scispace - formally typeset
H

Hong-feng Ma

Publications -  13
Citations -  275

Hong-feng Ma is an academic researcher. The author has contributed to research in topics: Encryption & Keystream. The author has an hindex of 6, co-authored 9 publications receiving 220 citations.

Papers
More filters
Journal ArticleDOI

An efficient and secure medical image protection scheme based on chaotic maps

TL;DR: The proposed scheme introduces a substitution mechanism in the permutation process through a bit-level shuffling algorithm to address the efficiency problem encountered by many existing permutation-substitution type image ciphers.
Journal ArticleDOI

A novel medical image protection scheme using a 3-dimensional chaotic system.

TL;DR: The proposed scheme provides an effective and efficient way for real-time secure medical image transmission over public networks and enhances the security against known/chosen-plaintext attack.
Patent

Digital image encryption method based on chaotic orbit perturbation

TL;DR: In this article, a digital image encryption method based on chaotic orbit perturbation and related to the field of encryption systems was proposed, which comprises the following steps of: scrambling a plaintext image by adopting a generalized discrete Baker mapping-based method, diffusing the scrambled image by using a Logistic mapping based method, and changing the pixel value of each point in the image; and performing multiple encryption according to the requirement on encryption strength.
Journal ArticleDOI

A fast parallel batch image encryption algorithm using intrinsic properties of chaos

TL;DR: Wang et al. as discussed by the authors proposed a fast and more secure algorithm for protecting batch images by employing chaotic intrinsic properties, reversible steganography, and parallel computing, which can achieve superior results with high efficiency.
Proceedings ArticleDOI

A chaotic symmetric image cipher using a pixel-swapping based permutation

TL;DR: Intensive cryptanalysis is carried out and the experimental results demonstrate that the cryptosystem can withstand all kinds of known attacks, including brute-force attack, differential attack, known/chosen plain-text attack as well as various statistical attacks.