Mingfang Jiang
YOU?
Author Swipe
View article: Image Encryption Using a New Hybrid Chaotic Map and Spiral Transformation
Image Encryption Using a New Hybrid Chaotic Map and Spiral Transformation Open
Image encryption based on chaotic maps is an important method for ensuring the secure communication of digital multimedia on the Internet. To improve the encryption performance and security of image encryption systems, a new image encrypti…
View article: Image Encryption Using Improved Hybrid Chaotic Map and Spiral Transformation
Image Encryption Using Improved Hybrid Chaotic Map and Spiral Transformation Open
Image encryption based on chaotic maps is an important way to ensure the secure communication of digital multimedia on the Internet. To improve the encryption performance and security of image encryption systems, a new image encryption alg…
View article: Image Encryption Algorithm Using Multi-Level Permutation and Improved Logistic–Chebyshev Coupled Map
Image Encryption Algorithm Using Multi-Level Permutation and Improved Logistic–Chebyshev Coupled Map Open
To improve the randomness of the Chebyshev chaotic sequences by coupling the Logistic map and the Chebyshev map, a new one-dimensional Logistic–Chebyshev chaotic map (LCCM) is first presented in this paper. Several tests, including the bif…
View article: Reversible data hiding algorithm in encrypted images using adaptive total variation and cross-cyclic shift
Reversible data hiding algorithm in encrypted images using adaptive total variation and cross-cyclic shift Open
To reduce prediction error and improve the embedding rate of secret messages, a new reversible data hiding algorithm for encrypted images (RDHEI) is designed using adaptive total variation and cross-cyclic shift called RDHEIAC.The adaptive…
View article: Reversible data hiding algorithm in encrypted images using adaptive total variation and cross-cyclic shift
Reversible data hiding algorithm in encrypted images using adaptive total variation and cross-cyclic shift Open
To reduce prediction error and improve the embedding rate of secret messages, a new reversible data hiding algorithm for encrypted images (RDHEI) is designed using adaptive total variation and cross-cyclic shift called RDHEIAC. The adaptiv…
View article: Adaptive Reversible Visible Watermarking Based on Total Variation for BTC-Compressed Images
Adaptive Reversible Visible Watermarking Based on Total Variation for BTC-Compressed Images Open
Few previous Reversible Visible Watermarking (RVW) schemes have both good transparency and watermark visibility. An adaptive RVW scheme that integrates Total Variation and visual perception in Block Truncation Coding (BTC) compressed domai…
View article: A Secure Rotation Invariant LBP Feature Computation in Cloud Environment
A Secure Rotation Invariant LBP Feature Computation in Cloud Environment Open
View article: Fine-Grained Ensemble of Evolutionary Operators for Objective Space Partition Based Multi-Objective Optimization
Fine-Grained Ensemble of Evolutionary Operators for Objective Space Partition Based Multi-Objective Optimization Open
Decomposition-based multi-objective optimization algorithms have been widely accepted as a competitive technique in solving complex multi-objective optimization problems (MOPs). Motivated by the facts that evolutionary operators are sensit…
View article: Secure Outsourcing Algorithm of BTC Feature Extraction in Cloud Computing
Secure Outsourcing Algorithm of BTC Feature Extraction in Cloud Computing Open
Advances in cloud computing have aroused many researchers' interest in privacy-preserving feature extraction over outsourced multimedia data, especially private image data. Since block truncation coding (BTC) is known as a simple and effic…
View article: Image Feature Computation in Encrypted Domain Based on Mean Value
Image Feature Computation in Encrypted Domain Based on Mean Value Open
In smart environments, more and more teaching data sources are uploaded to remote cloud centers which promote the development of the smart campus. The outsourcing of massive teaching data can reduce storage burden and computational cost, b…
View article: Perceptual Image Hashing Using Latent Low-Rank Representation and Uniform LBP
Perceptual Image Hashing Using Latent Low-Rank Representation and Uniform LBP Open
Robustness and discriminability are the two most important features of perceptual image hashing (PIH) schemes. In order to achieve a good balance between perceptual robustness and discriminability, a novel PIH algorithm is proposed by comb…