scispace - formally typeset
Search or ask a question
Author

Weijia Cao

Other affiliations: Chinese Academy of Sciences
Bio: Weijia Cao is an academic researcher from University of Macau. The author has contributed to research in topics: Computer science & Encryption. The author has an hindex of 4, co-authored 7 publications receiving 256 citations. Previous affiliations of Weijia Cao include Chinese Academy of Sciences.

Papers
More filters
Journal ArticleDOI
TL;DR: A novel image encryption algorithm using a bitplane of a source image as the security key bitplane to encrypt images and a bit-level scrambling algorithm to change bit positions is proposed.

155 citations

Journal ArticleDOI
TL;DR: A lossless edge maps based image cryptosystem for medical image that has a strong resistance against various security attacks and outperforms other state-of-the-art methods.

128 citations

Journal ArticleDOI
TL;DR: A new two-dimensional infinite collapse map (2D-ICM) is proposed, which has better ergodicity, hyperchaotic property, unpredictability, and a wider chaotic region than existing 2D chaotic maps.

74 citations

Journal ArticleDOI
TL;DR: Xue et al. as mentioned in this paper proposed a hyperspectral image transformer (HiT) classification network by embedding convolution operations into the transformer structure to capture the subtle spectral discrepancies and convey the local spatial context information.
Abstract: Hyperspectral image (HSI) classification is an important task in earth observation missions. Convolution neural networks (CNNs) with the powerful ability of feature extraction have shown prominence in HSI classification tasks. However, existing CNN-based approaches cannot sufficiently mine the sequence attributes of spectral features, hindering the further performance promotion of HSI classification. This article presents a hyperspectral image transformer (HiT) classification network by embedding convolution operations into the transformer structure to capture the subtle spectral discrepancies and convey the local spatial context information. HiT consists of two key modules, i.e., spectral-adaptive 3-D convolution projection module and convolution permutator (ConV-Permutator) to retrieve the subtle spatial–spectral discrepancies. The spectral-adaptive 3-D convolution projection module produces the local spatial–spectral information from HSIs using two spectral-adaptive 3-D convolution layers instead of the linear projection layer. In addition, the Conv-Permutator module utilizes the depthwise convolution operations to separately encode the spatial–spectral representations along the height, width, and spectral dimensions, respectively. Extensive experiments on four benchmark HSI datasets, including Indian Pines, Pavia University, Houston2013, and Xiongan (XA) datasets, show the superiority of the proposed HiT over existing transformers and the state-of-the-art CNN-based methods. Our codes of this work are available at https://github.com/xiachangxue/DeepHyperX for the sake of reproducibility.

32 citations

Journal ArticleDOI
TL;DR: A modeling scheme to decompose the discrete Fourier transform (DFT) matrix recursively into a set of sparse matrices and is able to obtain different FFT representations with less computation operations than state of the arts.

16 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: A new two-dimensional Sine Logistic modulation map (2D-SLMM) which is derived from the Logistic and Sine maps is introduced which has the wider chaotic range, better ergodicity, hyperchaotic property and relatively low implementation cost.

585 citations

Journal ArticleDOI
TL;DR: Experimental results and security analyses both confirm that the proposed algorithm has not only an excellent encryption result but also resists various typical attacks.

502 citations

Journal ArticleDOI
Lu Xu1, Zhi Li1, Jian Li1, Wei Hua1
TL;DR: A novel bit-level image encryption algorithm that is based on piecewise linear chaotic maps (PWLCM) that is both secure and reliable for image encryption.

449 citations

Journal ArticleDOI
TL;DR: A novel image encryption algorithm is designed by employing bit-level permutation and diffusion simultaneously, which has good encryption effect and high efficiency and can resist typical attacks including statistical, brute-force, differential attacks and so forth.

283 citations

Journal ArticleDOI
TL;DR: A solution for secure and efficient image encryption with the help of self-adaptive permutation–diffusion and DNA random encoding and the reusability of the random variables can dramatically promote the efficiency of the cryptosystem, which renders great potential for real-time secure image applications.

251 citations