Y
Ying Niu
Researcher at Zhengzhou University of Light Industry
Publications - 37
Citations - 594
Ying Niu is an academic researcher from Zhengzhou University of Light Industry. The author has contributed to research in topics: Encryption & Confusion and diffusion. The author has an hindex of 9, co-authored 35 publications receiving 397 citations. Previous affiliations of Ying Niu include Zhengzhou University.
Papers
More filters
Journal ArticleDOI
Application of a novel IWO to the design of encoding sequences for DNA computing
TL;DR: A new methodology based on the IWO algorithm is developed to optimize encoding sequences by defining the colonizing behavior of weeds to overcome the obstacles of the original IwO algorithm, which cannot be applied to discrete problems directly.
Journal ArticleDOI
An Image Encryption Method Based on the Feistel Network and Dynamic DNA Encoding
Xuncai Zhang,Zheng Zhou,Ying Niu +2 more
TL;DR: The experimental results show that the proposed method can effectively encrypt the image and has prominent characteristics, such as strong plaintext sensitivity, a large key space, and excellent ciphertext statistical properties.
Proceedings ArticleDOI
An improved shuffled frog leaping algorithm with cognitive behavior
TL;DR: A novel dasiacognition componentpsila is introduced to enhance the effectiveness of the SFL, namely frog not only adjust its position according to the best individual within the memeplex or the global best of population but also according to thinking of the frog itself.
Journal ArticleDOI
A Chaos-Based Image Encryption Technique Utilizing Hilbert Curves and H-Fractals
TL;DR: The experimental results and security analysis show that the encryption technique has enough key space to resist exhaustive attacks and can effectively resist statistical attacks, differential attacks, noise attacks, and cropping attacks.
Journal ArticleDOI
An image encryption approach based on chaotic maps and genetic operations
Ying Niu,Zheng Zhou,Xuncai Zhang +2 more
TL;DR: The theoretical analysis and simulation results indicate that the Keccak algorithm is sensitive to keys and can effectively defend statistical and differential attacks, indicating that it has good security and application potential.