Publications by authors named "Heping Wen"

This article proposes a secure communication enhancement scheme based on face detection and chaotic partition permutation. The scheme uses edge detection technology to detect facial information, which is then used as an encryption object. The hash value of the plaintext image is extracted as the secret key to the chaotic sequence generated by the chaotic system.

View Article and Find Full Text PDF
Article Synopsis
  • This paper introduces a secure image communication scheme that combines two-layer dynamic feedback encryption and discrete wavelet transform (DWT) for effective image protection against chosen plaintext attacks.
  • The approach utilizes chaotic systems and various encryption methods to generate intermediate and final ciphertext images, ensuring high security and confidentiality during image transmission.
  • Experimental results show that the proposed encryption scheme is highly sensitive to key and plaintext variations, effectively resisting common encryption attacks while maintaining robust performance for digital image privacy.
View Article and Find Full Text PDF
Article Synopsis
  • Compressive sensing challenges the limitations of traditional Nyquist sampling in signal reconstruction, but faces issues with security and image quality that need urgent attention.
  • This paper introduces a novel image encryption scheme that utilizes an optimized orthogonal measurement matrix, combining DWT, OMP, and chaos theory to enhance security and image decryption quality.
  • Experimental results demonstrate that the proposed scheme effectively addresses cryptographic requirements while offering superior image restoration, making it valuable for safeguarding privacy in the context of big data networks.
View Article and Find Full Text PDF

Surface roughness is a crucial factor that affects the flotation performance of minerals. In this study, the effect of sulfuric acid corrosion on the surface roughness of calcite flotation was investigated through microflotation tests, scanning electron microscopy (SEM-EDS), atomic force microscopy (AFM), Fourier transform infrared (FT-IR) spectroscopy, and contact angle analysis. Microflotation test results show that sulfuric acid treatment has a serious negative effect on the floatability of calcite.

View Article and Find Full Text PDF

Bit is the most basic unit of a digital image in the spatial domain, and bit-level encryption is regarded as an important technical means for digital image privacy protection. To address the vulnerability of image privacy protection to cryptographic attacks, in this paper, a bit-level image privacy protection scheme using Zigzag and chain-diffusion is proposed. The scheme uses a combination of Zigzag interleaving scrambling with chaotic sequences and chain-diffusion method images are encrypted at each bit level, while using non-sequential encryption to achieve efficient and secure encryption.

View Article and Find Full Text PDF

Aiming at the problem of insufficient security of image encryption technology, a secure image encryption algorithm using chaos-based block permutation and weighted bit planes chain diffusion is proposed, which is based on a variant structure of classical permutation-diffusion. During the permutation phase, the encryption operations of dividing an image into sub-block, block scrambling, block rotation and block inversion, negative-positive transformation, color component shuffling are performed sequentially with chaotic sequences of plaintext association. In the chain diffusion stage, different encryption strategies are adopted for the high and low 4-bit planes according to the weight of image information.

View Article and Find Full Text PDF

This paper proposes a video security transmission enhancement algorithm based on block permutation and dynamic multiplexing sequences encryption based on 4D autonomous hyperchaotic system. Firstly, we employ the block permutation encryption and diffusion confusion encryption module, which is based on dynamic multiplexing chaotic sequences, to encrypt the plaintext and obtain the ciphertext. Subsequently, the hash value of this round's ciphertext is utilized to generate the chaotic key, produced by the multiplexing sequence of this round after mathematical processing.

View Article and Find Full Text PDF

In order to further improve the information effectiveness of digital image transmission, an image-encryption algorithm based on 2D-Logistic-adjusted-Sine map (2D-LASM) and Discrete Wavelet Transform (DWT) is proposed. First, a dynamic key with plaintext correlation is generated using Message-Digest Algorithm 5 (MD5), and 2D-LASM chaos is generated based on the key to obtain a chaotic pseudo-random sequence. Secondly, we perform DWT on the plaintext image to map the image from the time domain to the frequency domain and decompose the low-frequency (LF) coefficient and high-frequency (HF) coefficient.

View Article and Find Full Text PDF

With the arrival of the age of big data, the amount and types of data in the process of information transmission have increased significantly, and the full-disk encryption mode used by traditional encryption algorithms has certain limitations of the times. In order to further improve the bandwidth efficiency of digital images in the transmission process and the information effectiveness of digital image transmission, this paper proposes an algorithm of high-quality restoration image encryption using DCT frequency-domain compression coding and chaos. Firstly, the image hash value is used for the generation of an encryption key with plaintext correlation, then lightweight chaos is generated based on the key to obtain a pseudo-random sequence.

View Article and Find Full Text PDF
Article Synopsis
  • The proposed method enhances real-time video confidentiality by introducing a chaotic encryption technique specifically designed for H.264/AVC video, addressing security, real-time performance, and format compatibility.
  • A new chaotic stream cipher algorithm (4-D SCSCA-CAC) is crafted to strengthen security against common attacks like chosen-ciphertext and divide-and-conquer.
  • The system achieves efficient video encryption and decoding through advanced techniques such as Exponential-Golomb and multi-core multi-threading, demonstrating high efficiency and flexibility in experimental setups.
View Article and Find Full Text PDF

A chaotic ribonucleic acid (RNA) and deoxyribonucleic acid (DNA) encryption scheme is firstly proposed for security OFDM-WDM-PON in this paper. We adopt a dynamic key agreement based on the messenger RNA (mRNA) codebook to distribute the key, and the security and randomness of this key are enhanced by a pre-sharing key parameter set instead of transmission of a key directly. Also, the security key can be dynamically updated in real-time according to the needs of the users.

View Article and Find Full Text PDF

In the current network and big data environment, the secure transmission of digital images is facing huge challenges. The use of some methodologies in artificial intelligence to enhance its security is extremely cutting-edge and also a development trend. To this end, this paper proposes a security-enhanced image communication scheme based on cellular neural network (CNN) under cryptanalysis.

View Article and Find Full Text PDF

In this paper, we propose chaotic compressive sensing (CS) encryption algorithms for orthogonal frequency division multiplexing passive optical network (OFDM-PON), aiming at compressing the transmitted data and enhancing the security of data transmission. Bitstream transmission using CS directly is restricted due to its inability to satisfy the sparsity in neither time nor frequency domain. While the sparsity of the transmitted data can be constructed when transmitting the multimedia.

View Article and Find Full Text PDF
Article Synopsis
  • Fractional-order chaos exhibits complex dynamics that are promising for secure communication, but security analysis on such systems is limited.
  • This paper analyzes a specific encryption algorithm (CIEA-FOHS) that uses a fractional-order hyperchaotic system and finds it to be cryptographically secure based on numerical simulations.
  • However, the study reveals vulnerabilities to chosen-plaintext attacks, where attackers can exploit weaknesses in image diffusion and permutation to recover the original images, leading to recommendations for enhancing the algorithm's security.*
View Article and Find Full Text PDF

Recently, an image encryption algorithm based on DNA encoding and spatiotemporal chaos (IEA-DESC) was proposed. In IEA-DESC, pixel diffusion, DNA encoding, DNA-base permutation and DNA decoding are performed successively to generate cipher-images from the plain-images. Some security analyses and simulation results are given to prove that it can withstand various common attacks.

View Article and Find Full Text PDF