Skip to main content

and
  1. No Access

    Article

    A dual image encryption method based on improved Henon map** and improved Logistic map**

    In this paper, an improved two-dimensional Henon map** model and an improved one-dimensional Logistic map** model are designed. By analyzing the bifurcation diagram, chaotic orbit, Lyapunov index and appro...

    Shiming Niu, Ru Xue, Cong Ding in Multimedia Tools and Applications (2024)

  2. No Access

    Article

    Image splicing manipulation location by multi-scale dual-channel supervision

    The swift growth of diverse editing software has resulted in image splicing manipulation becoming more complex, the discovery of a meticulously crafted splice forgery in digital images poses a significant chal...

    **gyun Hu, Ru Xue, Guofeng Teng, Shiming Niu in Multimedia Tools and Applications (2024)

  3. No Access

    Article

    Color image encryption based on lite dense-ResNet and bit-XOR diffusion

    Images contain a wealth of information and are frequently targeted by malicious attackers when transmitted over public networks. Fortunately, image encryption prevents confidential information from being acqui...

    Zhenjie Bao, Ru Xue, **gyun Hu, Yue Liu in Multimedia Tools and Applications (2024)

  4. No Access

    Chapter and Conference Paper

    Review of Image Encryption Based on Bibliometrics and Visualized Analysis

    Image encryption is a key technology for protecting image confidentiality and integrity in various applications. However, there is a lack of comprehensive and quantitative overview of the relevant publications...

    Zhaoyang Liu, Ru Xue in Frontiers of Networking Technologies (2024)

  5. No Access

    Article

    Signal-sensing dynamic S-box image encryption with 2D Griewank–sin map

    Chaos systems serve as crucial tools in information security, particularly in applications such as image encryption and multimedia encryption. However, existing chaos systems suffer from limitations in complex...

    Cong Ding, Ru Xue in Nonlinear Dynamics (2023)

  6. No Access

    Article

    Visual image encryption based on compressed sensing and Cycle-GAN

    At present, most image encryption schemes directly change plaintext images into ciphertext images without visual significance, and such ciphertext images can be detected by hackers during transmission, and the...

    Zhaoyang Liu, Ru Xue in The Visual Computer (2023)

  7. No Access

    Article

    Medical Image Encryption using Biometric Image Texture Fusion

    In conjunction with pandemics, medical image data are growing exponentially. In some countries, hospitals collect biometric data from patients, such as fingerprints, iris, or faces. This data can be used for t...

    Zhaoyang Liu, Ru Xue in Journal of Medical Systems (2023)

  8. No Access

    Chapter and Conference Paper

    Fire Detection Based on Visual Image from 2010 to 2021: A Bibliometric Analysis and Visualization

    Fire hazards are increasing, its detection technology has been innovated and developed, which has gradually garnered attention in diverse fields. To clearly know the knowledge structure of fire detection based...

    Ru Xue, **gyun Hu, Yue Liu in Intelligent Robotics (2023)

  9. No Access

    Article

    Real-Time Video Fire Detection via Modified YOLOv5 Network Model

    Accidental fire outbreak threatens people's life and property safety, and it is of great significance to study fire detection and alarm early. The detection range of traditional fire detectors is limited, and ...

    Zongsheng Wu, Ru Xue, Hong Li in Fire Technology (2022)

  10. Article

    Knowledge graph analysis and visualization of AI technology applied in COVID-19

    With the global outbreak of coronavirus disease (COVID-19) all over the world, artificial intelligence (AI) technology is widely used in COVID-19 and has become a hot topic. In recent 2 years, the application ...

    Zongsheng Wu, Ru Xue, Meiyun Shao in Environmental Science and Pollution Research (2022)

  11. No Access

    Article

    Image scrambling adversarial autoencoder based on the asymmetric encryption

    For the purpose of information transmission security, image scrambling is to encrypt the image by changing the image pixel values and pixel positions. Based on the asymmetric encryption, we propose a model of ...

    Zhenjie Bao, Ru Xue, Yadong ** in Multimedia Tools and Applications (2021)

  12. No Access

    Article

    Characteristics of methane emissions in the Living Water Garden in Chengdu City from 2012 to 2017

    CH4 flux measured by a portable chamber using an infrared analyzer was compared with the flux by static chamber measurement for CW at 13 different sites from May 2012 to May 2017 in the Living Water Garden (LWG) ...

    Ru Xue, **aoling Liu, in Environmental Science and Pollution Resear… (2020)

  13. No Access

    Chapter and Conference Paper

    The Design of a High-Speed Image Acquisition System

    Image acquisition system is responsible for collecting and filtering the image data to reduce the size of data processing. The efficiency of image acquisition will directly affect our ability to process image ...

    Jie Chen, Ru Xue, Qi Wang in Proceedings of the 2012 International Conf… (2014)

  14. No Access

    Chapter and Conference Paper

    Design and Research of Embedded Gateway Based on CAN Bus

    Based on the OPC technology and TCP/IP communication protocol, a set of industrial control network with enterprise information network communications technology was designed, the network structure of the prog...

    Ru Xue in Proceedings of the 2nd International Confe… (2013)

  15. Article

    Open Access

    A further insight into the biosorption mechanism of Pt(IV) by infrared spectrometry

    Platinum nanomaterial is one of the significant noble metal catalysts, and the interaction of platinum with microbe is one of the key factors in influencing the size and the distribution of the platinum nanopa...

    Zhongyu Lin, Ru Xue, Yiwen Ye, Jianhong Zheng, Zhenling Xu in BMC Biotechnology (2009)