Skip to main content

and
  1. No Access

    Article

    Chosen-plaintext attack of an image encryption scheme based on modified permutation–diffusion structure

    Since the first appearance in Fridrich’s design, the usage of permutation–diffusion structure for designing digital image cryptosystem has been receiving increasing research attention in the field of chaos-bas...

    Yuansheng Liu, Leo Yu Zhang, Jia Wang, Yushu Zhang, Kwok-wo Wong in Nonlinear Dynamics (2016)

  2. No Access

    Article

    Cryptanalyzing an image encryption algorithm based on scrambling and Veginère cipher

    Recently, an image encryption algorithm based on scrambling and Veginère cipher has been proposed. However, it was soon cryptanalyzed by Zhang et al. using a method composed of both chosen-plaintext attack and...

    Li Zeng, Renren Liu, Leo Yu Zhang, Yuansheng Liu in Multimedia Tools and Applications (2016)

  3. No Access

    Article

    An image encryption scheme based on time-delay and hyperchaotic system

    In this paper, a novel image encryption scheme based on time-delay and hyperchaotic system is suggested. The time-delay phenomenon is commonly observed in daily life and is incorporated in the generation of ps...

    Guodong Ye, Kwok-Wo Wong in Nonlinear Dynamics (2013)

  4. No Access

    Article

    Breaking a novel colour image encryption algorithm based on chaos

    Recently, a colour image encryption algorithm based on chaos was proposed by cascading two position permutation operations and one substitution operation, which are all determined by some pseudo-random number ...

    Chengqing Li, Leo Yu Zhang, Rong Ou, Kwok-Wo Wong, Shi Shu in Nonlinear Dynamics (2012)

  5. No Access

    Article

    Decouple implementation of weight decay for recursive least square

    In the conventional recursive least square (RLS) algorithm for multilayer feedforward neural networks, controlling the initial error covariance matrix can limit weight magnitude. However, the weight decay effe...

    Andrew Chi-Sing Leung, Yi **ao, Yong Xu, Kwok-Wo Wong in Neural Computing and Applications (2012)

  6. No Access

    Article

    An efficient chaotic image encryption algorithm based on a generalized Arnold map

    An efficient image encryption algorithm using the generalized Arnold map is proposed. The algorithm is composed of two stages, i.e., permutation and diffusion. First, a total circular function, rather than the...

    Guodong Ye, Kwok-Wo Wong in Nonlinear Dynamics (2012)

  7. No Access

    Chapter and Conference Paper

    Chaos-Based Selective Encryption for AVS Video Coding Standard

    A chaos-based selective encryption scheme implemented on the Audio Video Standard (AVS) is proposed. The scheme employs multiple Rényi chaotic maps to generate a pseudorandom bit sequence for the encryption of...

    Oi-Yan Lui, Ching-Hung Yuen, Kwok-Wo Wong in Advances in Multimedia Information Process… (2012)

  8. No Access

    Chapter

    Image Encryption Using Chaotic Maps

    In recent years, a variety of chaos-based image cryptosystems have been proposed. An architecture of such kind of cryptosystems is composed of multiple rounds of substitution and diffusion. In the substitution...

    Kwok-Wo Wong in Intelligent Computing Based on Chaos (2009)

  9. No Access

    Chapter and Conference Paper

    The Local True Weight Decay Recursive Least Square Algorithm

    The true weight decay recursive least square (TWDRLS) algorithm is an efficient fast online training algorithm for feedforward neural networks. However, its computational and space complexities are very large....

    Chi Sing Leung, Kwok-Wo Wong, Yong Xu in Neural Information Processing (2008)

  10. No Access

    Article

    A More Secure Chaotic Cryptographic Scheme Based on the Dynamic Look-Up Table

    We have proposed a chaotic cryptographic scheme based on iterating the logistic map and updating the look-up table dynamically. However, it has been broken recently. In this paper, the weaknesses of the origin...

    Kwok-Wo Wong, Kwan-Pok Man, Shujun Li in Circuits, Systems and Signal Processing (2005)

  11. No Access

    Article

    Hopf Bifurcation on a Two-Neuron System with Distributed Delays: A Frequency Domain Approach

    In this paper, a more general two-neuron model with distributed delays and weak kernel is investigated. By applying the frequency domain approach and analyzing the associated characteristic equation, the exist...

    **aofeng Liao, Shaowen Li, Kwok-wo Wong in Nonlinear Dynamics (2003)

  12. No Access

    Article

    Hopf Bifurcation and Stability of Periodic Solutions for van der Pol Equation with Distributed Delay

    The van der Pol equation with a distributed time delay is analyzed. Itslinear stability is investigated by employing the Routh–Hurwitzcriteria. Moreover, the local asymptotic stability conditions are alsoderiv...

    **aofeng Liao, Kwok-wo Wong, Zhongfu Wu in Nonlinear Dynamics (2001)

  13. Chapter

    An Elliptic Curve Random Number Generator

    A random number generator based on the addition of the points on an elliptic curve over finite fields is proposed. Sequences produced by this generator have passed standard statistical tests. As a result, the ...

    Lap-piu Lee, Kwok-wo Wong in Communications and Multimedia Security Iss… (2001)

  14. Chapter

    A Modified Chaotic Cryptographic Method

    We propose a modified version of the chaotic cryptographic method based on iterating a logistic map. Simulation results show that the distribution of the ciphertext is flatter and the encryption time is shorte...

    Wai-kit Wong, Lap-piu Lee, Kwok-wo Wong in Communications and Multimedia Security Iss… (2001)

  15. No Access

    Article

    A Practical Sequential Method for Principal Component Analysis

    When increasing numbers of principalcomponents are extracted by using the sequentialmethod proposed in [1] by Banour and Azimi-Sadjadi, the accumulated extractionerror will become dominant and affect the extra...

    Arnold Shu-Yan Wong, Kwok-Wo Wong, Chi-Sing Wong in Neural Processing Letters (2000)

  16. No Access

    Article

    On-line Successive Synthesis of Wavelet Networks

    An approach for the on-line synthesis of wavelet network using recursive least square (RLS) training is proposed. It is based on the concept of successive approximation of the system function to be learned. By...

    Kwok-Wo Wong, Andrew Chi-Sing Leung in Neural Processing Letters (1998)