Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Shangzhu Jin is active.

Publication


Featured researches published by Shangzhu Jin.


ieee conference on cybernetics and intelligent systems | 2008

A novel scheme for image encryption based on piecewise linear chaotic map

Jun Peng; Shangzhu Jin; Yongguo Liu; Zhiming Yang; Mingying You; Yangjun Pei

Recently, the chaos based cryptographic algorithms have suggested some meaningful techniques to develop efficient image encryption schemes. In this paper, we propose a new digital image encryption scheme based on the piecewise linear chaotic map (PWLCM) in order to meet the requirements of the secure encryption. The proposed scheme is described in detail, along with the security analyses including key space analysis, sensitivity analysis, information entropy analysis and differential attack analysis. The results show that the suggested image encryption scheme has some properties desirable in a good security cryptosystem.


international conference on natural computation | 2007

Research on a Block Encryption Cipher Based on Chaotic Dynamical System

Jun Peng; Mingying You; Zhiming Yang; Shangzhu Jin

In this paper, a novel block encryption cipher based on chaotic dynamical system is proposed. The algorithm operates on 64-bit plaintext blocks, and the key is 128 bits long. In round function, the logistic chaotic map and three algebraic group operations are mixed. As the algorithm is a Feistel network, it can be used for both encryption and decryption. Furthermore, the security of the algorithm is analyzed in details. The cryptanalyse results indicate that the algorithm has good diffusion and confusion properties, and it is very sensitive to the plaintexts and keys. Finally, by using differential cryptanalysis we found the upper bound of difference character capability for this cipher is 2-6.6601 and 2-17.1862 when block length is 16 and 32 bits long, respectively.


ieee international conference on cognitive informatics and cognitive computing | 2013

Research on a novel image encryption algorithm based on the hybrid of chaotic maps and DNA encoding

Jun Peng; Shangzhu Jin; Liang Lei; Qi Han

Encryption is a usually employed technique to protect the image data from unauthorized access. In this paper, a novel digital image encryption algorithm with a 192-bit key based on the hybrid of chaotic maps and DNA encoding is proposed. When designing the algorithm, we take advantage of the instinct properties of chaos system. The original image is firstly permuted by Arnolds cat Map to obtain the better confusion, then it is encoded into a DNA image by using DNA encoding. After that, each nucleotide of DNA image is transformed into its base pair by means of the complementary rule and XORed with a hyper-chaotic binary sequence. Experimental example and security analyses results show the proposed algorithm effective and secure.


ieee international conference on cognitive informatics and cognitive computing | 2012

Construction and analysis of dynamic S-boxes based on spatiotemporal chaos

Jun Peng; Shangzhu Jin; Liang Lei; Xiaofeng Liao

The substitution box (S-boxes) is a very important component of block cipher. This paper is devoted to presenting a novel approach for generating dynamically S-boxes using a spatiotemporal chaotic system. Within the algorithm, the key is mapped to system parameters and the hyper-chaotic sequences are generated to construct S-boxes. With different keys, lots of distinct S-boxes can be obtained dynamically. The analytic results indicate that all the criteria such as bijection, nonlinearity, SAC, BIC and differential approximation probability are found to hold in the obtained S-boxes. Furthermore, the S-boxs sensitivity to the key is also satisfied well, indicating that the proposed approach can be suitable for designing block cipher with dynamic S-boxes.


international conference on natural computation | 2008

An Image Encryption Scheme Based on Chaotic Map

Jun Peng; Shangzhu Jin; Guorong Chen; Zhiming Yang; Xiaofeng Liao

In this paper, a novel block digital image encryption scheme based on a chaotic coupled map lattices (CML) is reported. Within this scheme, an original image is decomposed into sub-blocks with a given size, and an external secret key with 192-bit is used and mapped to the system parameters, which are employed to generate a spatiotemporal chaotic binary sequence matrix to encrypt the block original image. Besides, the former sub-block encrypted result will be acted as a feedback to the following sub-block encryption process. The proposed scheme is described in detail, along with the security analyses such as key space analysis, sensitivity analysis, information entropy analysis and correlation coefficients analysis of adjacent pixels. The computer simulation results indicate that the suggested image encryption scheme has some properties desirable in a good security cryptosystem.


international conference on natural computation | 2009

A Novel Digital Image Encryption Algorithm Based on Hyperchaos by Controlling Lorenz System

Jun Peng; Shangzhu Jin; Xiaofeng Liao

This paper presents a new image encryption algorithm based on a four-dimensional (4D) continuous-time autonomous hyperchaotic Lorenz system by introducing a simple state feedback controller. The proposed algorithm is described in detail, along with the security analyses including sensitivity analysis, information entropy analysis and differential attack analysis. The results show that the suggested algorithm has some properties desirable in a good security cryptosystem.


international conference of fuzzy information and engineering | 2009

A Fuzzy Path Selection Power-Based for MANET

Ning Chen; Qi-min Zhang; Shangzhu Jin

The fuzzy path selection is a framework for mobile ad hoc networks in which inaccurate information is available for making a routing decision. Ad hoc wireless networks are power constrained since nodes operate with a limited battery energy. To maximize the lifetime of these networks, transactions through mobile nodes must be controlled. This paper presents a fuzzy extension to Ad hoc On demand Distance Vector routing protocol with power considerations. Fuzzy Path Selection Power-based AODV (FPSP-AODV) is a technique that identifies a shortest path and to prolong the connectivity of the networks, using minimum hops and bandwidth and node remaining power as our model cost. The proposed fuzzy logic method is evaluated and compared with conventional method using NS2.


international conference on natural computation | 2009

A Block Cipher Based on a Hybrid of Chaotic System and Feistel Network

Jun Peng; Shangzhu Jin; Hailing Liu; Yongguo Liu

Based on the hybrid of piecewise linear chaotic map (PWLCM) and Feistel network, a block cipher algorithm with a 128-bit length key is proposed. Within the algorithm, an 8x8 S-Box generated by chaotic map is used to realize the round function F, and PWLCM is employed to determine the input of the S-Boxes. The algorithm operates on 32-bit plaintext blocks through 16 rounds computing. The experiment results and differential and linear cryptanalysis indicate that the proposed cipher has excellent diffusion and confusion properties, and it is very sensitive to the keys and the plaintexts. The inherent properties of chaos will greatly increase the complicated and unpredictability of the ciphertexts. Some future works are also considered in this paper.


ieee international conference on cognitive informatics and cognitive computing | 2015

Towards hierarchical fuzzy rule interpolation

Shangzhu Jin; Jun Peng

Fuzzy rule interpolation offers a useful means for enhancing the robustness of fuzzy models by making inference possible in systems of only a sparse rule base. However in practical applications, as the application domain of fuzzy systems expand to more complex ones, the “curse of dimensionality” problem of the conventional fuzzy systems became apparent, which makes the already challenging tasks such as inference and interpolation even more difficult. An initial idea of hierarchical fuzzy interpolation is presented in this paper. The proposed approach combines hierarchical fuzzy systems and fuzzy rule interpolation, to overcome the “curse of dimensionality” problem and the sparse rule base problem simultaneously. Hierarchical fuzzy interpolation is applicable to situations where a multiple multi-antecedent rules system needs to be reconstructed to a multi-layer fuzzy system and the sub-layer rules base is sparse. This approach is based on fuzzy rule interpolative reasoning that utilities scale and move transformation. Illustrative example and experimental scenario are provided to demonstrate the potential of this approach.


international conference on intelligent computation technology and automation | 2010

Design and Analysis of an Image Encryption Scheme Based on Chaotic Maps

Jun Peng; Shangzhu Jin; Yongguo Liu

This paper proposes an image encryption scheme based on a new 3D polynomial differential system which is derived from the Lorenz system. The binary sequences generated from the chaotic system are used to construct the desired cipher stream so as to encrypt the original image. The proposed scheme is described in detail, along with experimental example and security analyses including key space analysis, analysis of correlation of adjacent pixels, differential attack analysis and information entropy analysis. The results show that the suggested scheme has some excellent properties and can be used to construct cryptosystem with high practical security to meet the requirements of Internet on security.

Collaboration


Dive into the Shangzhu Jin's collaboration.

Top Co-Authors

Avatar

Jun Peng

Chongqing University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Zhiming Yang

Chongqing University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Liang Lei

Chongqing University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Mingying You

Chongqing University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Dong Xie

Chongqing University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Jike Ge

Chongqing University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Guorong Chen

Chongqing University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Hai-ling Liu

Chongqing University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Hailing Liu

Chongqing University of Science and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge