scispace - formally typeset
Y

Ying Niu

Researcher at Zhengzhou University of Light Industry

Publications -  37
Citations -  594

Ying Niu is an academic researcher from Zhengzhou University of Light Industry. The author has contributed to research in topics: Encryption & Confusion and diffusion. The author has an hindex of 9, co-authored 35 publications receiving 397 citations. Previous affiliations of Ying Niu include Zhengzhou University.

Papers
More filters
Journal ArticleDOI

Application of a novel IWO to the design of encoding sequences for DNA computing

TL;DR: A new methodology based on the IWO algorithm is developed to optimize encoding sequences by defining the colonizing behavior of weeds to overcome the obstacles of the original IwO algorithm, which cannot be applied to discrete problems directly.
Journal ArticleDOI

An Image Encryption Method Based on the Feistel Network and Dynamic DNA Encoding

TL;DR: The experimental results show that the proposed method can effectively encrypt the image and has prominent characteristics, such as strong plaintext sensitivity, a large key space, and excellent ciphertext statistical properties.
Proceedings ArticleDOI

An improved shuffled frog leaping algorithm with cognitive behavior

TL;DR: A novel dasiacognition componentpsila is introduced to enhance the effectiveness of the SFL, namely frog not only adjust its position according to the best individual within the memeplex or the global best of population but also according to thinking of the frog itself.
Journal ArticleDOI

A Chaos-Based Image Encryption Technique Utilizing Hilbert Curves and H-Fractals

TL;DR: The experimental results and security analysis show that the encryption technique has enough key space to resist exhaustive attacks and can effectively resist statistical attacks, differential attacks, noise attacks, and cropping attacks.
Journal ArticleDOI

An image encryption approach based on chaotic maps and genetic operations

TL;DR: The theoretical analysis and simulation results indicate that the Keccak algorithm is sensitive to keys and can effectively defend statistical and differential attacks, indicating that it has good security and application potential.