual Property Protection of Deep Learning Models.
CoRR, 2023

Security and Privacy on Generative Data in AIGC: A Survey.
CoRR, 2023

Seeing is not Believing: An Identity Hider for Human Vision Privacy Protection.
CoRR, 2023

Towards an Accurate and Secure Detector against Adversarial Perturbations.
CoRR, 2023

Visual Content Privacy Protection: A Survey.
CoRR, 2023

DIVRS: Data integrity verification based on ring signature in cloud storage.
Comput. Secur., 2023

RAE-TPE: A Reversible Adversarial Example Generation Method Based on Thumbnail Preserving Encryption.
Proceedings of the IEEE International Conference on Signal Processing, 2023

CDNet: Cluster Decision for Deepfake Detection Generalization.
Proceedings of the IEEE International Conference on Image Processing, 2023

2022
Cost-Friendly Differential Privacy of Smart Meters Using Energy Storage and Harvesting Devices.
IEEE Trans. Serv. Comput., 2022

Optimizing Task Location Privacy in Mobile Crowdsensing Systems.
IEEE Trans. Ind. Informatics, 2022

HF-TPE: High-Fidelity Thumbnail- Preserving Encryption.
IEEE Trans. Circuits Syst. Video Technol., 2022

Intellectual Property Protection for Deep Learning Models: Taxonomy, Methods, Attacks, and Evaluations.
IEEE Trans. Artif. Intell., 2022

TPE-GAN: Thumbnail Preserving Encryption Based on GAN With Key.
IEEE Signal Process. Lett., 2022

PRA-TPE: Perfectly Recoverable Approximate Thumbnail-Preserving Image Encryption.
J. Vis. Commun. Image Represent., 2022

High-efficiency and visual-usability image encryption based on thumbnail preserving and chaotic system.
J. King Saud Univ. Comput. Inf. Sci., 2022

DCIV: Decentralized cross-chain data integrity verification with blockchain.
J. King Saud Univ. Comput. Inf. Sci., 2022

Noise-free thumbnail-preserving image encryption based on MSB prediction.
Inf. Sci., 2022

Primitively visually meaningful image encryption: A new paradigm.
Inf. Sci., 2022

Multi-user image retrieval with suppression of search pattern leakage.
Inf. Sci., 2022

Preserving privacy while revealing thumbnail for content-based encrypted image retrieval in the cloud.
Inf. Sci., 2022

Adversarial Data Hiding in Digital Images.
Entropy, 2022

InFIP: An Explainable DNN Intellectual Property Protection Method based on Intrinsic Features.
CoRR, 2022

Uformer-ICS: A Specialized U-Shaped Transformer for Image Compressive Sensing.
CoRR, 2022

Detecting Recolored Image by Spatial Correlation.
CoRR, 2022

Metaverse: Security and Privacy Concerns.
CoRR, 2022

Imperceptible and Multi-channel Backdoor Attack against Deep Neural Networks.
CoRR, 2022

PTB: Robust physical backdoor attacks against deep neural networks in real world.
Comput. Secur., 2022

Active intellectual property protection for deep neural networks through stealthy backdoor and users' identities authentication.
Appl. Intell., 2022

PRNU-based Image Forgery Localization With Convolutional Neural Network.
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022

Sample-Specific Backdoor based Active Intellectual Property Protection for Deep Neural Networks.
Proceedings of the 4th IEEE International Conference on Artificial Intelligence Circuits and Systems, 2022

2021
A Multi-graph Convolutional Network Framework for Tourist Flow Prediction.
ACM Trans. Internet Techn., 2021

Defense Against Advanced Persistent Threat Through Data Backup and Recovery.
IEEE Trans. Netw. Sci. Eng., 2021

Privacy-Assured FogCS: Chaotic Compressive Sensing for Secure Industrial Big Image Data Processing in Fog Computing.
IEEE Trans. Ind. Informatics, 2021

Visual Quality Assessment for Perceptually Encrypted Light Field Images.
IEEE Trans. Circuits Syst. Video Technol., 2021

Computation Outsourcing Meets Lossy Channel: Secure Sparse Robustness Decoding Service in Multi-Clouds.
IEEE Trans. Big Data, 2021

Gaussian Model for 3D Mesh Steganography.
IEEE Signal Process. Lett., 2021

TPE2: Three-Pixel Exact Thumbnail-Preserving Image Encryption.
Signal Process., 2021

Combining improved genetic algorithm and matrix semi-tensor product (STP) in color image encryption.
Signal Process., 2021

Anomaly detection of aircraft lead-acid battery.
Qual. Reliab. Eng. Int., 2021

Reversible data hiding in encrypted color images using cross-channel correlations.
J. Vis. Commun. Image Represent., 2021

SWDGAN: GAN-based sampling and whole image denoising network for compressed sensing image reconstruction.
J. Electronic Imaging, 2021

An efficient approach for encrypting double color images into a visually meaningful cipher image using 2D compressive sensing.
Inf. Sci., 2021

A Smart-Contract-Based Access Control Framework for Cloud Smart Healthcare System.
IEEE Internet Things J., 2021

Protect the Intellectual Property of Dataset against Unauthorized Use.
CoRR, 2021

CREAMS: Copyrighted Cloud Media Sharing.
CoRR, 2021

ActiveGuard: An Active DNN IP Protection Technique via Adversarial Examples.
CoRR, 2021

Detect and Remove Watermark in Deep Neural Networks via Generative Adversarial Networks.
Proceedings of the Information Security - 24th International Conference, 2021

2020
Secure Transmission of Compressed Sampling Data Using Edge Clouds.
IEEE Trans. Ind. Informatics, 2020

A Low-Overhead, Confidentiality-Assured, and Authenticated Data Acquisition Framework for IoT.
IEEE Trans. Ind. Informatics, 2020

Secure and Efficient Outsourcing of PCA-Based Face Recognition.
IEEE Trans. Inf. Forensics Secur., 2020

Hiding cipher-images generated by 2-D compressive sensing with a multi-embedding strategy.
Signal Process., 2020

Color image compression and encryption scheme based on compressive sensing and double random encryption strategy.
Signal Process., 2020

An effective image compression-encryption scheme based on compressive sensing (CS) and game of life (GOL).
Neural Comput. Appl., 2020

An efficient chaos-based image compression and encryption scheme using block compressive sensing and elementary cellular automata.
Neural Comput. Appl., 2020

Cloud-assisted privacy-conscious large-scale Markowitz portfolio.
Inf. Sci., 2020

Training Feed-Forward Artificial Neural Networks with a modified artificial bee colony algorithm.
Neurocomputing, 2020

Use the Spear as a Shield: A Novel Adversarial Example based Privacy-Preserving Technique against Membership Inference Attacks.
CoRR, 2020

Machine Learning Security: Threats, Countermeasures, and Evaluations.
IEEE Access, 2020

2019
A Continuous-Time Algorithm for Distributed Optimization Based on Multiagent Networks.
IEEE Trans. Syst. Man Cybern. Syst., 2019

Compressed Sensing Based Selective Encryption With Data Hiding Capability.
IEEE Trans. Ind. Informatics, 2019

Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach.
IEEE Trans. Inf. Forensics Secur., 2019

Serious Challenges and Potential Solutions for the Industrial Internet of Things with Edge Intelligence.
IEEE Netw., 2019

Commutative fragile zero-watermarking and encryption for image integrity protection.
Multim. Tools Appl., 2019

Medical image encryption algorithm based on Latin square and memristive chaotic system.
Multim. Tools Appl., 2019

Efficiently and securely outsourcing compressed sensing reconstruction to a cloud.
Inf. Sci., 2019

Secure Wireless Communications Based on Compressive Sensing: A Survey.
IEEE Commun. Surv. Tutorials, 2019

A robust and secure image sharing scheme with personal identity information embedded.
Comput. Secur., 2019

Efficient and Secure Outsourcing of DFT, IDFT, and Circular Convolution.
IEEE Access, 2019

Indoor Image Representation by High-Level Semantic Features.
IEEE Access, 2019

Fidelity Preserved Data Hiding in Encrypted Highly Autocorrelated Data Based on Homomorphism and Compressive Sensing.
IEEE Access, 2019

2018
On the Security of a Class of Diffusion Mechanisms for Image Encryption.
IEEE Trans. Cybern., 2018

Mixed Noise Removal via Robust Constrained Sparse Representation.
IEEE Trans. Circuits Syst. Video Technol., 2018

A compression-diffusion-permutation strategy for securing image.
Signal Process., 2018

Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption.
Signal Process., 2018

Exploiting the Security Aspects of Compressive Sampling.
Secur. Commun. Networks, 2018

Image salient regions encryption for generating visually meaningful ciphertext image.
Neural Comput. Appl., 2018

A fast and efficient approach to color-image encryption based on compressive sensing and fractional Fourier transform.
Multim. Tools Appl., 2018

A hybrid scheme for self-adaptive double color-image encryption.
Multim. Tools Appl., 2018

Improved known-plaintext attack to permutation-only multimedia ciphers.
Inf. Sci., 2018

Low-Cost and Confidentiality-Preserving Data Acquisition for Internet of Multimedia Things.
IEEE Internet Things J., 2018

Cryptanalysis and Improvement of a Chaotic Image Encryption by First-Order Time-Delay System.
IEEE Multim., 2018

Anonymous Authentication Scheme for Smart Cloud Based Healthcare Applications.
IEEE Access, 2018

Cryptanalyzing a Color Image Encryption Scheme Based on Hybrid Hyper-Chaotic System and Cellular Automata.
IEEE Access, 2018

2017
A visually secure image encryption scheme based on compressive sensing.
Signal Process., 2017

Deciphering an RGB color image cryptosystem based on Choquet fuzzy integral.
Neural Comput. Appl., 2017

A novel method for image segmentation using reaction-diffusion model.
Multidimens. Syst. Signal Process., 2017

A Compressive Sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud.
Inf. Sci., 2017

Harnessing the Hybrid Cloud for Secure Big Image Data Service.
IEEE Internet Things J., 2017

Security Analysis of Some Diffusion Mechanisms Used in Chaotic Ciphers.
Int. J. Bifurc. Chaos, 2017

A self-adaptive scheme for double color-image encryption.
Proceedings of the Ninth International Conference on Advanced Computational Intelligence, 2017

2016
Bi-level Protected Compressive Sampling.
IEEE Trans. Multim., 2016

Robust and hierarchical watermarking of encrypted images based on Compressive Sensing.
Signal Process. Image Commun., 2016

Perturbation meets key-based interval splitting arithmetic coding: security enhancement and chaos generalization.
Secur. Commun. Networks, 2016

Robust image hashing with tampering recovery capability via low-rank and sparse representation.
Multim. Tools Appl., 2016

Embedding cryptographic features in compressive sensing.
Neurocomputing, 2016

A Block Compressive Sensing Based Scalable Encryption Framework for Protecting Significant Image Regions.
Int. J. Bifurc. Chaos, 2016

Chaotic Image Encryption of Regions of Interest.
Int. J. Bifurc. Chaos, 2016

A Review of Compressive Sensing in Information Security Field.
IEEE Access, 2016

A novel selective image encryption method based on saliency detection.
Proceedings of the 2016 Visual Communications and Image Processing, 2016

2015
Robust coding of encrypted images via structural matrix.
Signal Process. Image Commun., 2015

Reversible data hiding in encrypted images using cross division and additive homomorphism.
Signal Process. Image Commun., 2015

Reusing the permutation matrix dynamically for efficient image cryptographic algorithm.
Signal Process., 2015

Chosen-plaintext attack of an image encryption scheme based on modified permutation-diffusion structure.
CoRR, 2015

Secure binary arithmetic coding based on digitalized modified logistic map and linear feedback shift register.
Commun. Nonlinear Sci. Numer. Simul., 2015

An image encryption scheme using nonlinear inter-pixel computing and swapping based permutation approach.
Commun. Nonlinear Sci. Numer. Simul., 2015

Support-Set-Assured Parallel Outsourcing of Sparse Reconstruction Service for Compressive Sensing in Multi-clouds.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015

Joint quantization and diffusion for compressed sensing measurements of natural images.
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015

2014
Attack and improvement of the joint fingerprinting and decryption method for vector quantization images.
Signal Process., 2014

Cryptanalyzing a novel image cipher based on mixed transformed logistic maps.
Multim. Tools Appl., 2014

On the security of symmetric ciphers based on DNA coding.
Inf. Sci., 2014

Robust Coding of Encrypted Images via Structural Matrix.
CoRR, 2014

Embedding Cryptographic Features in Compressive Sensing.
CoRR, 2014

Towards Secure Compressive Sampling Scheme.
CoRR, 2014

GLS coding based security solution to JPEG with the structure of aggregated compression and encryption.
Commun. Nonlinear Sci. Numer. Simul., 2014

An image encryption scheme based on rotation matrix bit-level permutation and block diffusion.
Commun. Nonlinear Sci. Numer. Simul., 2014

2013
A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations.
Signal Process. Image Commun., 2013


  Loading...