Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Qianxue Wang is active.

Publication


Featured researches published by Qianxue Wang.


web information systems modeling | 2010

A pseudo random numbers generator based on chaotic iterations: application to watermarking

Christophe Guyeux; Qianxue Wang; Jacques M. Bahi

In this paper, a new chaotic pseudo-random number generator (PRNG) is proposed. It combines the well-known ISAAC and XORshift generators with chaotic iterations. This PRNG possesses important properties of topological chaos and can successfully pass NIST and TestU01 batteries of tests. This makes our generator suitable for information security applications like cryptography. As an illustrative example, an application in the field of watermarking is presented.


arXiv: Cryptography and Security | 2009

A Novel Pseudo-random Number Generator Based on Discrete Chaotic Iterations

Qianxue Wang; Christophe Guyeux; Jacques M. Bahi

Security of information transmitted through the Internet, against passive or active attacks is an international concern. The use of a chaos-based pseudo-random bit sequence to make it unrecognizable by an intruder, is a field of research in full expansion. This mask of useful information by modulation or encryption is a fundamental part of the TLS Internet exchange protocol. In this paper, a new method using discrete chaotic iterations to generate pseudo-random numbers is presented. This pseudo-random number generator has successfully passed the NIST statistical test suite (NIST SP800-22). Security analysis shows its good characteristics. The application for secure image transmission through the Internet is proposed at the end of the paper.


arXiv: Cryptography and Security | 2010

Randomness Quality of CI Chaotic Generators: Applications to Internet Security

Jacques M. Bahi; Xiaole Fang; Christophe Guyeux; Qianxue Wang

Due to the rapid development of the Internet in recent years, the need to find new tools to reinforce trust and security through the Internet has became a major concern. The discovery of new pseudo-random number generators with a strong level of security is thus becoming a hot topic, because numerous cryptosystems and data hiding schemes are directly dependent on the quality of these generators. At the conference Internet`09, we have described a generator based on chaotic iterations, which behaves chaotically as defined by Devaney. In this paper, the proposal is to improve the speed and the security of this generator, to make its use more relevant in the Internet security context. To do so, a comparative study between various generators is carried out and statistical results are given. Finally, an application in the information hiding framework is presented, to give an illustrative example of the use of such a generator in the Internet security field.


international conference on computer application and system modeling | 2010

Improving random number generators by chaotic iterations application in data hiding

Christophe Guyeux; Qianxue Wang; Jacques M. Bahi

In this paper, a new pseudo-random number generator (PRNG) based on chaotic iterations is proposed. This method also combines the digits of two XORshifts PRNGs. The statistical properties of this new generator are improved: the generated sequences can pass all the DieHARD statistical test suite. In addition, this generator behaves chaotically, as defined by Devaney. This makes our generator suitable for cryptographic applications. An illustration in the field of data hiding is presented and the robustness of the obtained data hiding algorithm against attacks is evaluated.


Journal of Network and Computer Applications | 2014

Suitability of chaotic iterations schemes using XORshift for security applications

Jacques M. Bahi; Xiaole Fang; Christophe Guyeux; Qianxue Wang

The design and engineering of original cryptographic solutions is a major concern to provide secure information systems. In a previous study, we have described a generator based on chaotic iterations, which uses the well-known XORshift generator. By doing so, we have improved the statistical performances of XORshift and make it behave chaotically, as defined by Devaney. The speed and security of this former generator have been improved in a second study, to make its usage more relevant in the Internet security context. In this paper, these contributions are summarized and a new version of the generator is introduced. It is based on a new Lookup Table implying a large improvement of speed. A comparison and a security analysis between the XORshift and these three versions of our generator are proposed, and various new statistical results are given. Finally, an application in the information hiding framework is presented, to give an illustrative example of the use of such a generator in the Internet security field.


International Journal of Bifurcation and Chaos | 2016

Proving Chaotic Behavior of CBC Mode of Operation

Abdessalem Abidi; Qianxue Wang; Belgacem Bouallegue; Mohsen Machhout; Christophe Guyeux

The cipher block chaining (CBC) mode of operation was invented by IBM (International Business Machine) in 1976. It presents a very popular way of encrypting that is used in various applications. In this paper, we have mathematically proven that, under some conditions, the CBC mode of operation can admit a chaotic behavior according to Devaney. Some cases will be properly studied in order to provide evidence for this idea.


arXiv: Cryptography and Security | 2011

Evaluating Quality of Chaotic Pseudo-Random Generators: Application to Information Hiding

Jacques M. Bahi; Xiaole Fang; Christophe Guyeux; Qianxue Wang


arXiv: Cryptography and Security | 2011

Class of Trustworthy Pseudo-Random Number Generators

Jacques M. Bahi; Jean-François Couchot; Christophe Guyeux; Qianxue Wang


arXiv: Chaotic Dynamics | 2016

Randomness and disorder of chaotic iterations. Applications in information security field.

Xiaole Fang; Christophe Guyeux; Qianxue Wang; Jacques M. Bahi


Archive | 2018

Design of Digital Chaotic Systems Updated by Random Iterations

Qianxue Wang; Simin Yu; Christophe Guyeux

Collaboration


Dive into the Qianxue Wang's collaboration.

Top Co-Authors

Avatar

Christophe Guyeux

University of Franche-Comté

View shared research outputs
Top Co-Authors

Avatar

Jacques M. Bahi

University of Franche-Comté

View shared research outputs
Top Co-Authors

Avatar

Xiaole Fang

University of Franche-Comté

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Simin Yu

Guangdong University of Technology

View shared research outputs
Top Co-Authors

Avatar

Pierre-Cyrille Héam

University of Franche-Comté

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge