Yucui Guo

Work place: Beijing University of Posts and Telecommunications, Beijing, PR China

E-mail: ycguo@bupt.edu.cn

Website:

Research Interests: Mathematics, Information-Theoretic Security, Information Security, Computational Mathematics

Biography

Yucui Guo received the Science degree in mathematics from Jilin University, Changchun, P.R. China, in 1982 and the M.S. of Technology in Academe of Railroad Science, Beijing, PR China, in 1988 and Ph.D. degree in Beijing Institute of Technology, Beijing, P.R. China, in 1997. She worked at Shenyang Institute of Technology as a teacher from 1982 to 1985 and at Beijing automobile Institute as a Design Engineer from 1988 to 1994. Since Eight 1997, she has been with the School of Science, Beijing University of Telecommunications and Posts, where she is currently a Professor. Her current research interests lie in the areas of Applying Mathematics and Information Security, Trust Management. She is the author of books titled Introduction of Nonlinear Partial Differential Equations and Mathematical Methods in Physics Science (Tsinghua University Press, 2008 & 2005). She is now presiding over a Project of National Natural Science Foundation of China--Research on Autonomic Trust Management for Fundamental Software Platform.

Author Articles
A Novel Image Encryption Scheme based on a Nonlinear Chaotic Map

By Shujiang Xu Ying-Long WANG Yucui Guo Cong Wang

DOI: https://doi.org/10.5815/ijigsp.2010.01.08, Pub. Date: 8 Nov. 2010

Only by means of XOR operation, a novel image encryption scheme is proposed based on a nonlinear chaotic map (NCM). There are two rounds in the proposed image encryption scheme. In each round of the scheme, the pixel gray values are modified from the first pixel to the last pixel firstly, and then the modified image is encrypted from the last pixel to the first pixel in the inverse order. In order to accelerate the encryption speed, every time NCM is iterated, n (n>3) bytes random numbers which are used to mask the plain-image can be gained. And to enhance the security, a small perturbation will be given to the parameters of the NCM based on the last obtained n bytes modified elements before next iteration. Experimental results and theory analysis show that the algorithm has a high security performance and a good efficiency.

[...] Read more.
Other Articles