Her scientific interests lie mostly in Algorithm, Theoretical computer science, Encryption, Hash function and Chaotic. In general Algorithm, her work in Cryptography is often linked to Block matrix linking many areas of study. Her Theoretical computer science research is multidisciplinary, incorporating elements of Ciphertext-only attack, Pixel, Key schedule and Integral cryptanalysis.
Her studies in Encryption integrate themes in fields like Image, Digital image, Robustness and Permutation. Her study in the fields of Cryptographic hash function, Collision resistance and Rolling hash under the domain of Hash function overlaps with other disciplines such as Password-authenticated key agreement. Her Chaotic study integrates concerns from other disciplines, such as Probabilistic encryption and CHAOS.
Her primary scientific interests are in Algorithm, Encryption, Theoretical computer science, Image and Compressed sensing. Her Algorithm research incorporates elements of Hash function and Chaotic. Her Encryption research is multidisciplinary, relying on both Information hiding, Pixel, Cryptography and Robustness.
Her Theoretical computer science study combines topics from a wide range of disciplines, such as CHAOS, Chaotic map, Chebyshev filter, Ciphertext-only attack and Probabilistic encryption. Her biological study spans a wide range of topics, including Vector quantization and Embedding. Her Compressed sensing study combines topics in areas such as Discrete cosine transform, Computational complexity theory, Decoding methods, Stream cipher and Iterative reconstruction.
Encryption, Compressed sensing, Decoding methods, Real-time computing and Algorithm are her primary areas of study. Her Encryption research incorporates themes from Information hiding and Matching. The Compressed sensing study combines topics in areas such as Computational complexity theory, Iterative reconstruction and Cipher.
Her Iterative reconstruction study incorporates themes from Multimedia, Signal processing, Image and Sample. She has included themes like Group of pictures and Data transmission in her Real-time computing study. In most of her Algorithm studies, her work intersects topics such as Image compression.
Her main research concerns Information hiding, Encryption, Least significant bit, Algorithm and Cryptanalysis. The study incorporates disciplines such as Image quality, Decoding methods and Image processing in addition to Information hiding. Her Encryption research includes elements of Computer vision and Compressed sensing.
Least significant bit overlaps with fields such as Redundancy and Bit plane in her research.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Analysis and improvement of a chaos-based image encryption algorithm
Di Xiao;Xiaofeng Liao;Pengcheng Wei.
Chaos Solitons & Fractals (2009)
An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules
Ayesha Kulsoom;Di Xiao;Aqeel-Ur-Rehman;Syed Ali Abbas.
Multimedia Tools and Applications (2016)
One-way Hash function construction based on the chaotic map with changeable-parameter
Di Xiao;Xiaofeng Liao;Shaojiang Deng.
Chaos Solitons & Fractals (2005)
A novel key agreement protocol based on chaotic maps
Di Xiao;Xiaofeng Liao;Shaojiang Deng.
Information Sciences (2007)
An image encryption scheme based on rotation matrix bit-level permutation and block diffusion
Yushu Zhang;Di Xiao.
Communications in Nonlinear Science and Numerical Simulation (2014)
A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations
Yushu Zhang;Di Xiao;Yonglu Shu;Jing Li.
Signal Processing-image Communication (2013)
One-way hash function construction based on 2D coupled map lattices
Yong Wang;Xiaofeng Liao;Di Xiao;Kwok-Wo Wong.
Information Sciences (2008)
Cryptanalysis and enhancements of image encryption using combination of the 1D chaotic map
Hui Wang;Di Xiao;Xin Chen;Hongyu Huang.
Signal Processing (2018)
Embedding cryptographic features in compressive sensing
Yushu Zhang;Jiantao Zhou;Fei Chen;Leo Yu Zhang.
A novel Hash algorithm construction based on chaotic neural network
Yantao Li;Shaojiang Deng;Di Xiao.
Neural Computing and Applications (2011)
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: