L
Long Bao
Researcher at Tufts University
Publications - 23
Citations - 1250
Long Bao is an academic researcher from Tufts University. The author has contributed to research in topics: Encryption & Binary image. The author has an hindex of 10, co-authored 23 publications receiving 951 citations. Previous affiliations of Long Bao include Samsung & Hunan University.
Papers
More filters
Journal ArticleDOI
A new 1D chaotic system for image encryption
TL;DR: Simulations and performance evaluations show that the proposed system is able to produce many 1D chaotic maps with larger chaotic ranges and better chaotic behaviors compared with their seed maps.
Journal ArticleDOI
Image encryption using a new parametric switching chaotic system
TL;DR: This paper introduces a new parametric switching chaotic system (PSCS) and its corresponding transforms for image encryption and shows more general properties, including the Sine and Tent maps as special instances.
Journal ArticleDOI
Discrete Wheel-Switching Chaotic System and Applications
Yue Wu,Yicong Zhou,Long Bao +2 more
TL;DR: This paper introduces a discrete wheel-switching chaotic system (DWSCS) and proposes a pseudo-random number generator using DWSCS whose excellent performance has been shown in experiments and comparisons.
Journal ArticleDOI
Combination of Sharing Matrix and Image Encryption for Lossless $(k,n)$ -Secret Image Sharing
Long Bao,Shuang Yi,Yicong Zhou +2 more
TL;DR: Performance evaluation and security analysis demonstrate that the proposed SMIE-SIS with arbitrary settings has at least five advantages: it is able to fully recover the original image without any distortion; it has much lower pixel expansion than many existing methods; its computation cost is much lower than the polynomial-based secret image sharing methods.
Proceedings ArticleDOI
A new chaotic system for image encryption
TL;DR: Computer simulation and security analysis demonstrate that the proposed image encryption scheme shows excellent encryption performance, high sensitivity to the security keys, and a sufficiently large key space to resist the brute attack.