Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Wang Ying-long is active.

Publication


Featured researches published by Wang Ying-long.


international conference on signal processing | 2008

A novel image encryption scheme based on chaotic maps

Xu Shu-Jiang; Wang Ying-long; Wang Jizhi; Tian Min

In this paper, a novel image encryption scheme based on chaotic maps is proposed. By combining XOR operations and circular bit shift operation, the security of this encryption algorithm is enhanced effectively. Two chaotic maps are adopted in the proposed scheme. One creates a binary stream for XOR operation, and the other creates some random numbers which are used to determine the circular bit shift. First the pixel values of the plain-image are modified randomly by the classical chaotic masking technique, namely XOR operation from the first block to the last block, and then the modified image is encrypted by the circular bit shit operation from the last block to the first block in the inverse order. The security of the proposed encryption scheme is detailed analyzed, and the experimental results show that the algorithm has a high security performance and a good efficiency.


international conference on future information technology and management engineering | 2010

A flexible and secure image compression coding algorithm

Hengjian Li; Wang Jizhi; Wang Ying-long; Tian Min; Xu Shu-Jiang

In this paper, we investigate the problem of efficient image data encryption and compression. Based on feedforward-feedback nonlinear dynamic filter (FFNDF) and employing random arithmetic coding, a novel image encryption scheme integrated with the set partitioning in hierarchical trees (SPIHT) has been proposed. The FFNDF is employed to generate pseudorandom sequences which determine the mapping the interval position in the process of arithmetic coding. By encoding the bits obtained from different passes in the SPIHT algorithm with adaptive random arithmetic coding, we obtain a flexible secure image compression coding scheme. Also, the scheme accommodates features of progressive coding of the SPIHT. Theoretical analysis and experimental results show that the scheme has good cryptographic security and perceptual security, and it does not affect the compression efficiency apparently. The efficiency and security of the encryption scheme makes it an ideal choice in various applications such as total encryption, selective encryption, conditional access.


international conference on electronic measurement and instruments | 2007

A IPv6 Network Performance Test System using Multi-Agent

Yue Chengqing; Wang Ying-long; Wang Jizhi

The Internet Engineering Task Force (IETF) has introduced IPv6 with a mission to meet the growing demands of the future Internet. IPv6 is more and more emphasized and moving from the pilot phase to the practical application. In the process of deploying IPv6, performance is one of the key issues to be considered. Test is an effective method to understand IPv6 network performance. We need scalable and available tools to measure IPv6 network performance, but the few existing network performance test software support IPv6. So through the introduction of multi-agent technology, a distributed IPv6 network performance test model integrated with centralized control is proposed. We describe architecture and workflow of the model thoroughly, and a IPv6 network performance test system is designed and implemented based on the model. Finally, using our system, we measure IPv6 performance metrics on CERNET2 which is the largest pure IPv6 network in the world presently. The final experiments show that it is necessary to implement a IPv6 network performance test system and that our system is scalable and available for IPv6 network performance test.


Archive | 2008

The collision of one keyed Hash function based on chaotic map and analysis

Wang Jizhi; Wang Mei-qin; Wang Ying-long


Archive | 2006

The collision problem of one kind of methods for constructing one-way Hash function based on chaotic map

Wang Jizhi; Wang Ying-long; Wang Mei-qin


international conference on electrical and control engineering | 2010

The Analysis for a Chaos-Based One-Way Hash Algorithm

Wang Jizhi; Xu Shu-Jiang; Tian Min; Wang Ying-long


Archive | 2013

PDF (Portable Document Format) document security auditing method

Wang Jizhi; Yang Guang; Wang Mei-qin; Wang Ying-long


Application Research of Computers | 2008

Research on auto-evaluation of association rules based on information spreading theorem

Wang Ying-long


intelligence and security informatics | 2007

Periodicity and Application for a kind of n-dimensional Arnold-type Transformation

Wang Jizhi; Wang Ying-long; Wang Mei-qin


Archive | 2006

Periodicity andApplication forakindofn- dimensional Arnold-type Transformation

Wang Jizhi; Wang Ying-long; Wang Mei-qin

Collaboration


Dive into the Wang Ying-long's collaboration.

Top Co-Authors

Avatar

Xu Shu-Jiang

Beijing University of Posts and Telecommunications

View shared research outputs
Researchain Logo
Decentralizing Knowledge