Article
Optics
Xingyuan Wang, Maochang Zhao
Summary: The chaotic image encryption scheme combines block scrambling and DNA coding to achieve encryption. By changing pixel values, scrambling image indexes, and using DNA coding rules, the algorithm demonstrates good encryption effect and resistance to common attacks.
OPTICS AND LASER TECHNOLOGY
(2021)
Article
Mathematics, Interdisciplinary Applications
Jinwei Yu, Wei Xie, Zhenyu Zhong, Huan Wang
Summary: This paper proposes an image encryption algorithm based on DNA sequence operation and hyper-chaotic system. By using SHA-256 algorithm and chaotic systems to generate random sequences, encoding the original image into DNA matrices, introducing DNA triploid mutation for cryptographic conversion, and then fusing the image through row-column permutation and pixel diffusion, the encryption approach proves to be secure and effective.
CHAOS SOLITONS & FRACTALS
(2022)
Article
Computer Science, Artificial Intelligence
B. Lydia Elizabeth, J. Gayathri, S. Subashini, A. John Prakash
Summary: The HIDE image encryption scheme proposed in this paper is based on a four-dimensional hyperchaotic Rabinovich system and DNA computing, with a sandwich permutation diffusion architecture and dynamic key generation to resist KPA/CPA attacks. This scheme increases key space to resist brute force attacks and passes all statistical security tests for robust and secure encryption.
JOURNAL OF REAL-TIME IMAGE PROCESSING
(2022)
Article
Multidisciplinary Sciences
Qing Lu, Linlan Yu, Congxu Zhu
Summary: In this paper, a new conservative hyperchaotic system is proposed and its complexity is quantitatively analyzed. Additionally, a novel image encryption scheme based on dynamic DNA coding is introduced, with simulation experiments and security analyses showing its effectiveness.
Article
Physics, Multidisciplinary
Wuyan Liang, Limin Zhang, Zhongbao Yang, Tingting Yu, Jingjing Li, Xianli Li
Summary: An image encryption algorithm based on a hyperchaotic system and dynamic DNA coding is proposed in this study. The algorithm introduces two new operation methods in the DNA operation rules, and combines SHA-256 function and an external key to generate the initial value of the chaotic system. The algorithm encrypts the plaintext image by performing rotation, scrambling, DNA dynamic encoding and decoding, and one-dimensional scrambling on the image matrix. Simulation results demonstrate that the improved algorithm provides enhanced security and resilience against attacks.
Article
Optics
Yang Yang, Lidan Wang, Shukai Duan, Li Luo
Summary: This study introduces a new four-dimensional memristive hyperchaotic system and designs an image encryption algorithm based on the chaotic sequence generated by this system. Experimental results demonstrate that the algorithm has excellent encryption performance.
OPTICS AND LASER TECHNOLOGY
(2021)
Article
Mathematical & Computational Biology
Min Liu, Guodong Ye
Summary: An asymmetric image encryption algorithm based on DNA coding and hyperchaotic system is designed in this paper, which aims to address the risks of key transmission, confusion of image, and fixed rules in DNA encryption algorithms. Through three stages, including generating initial values, pixel level permutation, and dynamical DNA encryption, the proposed algorithm shows secure and reliable for image encryption.
MATHEMATICAL BIOSCIENCES AND ENGINEERING
(2021)
Article
Engineering, Mechanical
Xiyu Sun, Zhong Chen, Lujie Wang, Chenchen He
Summary: This paper proposes a lossless image compression and encryption algorithm combining JPEG-LS, neural networks, and hyperchaotic mapping to protect digital image privacy and reduce data storage space. A new 2-Dimensional Logistic-Like Hyperchaotic Map (2DLLHM) is designed as a pseudorandom sequence generator, and a new pixel predictor (MMP) is developed to improve the prediction effect in edge texture area. The algorithm achieves a good compression ratio and can resist various attacks.
NONLINEAR DYNAMICS
(2023)
Article
Computer Science, Information Systems
Jie Fang, Minghao Jiang, Nannan Yin, Da Wei, Yin Zhang
Summary: This paper presents an image block encryption algorithm using FRFT, hyperchaotic system, improved logistic map, and DNA encoding. The algorithm enhances the complexity and security of the data through multiple processing and operation.
MULTIMEDIA TOOLS AND APPLICATIONS
(2022)
Article
Mathematics
Hanshuo Qiu, Xiangzi Zhang, Huaixiao Yue, Jizhao Liu
Summary: This paper proposes an encryption scheme based on an eighth-order hyperchaotic system, which offers a large key space and can resist various attacks, demonstrating excellent security performance.
Article
Mathematics, Interdisciplinary Applications
Qiang Lai, Hanqiang Hua, Xiao-Wen Zhao, Ugur Erkan, Abdurrahim Toktas
Summary: This paper introduces an effective image encryption algorithm that uses a novel hyperchaotic map and is suitable for various image encryption scenarios. The newly designed hyperchaotic map shows enhanced ergodicity, more complex behavior, and a wider chaotic range as confirmed by performance evaluation. The algorithm combines fission diffusion and permutation operations, which effectively spread minor changes throughout the entire image and relocate these changes to different positions within the image. Performance analysis results demonstrate that the algorithm is highly resilient to various attack patterns and exhibits high levels of encryption efficiency.
CHAOS SOLITONS & FRACTALS
(2023)
Article
Mathematics, Interdisciplinary Applications
Ziqi Zhou, Xuemei Xu, Yexia Yao, Zhaohui Jiang, Kehui Sun
Summary: This paper proposes a multiple-image encryption algorithm that can encrypt any number, size, and type of image. It introduces a two-dimensional chaotic model to generate multiple types of chaotic systems, improving the design difficulty of chaotic systems. The algorithm combines image fusion, secret key generation, and simultaneous permutation and diffusion to enhance security and efficiency, and experimental simulations and security analysis verify its effectiveness.
CHAOS SOLITONS & FRACTALS
(2023)
Article
Computer Science, Information Systems
Edy Winarno, Kristiawan Nugroho, Prajanto Wahyu Adi, De Rosal Ignatius Moses Setiadi
Summary: The study proposes an encryption method that combines multiple interleaved patterns to enhance complexity and randomness. The keystream is generated from improved logistic and hyperchaotic maps, producing highly random and nonlinear keystreams. The encryption process consists of alternating diffusion and confusion phases, and SHA-512 is used to enhance key space and sensitivity. Test results show that this encryption technique can withstand various attacks and is better than previous studies.
Article
Computer Science, Information Systems
V. R. Folifack Signing, R. L. Tagne Mogue, J. Kengne, M. Kountchou, Saidou
Summary: The paper introduces a joint encryption technique based on hyperchaotic systems and DNA coding, analyzes the dynamics of financial hyperchaotic systems, and conducts security tests that demonstrate the effectiveness of the proposed encryption scheme in protecting digital images.
MULTIMEDIA TOOLS AND APPLICATIONS
(2021)
Article
Physics, Multidisciplinary
Jie Fang, Kaihui Zhao, Wanyong Liang
Summary: This paper proposes an asymmetric color image encryption algorithm based on ECC, 5D hyperchaotic system, and DNA dynamic coding. The algorithm establishes a mathematical model to strengthen the connection between the original image, ECC algorithm, and hyperchaotic system. The encrypted RGB channels are reshaped into a 3D matrix and undergo grouping, scrambling, and diffusion operations. Simulation results and security analysis demonstrate the algorithm's superior performance in terms of key space, Shannon entropy, and resistance to clipping attacks.
Article
Computer Science, Artificial Intelligence
Yi Liu, Guiwu Wei, Haobin Liu, Lei Xu
Summary: The study aims to construct the emergency group decision-making model for multiple network public opinion emergencies under the linguistic intuitionistic environment. New concepts such as extended Copula and extended Co-Copula are introduced, along with operational rules based on linguistic intuitionistic fuzzy numbers. The proposed EGDM approach integrates Choquet integral and operational rules of LIFNs, showing its validity and advantages compared to existing approaches.
INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS
(2022)
Article
Automation & Control Systems
Guiwu Wei, Rui Lin, Jianping Lu, Jiang Wu, Cun Wei
Summary: The optimal location of electric vehicle charging stations is crucial for their operational efficiency and user satisfaction, involving multiple attributes and group decision making. In practical scenarios, uncertain linguistic term sets are used to depict fuzzy cognitive decision information, which can be transformed into probabilistic uncertain linguistic sets. Novel probabilistic uncertain linguistic similarity measures are designed and applied in the decision-making process for electric vehicle charging station location planning.
INTERNATIONAL JOURNAL OF FUZZY SYSTEMS
(2022)
Article
Automation & Control Systems
Ningna Liao, Guiwu Wei, Xudong Chen
Summary: The TODIM method, based on the Probabilistic Hesitant Fuzzy sets, considers decision makers' bounded rationality and uses an Extended TODIM based on Cumulative Prospect Theory for probabilistic hesitant fuzzy multiple attributes group decision-making (MAGDM). Entropy is applied to calculate weights between attributes, and a numerical case study is used to compare the extended TODIM method with other methods to test its reasonability.
INTERNATIONAL JOURNAL OF FUZZY SYSTEMS
(2022)
Article
Computer Science, Artificial Intelligence
Siqi Wang, Guiwu Wei, Jianping Lu, Jiang Wu, Cun Wei, Xudong Chen
Summary: The study developed a grey relational projection method for probabilistic uncertain linguistic MAGDM, introduced probabilistic uncertain linguistic positive and negative ideal solutions, and validated the effectiveness of the method through a numerical example.
Article
Computer Science, Artificial Intelligence
Taiyong Li, Jiayi Shi, Wu Deng, Zhenda Hu
Summary: This paper proposes a novel particle swarm optimization algorithm called PPSO, which utilizes a pyramid structure and competitive-cooperative strategies to update particle information. Extensive experiments demonstrate that PPSO outperforms other algorithms in terms of accuracy and convergence speed, indicating its potential in numerical optimization.
APPLIED SOFT COMPUTING
(2022)
Article
Physics, Multidisciplinary
Zhiyi Wang, Mingcheng Zhou, Boji Liu, Taiyong Li
Summary: This paper proposes a novel scheme using Transformer for feature extraction in image steganography, which is shown to outperform other deep-learning models in terms of feature extraction. Additionally, an image encryption algorithm with good attributes for image security is also proposed, further enhancing the performance of the steganography scheme.
Article
Physics, Multidisciplinary
Jiaxuan Xu, Jiang Wu, Taiyong Li, Yang Nan
Summary: This paper proposes a divergence-based locally weighted ensemble clustering with dictionary learning (DLWECDL) method to address the issues of microcluster weights and sample-cluster relationship in ensemble clustering. Experimental results demonstrate the great potential of this method in improving clustering accuracy.
Article
Computer Science, Information Systems
Duzhong Zhang, Xiancheng Wen, Chao Yan, Taiyong Li
Summary: This paper presents a novel joint RNA-level permutation and substitution (JRPS) based image encryption algorithm, which utilizes a six-dimensional hyper-chaotic system to generate pseudo-random sequences and transforms plaintext images into RNA codon sequences according to RNA rules. Running two rounds of joint RNA-level permutation and substitution on the RNA codon sequence yields a cipher image. Simulation results demonstrate that the proposed algorithm can withstand various attacks.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Computer Science, Software Engineering
Jiayi Shi, Taiyong Li, Jiaxuan Xu
Summary: This paper proposes a recursive lightweight CNN approach (PPNets) that achieves significant improvement in image denoising, with fewer model parameters compared to traditional models and state-of-the-art CNN models.
Article
Computer Science, Information Systems
Duzhong Zhang, Lexing Chen, Taiyong Li
Summary: This paper presents a new image encryption algorithm called HCLRNA, which is based on a hyper-chaotic system, three-dimensional orthogonal Latin cube transformation, and RNA diffusion. It consists of three main steps: generating chaotic matrices using a 6D hyper-chaotic system, scrambling the plaintext image using 3D orthogonal Latin cube transformation, and diffusing the scrambled pixel values using RNA codons. Experimental results show that HCLRNA meets the requirements of different evaluation indicators, effectively resists common attacks, and performs significantly better in resisting differential attacks compared to other studies.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Computer Science, Information Systems
Qingxiao Zheng, Lingfeng Wang, Jin He, Taiyong Li
Summary: With the expansion of services in cloud manufacturing, service level agreements (SLAs) are increasingly used by cloud manufacturers to ensure business processing cooperation. However, consensus algorithms in Blockchain as a Service (BaaS) systems often overlook the importance of SLAs. To address this issue, a KNN-based consensus algorithm is proposed that classifies transactions based on their priority. The enhanced consensus algorithm improves the satisfaction of SLAs in BaaS systems, allowing cloud service providers to provide better services to cloud service consumers.
Article
Computer Science, Information Systems
Panjie Wang, Jiang Wu, Yuan Wei, Taiyong Li
Summary: This study proposes a hybrid ensemble learning algorithm, CEEMD-MultiRocket, which combines Complementary Ensemble Empirical Mode Decomposition (CEEMD) with an improved MultiRocket for accurate time series classification. The method decomposes the raw time series into IMFs and a residue using CEEMD, and selects the decomposed sub-series based on their classification accuracy compared to the raw time series. The improved MultiRocket is then applied to the selected sub-series and the first-order difference of the raw time series to generate the final classification results.
Article
Physics, Multidisciplinary
Wei Fan, Taiyong Li, Jianan Wu, Jiang Wu
Summary: This paper proposes a novel scheme for color image encryption based on eight-base DNA-level permutation and diffusion. The experimental results demonstrate the excellent performance of the proposed scheme in color image encryption and its resistance to various attacks.
Editorial Material
Computer Science, Information Systems
Taiyong Li, Wu Deng, Jiang Wu
Article
Computer Science, Artificial Intelligence
Jiaxuan Xu, Taiyong Li, Duzhong Zhang, Jiang Wu
Summary: This paper proposes a novel scheme called FSEC to improve the performance of ensemble clustering by integrating both global and local structural information into a learning framework. Experimental results demonstrate that FSEC outperforms other state-of-the-art methods of ensemble clustering.
EXPERT SYSTEMS WITH APPLICATIONS
(2024)