scispace - formally typeset
Search or ask a question
Author

Chong Fu

Bio: Chong Fu is an academic researcher from Northeastern University (China). The author has contributed to research in topics: Encryption & Chaotic. The author has an hindex of 24, co-authored 87 publications receiving 1913 citations. Previous affiliations of Chong Fu include Northeastern University & Chinese Ministry of Education.


Papers
More filters
Journal Article•DOI•
TL;DR: A novel bidirectional diffusion strategy is proposed to promote the efficiency of the most widely investigated permutation-diffusion type image cipher and has a satisfactory security level with a low computational complexity, which renders it a good candidate for real-time secure image transmission applications.
Abstract: Chaos-based image cipher has been widely investigated over the last decade or so to meet the increasing demand for real-time secure image transmission over public networks. In this paper, an improved diffusion strategy is proposed to promote the efficiency of the most widely investigated permutation-diffusion type image cipher. By using the novel bidirectional diffusion strategy, the spreading process is significantly accelerated and hence the same level of security can be achieved with fewer overall encryption rounds. Moreover, to further enhance the security of the cryptosystem, a plain-text related chaotic orbit turbulence mechanism is introduced in diffusion procedure by perturbing the control parameter of the employed chaotic system according to the cipher-pixel. Extensive cryptanalysis has been performed on the proposed scheme using differential analysis, key space analysis, various statistical analyses and key sensitivity analysis. Results of our analyses indicate that the new scheme has a satisfactory security level with a low computational complexity, which renders it a good candidate for real-time secure image transmission applications.

253 citations

Journal Article•DOI•
Chong Fu1, Bin-bin Lin1, Yu-sheng Miao1, Xiao Liu1, Junjie Chen1 •
TL;DR: A novel chaos-based bit-level permutation scheme for secure and efficient image cipher is proposed that is competitive with that of permutation–diffusion type image cipher, while the computational complexity is much lower and is a good candidate for real-time secure image communication applications.

220 citations

Journal Article•DOI•
TL;DR: The proposed scheme introduces a substitution mechanism in the permutation process through a bit-level shuffling algorithm to address the efficiency problem encountered by many existing permutation-substitution type image ciphers.

154 citations

Journal Article•DOI•
Junxin Chen1, Zhiliang Zhu1, Chong Fu1, Hai Yu1, Li-bo Zhang1 •
TL;DR: A fast chaos- based image encryption scheme with a dynamic state variables selection mechanism is proposed to enhance the security and promote the efficiency of chaos-based image cryptosystems.

143 citations

Journal Article•DOI•
Junxin Chen1, Yu Zhang1, Lin Qi1, Chong Fu1, Lisheng Xu1 •
TL;DR: A solution for simultaneous image encryption and compression using compressed sensing using structurally random matrix (SRM), and permutation-diffusion type image encryption using 3-D cat map is presented.
Abstract: This paper presents a solution for simultaneous image encryption and compression. The primary introduced techniques are compressed sensing (CS) using structurally random matrix (SRM), and permutation-diffusion type image encryption. The encryption performance originates from both the techniques, whereas the compression effect is achieved by CS. Three-dimensional (3-D) cat map is employed for key stream generation. The simultaneously produced three state variables of 3-D cat map are respectively used for the SRM generation, image permutation and diffusion. Numerical simulations and security analyses have been carried out, and the results demonstrate the effectiveness and security performance of the proposed system.

136 citations


Cited by
More filters
Journal Article•DOI•
TL;DR: Machine learning addresses many of the same research questions as the fields of statistics, data mining, and psychology, but with differences of emphasis.
Abstract: Machine Learning is the study of methods for programming computers to learn. Computers are applied to a wide range of tasks, and for most of these it is relatively easy for programmers to design and implement the necessary software. However, there are many tasks for which this is difficult or impossible. These can be divided into four general categories. First, there are problems for which there exist no human experts. For example, in modern automated manufacturing facilities, there is a need to predict machine failures before they occur by analyzing sensor readings. Because the machines are new, there are no human experts who can be interviewed by a programmer to provide the knowledge necessary to build a computer system. A machine learning system can study recorded data and subsequent machine failures and learn prediction rules. Second, there are problems where human experts exist, but where they are unable to explain their expertise. This is the case in many perceptual tasks, such as speech recognition, hand-writing recognition, and natural language understanding. Virtually all humans exhibit expert-level abilities on these tasks, but none of them can describe the detailed steps that they follow as they perform them. Fortunately, humans can provide machines with examples of the inputs and correct outputs for these tasks, so machine learning algorithms can learn to map the inputs to the outputs. Third, there are problems where phenomena are changing rapidly. In finance, for example, people would like to predict the future behavior of the stock market, of consumer purchases, or of exchange rates. These behaviors change frequently, so that even if a programmer could construct a good predictive computer program, it would need to be rewritten frequently. A learning program can relieve the programmer of this burden by constantly modifying and tuning a set of learned prediction rules. Fourth, there are applications that need to be customized for each computer user separately. Consider, for example, a program to filter unwanted electronic mail messages. Different users will need different filters. It is unreasonable to expect each user to program his or her own rules, and it is infeasible to provide every user with a software engineer to keep the rules up-to-date. A machine learning system can learn which mail messages the user rejects and maintain the filtering rules automatically. Machine learning addresses many of the same research questions as the fields of statistics, data mining, and psychology, but with differences of emphasis. Statistics focuses on understanding the phenomena that have generated the data, often with the goal of testing different hypotheses about those phenomena. Data mining seeks to find patterns in the data that are understandable by people. Psychological studies of human learning aspire to understand the mechanisms underlying the various learning behaviors exhibited by people (concept learning, skill acquisition, strategy change, etc.).

13,246 citations

Journal Article•DOI•
Zhongyun Hua1, Yicong Zhou1•
TL;DR: A two-dimensional Logistic-adjusted-Sine map (2D-LASM) is proposed that has better ergodicity and unpredictability, and a wider chaotic range than many existing chaotic maps.

496 citations

Journal Article•DOI•
TL;DR: A cosine-transform-based chaotic system (CTBCS) that can produce chaotic maps with complex dynamical behaviors and an image encryption scheme that provides a higher level of security than several advanced image encryption schemes.

463 citations

Journal Article•DOI•
TL;DR: Simulations and performance evaluations show that the proposed system is able to produce a one-dimension (1D) chaotic system with better chaotic performances and larger chaotic ranges compared with the previous chaotic maps.

458 citations

Journal Article•DOI•
Lu Xu1, Zhi Li1, Jian Li1, Wei Hua1•
TL;DR: A novel bit-level image encryption algorithm that is based on piecewise linear chaotic maps (PWLCM) that is both secure and reliable for image encryption.

449 citations