H
Hong-feng Ma
Publications - 13
Citations - 275
Hong-feng Ma is an academic researcher. The author has contributed to research in topics: Encryption & Keystream. The author has an hindex of 6, co-authored 9 publications receiving 220 citations.
Papers
More filters
Journal ArticleDOI
An efficient and secure medical image protection scheme based on chaotic maps
Chong Fu,Wei-hong Meng,Yong-feng Zhan,Zhiliang Zhu,Francis C. M. Lau,Chi K. Tse,Hong-feng Ma +6 more
TL;DR: The proposed scheme introduces a substitution mechanism in the permutation process through a bit-level shuffling algorithm to address the efficiency problem encountered by many existing permutation-substitution type image ciphers.
Journal ArticleDOI
A novel medical image protection scheme using a 3-dimensional chaotic system.
TL;DR: The proposed scheme provides an effective and efficient way for real-time secure medical image transmission over public networks and enhances the security against known/chosen-plaintext attack.
Patent
Digital image encryption method based on chaotic orbit perturbation
TL;DR: In this article, a digital image encryption method based on chaotic orbit perturbation and related to the field of encryption systems was proposed, which comprises the following steps of: scrambling a plaintext image by adopting a generalized discrete Baker mapping-based method, diffusing the scrambled image by using a Logistic mapping based method, and changing the pixel value of each point in the image; and performing multiple encryption according to the requirement on encryption strength.
Journal ArticleDOI
A fast parallel batch image encryption algorithm using intrinsic properties of chaos
TL;DR: Wang et al. as discussed by the authors proposed a fast and more secure algorithm for protecting batch images by employing chaotic intrinsic properties, reversible steganography, and parallel computing, which can achieve superior results with high efficiency.
Proceedings ArticleDOI
A chaotic symmetric image cipher using a pixel-swapping based permutation
TL;DR: Intensive cryptanalysis is carried out and the experimental results demonstrate that the cryptosystem can withstand all kinds of known attacks, including brute-force attack, differential attack, known/chosen plain-text attack as well as various statistical attacks.