Shaojun Zeng

Work place: Department of Mathematics, Shantou University, Shantou, Guangdong, 515063, China

E-mail: 10sjzeng@stu.edu.cn

Website:

Research Interests: Computational Mathematics, Mathematics

Biography

Shaojun Zeng: Undergraduate student at department of mathematics in Shantou University.

Author Articles
A Secure and Efficient Image Encryption Scheme Based on Tent Map and Permutation-substitution Architecture

By Ruisong Ye Shaojun Zeng Junming Ma Chuting Lai

DOI: https://doi.org/10.5815/ijmecs.2014.03.03, Pub. Date: 8 Mar. 2014

A secure image encryption scheme based on 2D skew tent map is proposed for the encryption of color images. The proposed encryption scheme is composed of one permutation process and one substitution process. The 3D color plain-image matrix is converted to 2D image matrix first, then 2D skew tent map is utilized to generate chaotic sequences, which are used for both permutation process and substitution process. The chaotic sequence for permutation process is dependent on plain-image and cipher keys, resulting in good key sensitivity and plaintext sensitivity. The substitution process is first initiated with the initial vectors generated by the cipher keys and 2D skew tent map, then the gray values of row and column pixels of 2D image matrix are mixed with the pseudorandom number sequences via bitxoring operation. Both permutation process and substitution process are executed row-by-row and column-by-column instead of pixel-by-pixel to improve the speed of encryption. The security and performance of the proposed image encryption have been analyzed, including histograms, correlation coefficients, information entropy, key sensitivity analysis, key space analysis, differential analysis, encryption/decryption rate analysis etc. All the experimental results suggest that the proposed image encryption scheme is robust and secure and can be used for secure image and video communication applications.

[...] Read more.
An Image Encryption Scheme Based on Bit Circular Shift and Bi-directional Diffusion

By Ruisong Ye Shaojun Zeng Peiqian Lun Junming Ma Chuting Lai

DOI: https://doi.org/10.5815/ijitcs.2014.01.10, Pub. Date: 8 Dec. 2013

A novel image encryption scheme based on chaotic system is proposed. The proposed encryption scheme utilizes one tent map to generate a pseudo-random sequence and then shift the bits of the expanding 0-1 image circularly so as to shuffle the image gray values. To make the encryption scheme resist differential attack efficiently, generalized Arnold maps and Bernoulli shift maps are applied to produce two pseudo-random gray value sequences and then diffuse the gray values bi-directionally. The bit circular shift process and diffusion processes greatly confuse the statistical nature between plain-images and cipher-images. Security analyses including key sensitivity analysis, key space analysis, statistical analysis, differential attack analysis and information entropy analysis are performed. All the experimental results demonstrate that the proposed image encryption scheme possesses large key space to frustrate brute-force attack efficiently and can resist statistical attack, differential attack, etc.

[...] Read more.
Other Articles