Are you Zhiming Yang?

Claim your profile

Publications (5)0 Total impact

  • [Show abstract] [Hide abstract]
    ABSTRACT: Recently, the chaos based cryptographic algorithms have suggested some meaningful techniques to develop efficient image encryption schemes. In this paper, we propose a new digital image encryption scheme based on the piecewise linear chaotic map (PWLCM) in order to meet the requirements of the secure encryption. The proposed scheme is described in detail, along with the security analyses including key space analysis, sensitivity analysis, information entropy analysis and differential attack analysis. The results show that the suggested image encryption scheme has some properties desirable in a good security cryptosystem.
    Cybernetics and Intelligent Systems, 2008 IEEE Conference on; 10/2008
  • [Show abstract] [Hide abstract]
    ABSTRACT: In this paper, a novel block digital image encryption scheme based on a chaotic coupled map lattices (CML) is reported. Within this scheme, an original image is decomposed into sub-blocks with a given size, and an external secret key with 192-bit is used and mapped to the system parameters, which are employed to generate a spatiotemporal chaotic binary sequence matrix to encrypt the block original image. Besides, the former sub-block encrypted result will be acted as a feedback to the following sub-block encryption proc-ess. The proposed scheme is described in detail, along with the security analyses such as key space analysis, sensitivity analysis, information entropy analysis and correlation coefficients analysis of adjacent pixels. The computer simulation results indicate that the suggested image encryption scheme has some properties desirable in a good security cryptosystem.
    International Conference on Natural Computation. 10/2008; 4:595-599.
  • [Show abstract] [Hide abstract]
    ABSTRACT: Based on one-way coupled map lattices model (OCML), binary spatiotemporal chaotic sequences are generated and employed in the application of image spread-spectrum communication over the Internet. Since the spatiotemporal chaotic sequences are very sensitive to the coupled coefficient, initial value of driven sequence and as well as control parameters, the difficulties of cracking chaotic spread-spectrum sequences are increased greatly. Furthermore, the system secure keys are encrypted by using RSA algorithm so as to guarantee the consistency of parameters that used by image sender and receiver, as a result the security and reliability of the scheme are enhanced. The results of numerical stimulation indicate the scheme proposed in this paper is feasible, and some cryptography properties of this system are considered in terms of key space and the sensitivity of encrypted image with respect to the key.
    01/2008;
  • [Show abstract] [Hide abstract]
    ABSTRACT: In this paper, a novel block encryption cipher based on chaotic dynamical system is proposed. The algorithm operates on 64-bit plaintext blocks, and the key is 128 bits long. In round function, the logistic chaotic map and three algebraic group operations are mixed. As the algorithm is a Feistel network, it can be used for both encryption and decryption. Furthermore, the security of the algorithm is analyzed in details. The cryptanalyse results indicate that the algorithm has good diffusion and confusion properties, and it is very sensitive to the plaintexts and keys. Finally, by using differential cryptanalysis we found the upper bound of difference character capability for this cipher is 2<sup>-6.6601</sup> and 2<sup>-17.1862</sup> when block length is 16 and 32 bits long, respectively.
    Natural Computation, 2007. ICNC 2007. Third International Conference on; 09/2007
  • Jun Peng, Xiaofeng Liao, Zhiming Yang
    [Show abstract] [Hide abstract]
    ABSTRACT: In this paper, we propose a novel feedback block chaotic cipher algorithm (FBCCA) based on the chaotic time-delay neuron system and feistel network. The inherent features of chaotic system make the cryptosystem more complex and more difficult to be analyzed or predicted. In FBCCA, the output ciphertext block corresponding to the current input plaintext block is fed back into the generation process of the number of round, which will be used for encrypting the next plaintext block. Furthermore, the round numbers (times iterated for each block) and the sequence number of S-box (used in each round) have a closely relationship with the secret key, and both are dynamically generated by chaotic system. The results of computer simulation experiments show that the proposed cipher has excellent cryptographic properties, i.e., the cipher is very sensitive with respect to the slight change of the plaintext and the secret key, and the randomicity of the ciphertext is very ideal. At last, the security of the algorithm is studied, and the results indicate that the algorithm possesses higher capability of resisting the brute-force attack. Some further studies are also suggested in this this paper
    01/2006;