Publications by authors named "Qianxue Wang"

Due to the equivalent keys revealed by a chosen-plaintext attack or a chosen-ciphertext attack, most of the existing chaotic image encryption schemes are demonstrated to be insecure. In order to improve security performance, some scholars have recently proposed the plaintext-related chaotic image encryption scheme. Although the equivalent effect of a one-time pad is achieved, an additional secure channel is required to transmit the hash values or other parameters related to the plaintext before the ciphertext can be decrypted at the receiving end.

View Article and Find Full Text PDF

This paper analyzes the security of an image encryption algorithm based on a two-dimensional hyperchaotic map. This encryption algorithm generated chaotic sequences through a combination of two one-dimensional chaotic maps and used them as the permutation and diffusion key. Then, the image was encrypted by using the structure of row-column permutation, forward-diffusion, and backward-diffusion.

View Article and Find Full Text PDF

Autophagy deficiency in macrophages exacerbates inflammation in atherosclerosis (AS), and recently, galectin-3 (Gal-3) has been implicated as a critical promoter of inflammation in AS. Further, melatonin (Mel) exerts an autophagy-promoting effect in many chronic inflammatory diseases. In this study, we aimed to investigate whether Mel inhibits AS progression by downregulating Gal-3 to enhance autophagy and inhibit inflammation.

View Article and Find Full Text PDF

This paper analyzes the security of the image encryption algorithm based on a two-dimensional (2D) infinite collapse map. The encryption algorithm adopts a permutation-diffusion structure and can perform two or more rounds to achieve a higher level of security. By cryptanalysis, it is found that the original diffusion process can be split into a permutation-diffusion structure, which comes after the original permutation, so these two permutations can be merged into one.

View Article and Find Full Text PDF
Article Synopsis
  • The proposed method enhances real-time video confidentiality by introducing a chaotic encryption technique specifically designed for H.264/AVC video, addressing security, real-time performance, and format compatibility.
  • A new chaotic stream cipher algorithm (4-D SCSCA-CAC) is crafted to strengthen security against common attacks like chosen-ciphertext and divide-and-conquer.
  • The system achieves efficient video encryption and decoding through advanced techniques such as Exponential-Golomb and multi-core multi-threading, demonstrating high efficiency and flexibility in experimental setups.
View Article and Find Full Text PDF