scispace - formally typeset
Search or ask a question
Author

Tiegang Gao

Bio: Tiegang Gao is an academic researcher from Nankai University. The author has contributed to research in topics: Computer science & Encryption. The author has an hindex of 7, co-authored 13 publications receiving 1148 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: The experimental results demonstrate that the suggested encryption algorithm of image has the advantages of large key space and high security, and moreover, the distribution of grey values of the encrypted y image has a random-like behavior.

584 citations

Journal ArticleDOI
TL;DR: The experimental results demonstrate that the new image total shuffling algorithm has a low time complexity and the suggested encryption algorithm of image has the advantages of large key space and high security, and moreover, the distribution of grey values of the encrypted image has a random-like behavior.
Abstract: This paper presents image encryption scheme, which employs a new image total shuffling matrix to shuffle the positions of image pixels and then uses the states combination of two chaotic systems to confuse the relationship between the plain-image and the cipher-image. The experimental results demonstrate that the new image total shuffling algorithm has a low time complexity and the suggested encryption algorithm of image has the advantages of large key space and high security, and moreover, the distribution of grey values of the encrypted image has a random-like behavior.

256 citations

Journal ArticleDOI
TL;DR: In this paper, a new hyper-chaotic system was obtained by adding a nonlinear quadratic controller to the second equation of the three-dimensional autonomous modified Lorenz chaotic system.

112 citations

Journal ArticleDOI
TL;DR: In this paper, a new hyperchaotic system, obtained by adding a controller to the second equation of the three-dimensional autonomous Chen's chaotic system, undergoes a change from hyperchaos to limit cycle when the parameter varies.
Abstract: This paper presents a new hyperchaotic system, obtained by adding a controller to the second equation of the three-dimensional autonomous Chen's chaotic system. The hyper-chaos system undergoes a change from hyperchaos to limit cycle when the parameter varies. The system is not only demonstrated by computer simulations but also verified with bifurcation analysis.

111 citations

Journal ArticleDOI
TL;DR: In this paper, an adaptive control law is derived to make the states of two identical hyperchaotic systems asymptotically synchronized based on the Lyapunov stability theory.
Abstract: This paper discusses control for the master–slave synchronization of a new hyperchaos with five uncertain parameters. An adaptive control law is derived to make the states of two identical hyperchaotic systems asymptotically synchronized based on the Lyapunov stability theory. Finally, a numerical simulation is presented to verify the effectiveness of the proposed synchronization scheme.

73 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: Simulation results show that the proposed algorithm can encrypt colour image effectively and resist various typical attacks.

633 citations

Journal ArticleDOI
TL;DR: The experimental results demonstrate that the suggested encryption algorithm of image has the advantages of large key space and high security, and moreover, the distribution of grey values of the encrypted y image has a random-like behavior.

584 citations

Journal ArticleDOI
TL;DR: The proposed local Shannon entropy measure overcomes several weaknesses of the conventional global Shannon entropyMeasure, including unfair randomness comparisons between images of different sizes, failure to discern image randomness before and after image shuffling, and possible inaccurate scores for synthesized images.

476 citations

Journal ArticleDOI
Lu Xu1, Zhi Li1, Jian Li1, Wei Hua1
TL;DR: A novel bit-level image encryption algorithm that is based on piecewise linear chaotic maps (PWLCM) that is both secure and reliable for image encryption.

449 citations

Journal ArticleDOI
TL;DR: Experimental results and theoretical analysis show that the scheme is able to resist various attacks, so it has extraordinarily high security.

417 citations