Author of the publication

True random number generator based on mouse movement and chaotic hash function.

, , , , and . Inf. Sci., 179 (19): 3442-3450 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Low-cost and high-efficiency privacy-protection scheme for distributed compressive video sensing in wireless multimedia sensor networks., , , , and . J. Netw. Comput. Appl., (2020)A Two-Step Approach for Longitudinal Registration of Retinal Images., , , and . J. Medical Syst., 40 (12): 277:1-277:13 (2016)Perturbation meets key-based interval splitting arithmetic coding: security enhancement and chaos generalization., , , , , and . Secur. Commun. Networks, 9 (1): 43-53 (2016)A Novel Image Authentication with Tamper Localization and Self-Recovery in Encrypted Domain Based on Compressive Sensing., , and . Secur. Commun. Networks, (2018)Meaningful Image Encryption Based on Reversible Data Hiding in Compressive Sensing Domain., , , , , and . Secur. Commun. Networks, (2018)Quantum Identity Authentication in the Counterfactual Quantum Key Distribution Protocol., , , , , and . Entropy, 21 (5): 518 (2019)Convolutional neural networks tamper detection and location based on fragile watermarking., , and . Appl. Intell., 53 (20): 24056-24067 (October 2023)An image coding scheme using parallel compressive sensing for simultaneous compression-encryption applications., , , and . J. Vis. Commun. Image Represent., (2017)A Compressive Sensing Based Image Encryption and Compression Algorithm With Identity Authentication and Blind Signcryption., , , , and . IEEE Access, (2020)On the security of symmetric ciphers based on DNA coding., , , and . Inf. Sci., (2014)