scispace - formally typeset
K

Ke Yuan

Researcher at Henan University

Publications -  6
Citations -  285

Ke Yuan is an academic researcher from Henan University. The author has contributed to research in topics: Encryption & Chaotic. The author has an hindex of 3, co-authored 5 publications receiving 173 citations.

Papers
More filters
Journal ArticleDOI

A novel image encryption scheme based on DNA sequence operations and chaotic systems

TL;DR: Experimental results and security analyses demonstrate that the proposed scheme not only has good encryption effect, but also is secure enough to resist against the known attacks.
Journal ArticleDOI

A novel image encryption algorithm based on LFT based S-boxes and chaos

TL;DR: A novel and efficient image encryption algorithm based on the chaotic system and S-boxes is introduced in this paper, in which an original S-box is produced by linear fractional transformation on Galois field of order 256, and then a set of S- boxes are obtained by performing zigzag confusion on the originalS-box.
Patent

Color image encryption method based on Latin square scrambling

TL;DR: In this paper, a color image encryption method based on Latin square scrambling was proposed, in which plaintext keys r1, g1 and b1 are calculated through utilization of R, G and B components of a color plaintext image, an initial value and a parameter obtained through calculation based on the keys are substituted into a chaotic system, and three groups of chaotic sequences are generated; the chaotic sequences for scrambling and diffusion are selected through utilizing of a chaotic sequence selection mechanism based on a plaintext and digital arrangement; and a final ciphertext image is obtained through adoption of a
Patent

Image encryption method based on 3D orthogonal Latin square and chaotic system

TL;DR: In this paper, the authors proposed an image encryption method based on a 3D orthogonal Latin square and a chaotic system, which is highly sensitive to plaintext images and can effectively resist known plaintext and selected plaintext attacks.