Di Xiao
#181,376
Most Influential Person Now
Researcher
Di Xiao's AcademicInfluence.com Rankings
Di Xiaocomputer-science Degrees
Computer Science
#11486
World Rank
#12176
Historical Rank
Machine Learning
#5261
World Rank
#5328
Historical Rank
Artificial Intelligence
#5674
World Rank
#5757
Historical Rank
Database
#8521
World Rank
#8925
Historical Rank
Download Badge
Computer Science
Di Xiao's Degrees
- PhD Computer Science University of California, Berkeley
- Masters Computer Science University of California, Berkeley
- Bachelors Computer Science Tsinghua University
Similar Degrees You Can Earn
Why Is Di Xiao Influential?
(Suggest an Edit or Addition)Di Xiao's Published Works
Published Works
- An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules (2014) (301)
- Analysis and improvement of a chaos-based image encryption algorithm (2009) (275)
- A novel key agreement protocol based on chaotic maps (2007) (216)
- An image encryption scheme based on rotation matrix bit-level permutation and block diffusion (2014) (207)
- One-way Hash function construction based on the chaotic map with changeable-parameter (2005) (181)
- Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform (2013) (180)
- A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations (2013) (149)
- Cryptanalysis and enhancements of image encryption using combination of the 1D chaotic map (2018) (144)
- One-way hash function construction based on 2D coupled map lattices (2008) (127)
- A novel Hash algorithm construction based on chaotic neural network (2011) (112)
- Embedding cryptographic features in compressive sensing (2014) (108)
- A visually secure image encryption scheme based on parallel compressive sensing (2019) (97)
- Analysis and improvement of a chaos-based Hash function construction (2010) (91)
- An image coding scheme using parallel compressive sensing for simultaneous compression-encryption applications (2017) (89)
- Reversible data hiding in encrypted images using cross division and additive homomorphism (2015) (88)
- Cryptanalysis of S-box-only chaotic image ciphers against chosen plaintext attack (2013) (87)
- A chaos-based hash function with both modification detection and localization capabilities (2010) (86)
- An efficient entire chaos-based scheme for deniable authentication (2005) (85)
- Self-adaptive permutation and combined global diffusion for chaotic color image encryption (2014) (76)
- Using time-stamp to improve the security of a chaotic maps-based key agreement protocol (2008) (75)
- Breaking an image encryption algorithm based on hyper-chaotic system with only one round diffusion process (2014) (71)
- Parallel keyed hash function construction based on chaotic maps (2008) (70)
- Parallel keyed hash function construction based on chaotic neural network (2009) (70)
- Separable reversible data hiding in encrypted image based on pixel value ordering and additive homomorphism (2017) (63)
- Collusive attacks to “circle-type” multi-party quantum key agreement protocols (2016) (62)
- Robust and hierarchical watermarking of encrypted images based on Compressive Sensing (2016) (62)
- Energy modeling and optimization through joint packet size analysis of BSN and WiFi networks (2011) (61)
- On the security of symmetric ciphers based on DNA coding (2014) (60)
- On the security analysis of an image scrambling encryption of pixel bit and its improved scheme based on self-correlation encryption (2012) (56)
- Vulnerability to chosen-plaintext attack of a general optical encryption model with the architecture of scrambling-then-double random phase encoding. (2013) (53)
- Cryptanalysis of a chaotic image cipher using Latin square-based confusion and diffusion (2017) (53)
- Edge-based lightweight image encryption using chaos-based reversible hidden transform and multiple-order discrete fractional cosine transform (2013) (53)
- Parallel hash function construction based on coupled map lattices (2011) (51)
- Joint SPIHT compression and selective encryption (2014) (49)
- True random number generator based on mouse movement and chaotic hash function (2009) (49)
- A Compressive Sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud (2017) (47)
- A reversible watermarking authentication scheme for wireless sensor networks (2013) (43)
- Cryptanalysis of image scrambling based on chaotic sequences and Vigenère cipher (2014) (40)
- Quantum Image Encryption Using Intra and Inter Bit Permutation Based on Logistic Map (2019) (37)
- GLS coding based security solution to JPEG with the structure of aggregated compression and encryption (2014) (37)
- Multi-focus image fusion and robust encryption algorithm based on compressive sensing (2017) (35)
- An efficient chaotic image cipher with dynamic lookup table driven bit-level permutation strategy (2017) (35)
- Using the self-synchronizing method to improve security of the multi chaotic systems-based image encryption (2010) (35)
- Improving the security of a parallel keyed hash function based on chaotic maps (2009) (34)
- Parallel Hash function construction based on chaotic maps with changeable parameters (2011) (34)
- Separable data hiding in encrypted image based on compressive sensing (2014) (31)
- Improving the security of a dynamic look-up table based chaotic cryptosystem (2006) (31)
- Securing image information using double random phase encoding and parallel compressive sensing with updated sampling processes (2017) (30)
- A Block Compressive Sensing Based Scalable Encryption Framework for Protecting Significant Image Regions (2016) (29)
- Secret Image Sharing Based on Chaotic Map and Chinese Remainder Theorem (2012) (29)
- Robust Coding of Encrypted Images via 2D Compressed Sensing (2021) (28)
- Privacy-Assured FogCS: Chaotic Compressive Sensing for Secure Industrial Big Image Data Processing in Fog Computing (2020) (28)
- True random number generation from mobile telephone photo based on chaotic cryptography (2009) (27)
- Keyed hash function based on a dynamic lookup table of functions (2012) (27)
- Quantum Block Image Encryption Based on Arnold Transform and Sine Chaotification Model (2019) (27)
- Block mode image encryption technique using two-fold operations based on chaos, MD5 and DNA rules (2018) (26)
- Cryptanalyzing a novel image cipher based on mixed transformed logistic maps (2014) (26)
- A novel combined cryptographic and hash algorithm based on chaotic control character (2009) (25)
- An improved hierarchical fragile watermarking scheme using chaotic sequence sorting and subblock post-processing (2012) (25)
- Improved reversible data hiding for encrypted images using full embedding strategy (2015) (25)
- High Capacity Data Hiding in Encrypted Image Based on Compressive Sensing for Nonequivalent Resources (2019) (25)
- Analysis and improvement of a hash-based image encryption algorithm (2011) (24)
- Chaotic Image Encryption of Regions of Interest (2016) (21)
- A watermarking algorithm in encrypted image based on compressive sensing with high quality image reconstruction and watermark performance (2017) (21)
- Collision analysis of one kind of chaos-based hash function (2010) (20)
- Cryptanalysis of a chaos block cipher for wireless sensor network (2011) (20)
- Quantum image encryption algorithm based on bit-plane permutation and sine logistic map (2020) (19)
- Double Quantum Image Encryption Based on Arnold Transform and Qubit Random Rotation (2018) (18)
- A reversible image authentication scheme based on compressive sensing (2015) (18)
- Image Encryption Scheme Based on Chaotic Neural System (2005) (18)
- A Combined Hash and Encryption Scheme by Chaotic Neural Network (2004) (18)
- A secure image tampering detection and self-recovery scheme using POB number system over cloud (2019) (17)
- Quantum private comparison employing single-photon interference (2017) (17)
- A high capacity combined reversible watermarking scheme for 2-D CAD engineering graphics (2015) (17)
- A Novel Image Authentication with Tamper Localization and Self-Recovery in Encrypted Domain Based on Compressive Sensing (2018) (16)
- Secure binary arithmetic coding based on digitalized modified logistic map and linear feedback shift register (2015) (16)
- Three-level quantum image encryption based on Arnold transform and logistic map (2021) (15)
- Robust image hashing with tampering recovery capability via low-rank and sparse representation (2016) (15)
- Attack and improvement of the joint fingerprinting and decryption method for vector quantization images (2014) (14)
- Parallel chaotic Hash function construction based on cellular neural network (2012) (14)
- Cryptanalysis and improvement of a reversible data-hiding scheme in encrypted images by redundant space transfer (2021) (14)
- High-capacity separable data hiding in encrypted image based on compressive sensing (2016) (14)
- Meaningful Image Encryption Based on Reversible Data Hiding in Compressive Sensing Domain (2018) (13)
- Improvement and performance analysis of a novel hash function based on chaotic neural network (2013) (13)
- Attack and Improvement of the Fidelity Preserved Fragile Watermarking of Digital Images (2016) (13)
- Quantum identity authentication in the orthogonal-state-encoding QKD system (2019) (13)
- Low-Cost and Confidentiality-Preserving Multi-Image Compressed Acquisition and Separate Reconstruction for Internet of Multimedia Things (2021) (12)
- Low-cost and secure multi-image encryption scheme based on P-tensor product compressive sensing (2021) (12)
- Using Chebyshev chaotic map to construct infinite length hash chains (2004) (12)
- Commutative fragile zero-watermarking and encryption for image integrity protection (2019) (11)
- Quantum Identity Authentication in the Counterfactual Quantum Key Distribution Protocol (2019) (9)
- A secure communication scheme based on symbolic dynamics (2004) (7)
- Privacy-Preserving Compressed Sensing for Image Simultaneous Compression-Encryption Applications (2021) (7)
- A Novel High-Capacity Data Hiding in Encrypted Images Based on Compressive Sensing Progressive Recovery (2020) (7)
- Towards Energy Optimization Using Joint Data Rate Adaptation for BSN and WiFi Networks (2012) (6)
- Chaos Based Hash Function (2011) (6)
- Multimodality Image Fusion Based on Quantum Wavelet Transform and Sum-Modified-Laplacian Rule (2018) (6)
- A Verifiable Secret Image Sharing Scheme Based on Compressive Sensing (2018) (6)
- QKD-Based Quantum Private Query Protocol in the Single-Photon Interference Communication System (2019) (6)
- Low-cost and high-efficiency privacy-protection scheme for distributed compressive video sensing in wireless multimedia sensor networks (2020) (5)
- A recoverable chaos-based fragile watermarking with high PSNR preservation (2016) (5)
- A secure image permutation–substitution framework based on chaos and compressive sensing (2020) (5)
- Perturbation meets key-based interval splitting arithmetic coding: security enhancement and chaos generalization (2016) (5)
- A joint image encryption and watermarking algorithm based on compressive sensing and chaotic map (2015) (5)
- Smart Privacy Protection for Big Video Data Storage Based on Hierarchical Edge Computing (2020) (5)
- Cryptanalysis on an Image Scrambling Encryption Scheme Based on Pixel Bit (2010) (5)
- High-payload completely reversible data hiding in encrypted images by an interpolation technique (2017) (4)
- A Compressive Sensing Based Image Encryption and Compression Algorithm With Identity Authentication and Blind Signcryption (2020) (4)
- Hash Function Construction Based on the Chaotic Look-Up Table with Changeable Parameter (2011) (4)
- A Novel Privacy-Preserving Data Gathering Scheme in WSN Based on Compressive Sensing and Embedding (2019) (4)
- Discrete-time Markov Model for Wireless Link Burstiness Simulations (2013) (4)
- A REVERSIBLE IMAGE AUTHENTICATION SCHEME BASED ON CHAOTIC FRAGILE WATERMARK (2010) (4)
- Corrigendum to “Analysis and improvement of a chaos-based hash function construction” [Commun Nonlinear Sci Numer Simulat 2010;15:1338–1347] (2010) (4)
- RDH in BCS images based on block edge pixel separation (2017) (3)
- A VQ-Based Joint Fingerprinting and Decryption Scheme for Secure and Efficient Image Distribution (2018) (3)
- Parallel Hash Function Based on Block Cipher (2009) (3)
- Compressing Encrypted Images by Using 2D Compressed Sensing (2019) (3)
- Efficient Compressed Sensing Based Image Coding by Using Gray Transformation (2021) (3)
- Low-complexity privacy preserving scheme based on compressed sensing and non-negative matrix factorization for image data (2020) (3)
- Image Encryption Design Based on Multi-Dimensional Matrix Map and Partitioning Substitution and Diffusion-Integration Substitution Network Structure (2010) (3)
- Intrusion Detection Based on MLP Neural Networks and K-Means Algorithm (2005) (2)
- Cryptanalysis of a secure chaotic map based block cryptosystem with application to camera sensor networks (2015) (2)
- Analysis and Improvement of an Efficient and Secure Key Agreement Protocol (2013) (2)
- Controllable high-capacity separable data hiding in encrypted images by compressive sensing and data pretreatment (2018) (2)
- Privacy-Aware Controllable Compressed Data Publishing Against Sparse Estimation Attack in IoT (2019) (1)
- Reversible watermarking algorithm for encrypted image based on histogram difference shifting (2014) (1)
- Low Complexity Secure P-Tensor Product Compressed Sensing Reconstruction Outsourcing and Identity Authentication in Cloud (2021) (1)
- A Prediction Model for the Risk of Osteoporosis Fracture in the Elderly Based on a Neural Network (2018) (1)
- A reversible two-level image authentication scheme based on chaotic fragile watermark (2012) (1)
- Comment on "Quantum oblivious set-member decision protocol" (2016) (1)
- Immunity digital watermarking algorithm based on reversible information hiding in wavelet domain: Immunity digital watermarking algorithm based on reversible information hiding in wavelet domain (2013) (0)
- Cryptanalysis of an image scrambling algorithm based on Logistic chaotic sequence: Cryptanalysis of an image scrambling algorithm based on Logistic chaotic sequence (2010) (0)
- Security and efficiency improvement for image encryption algorithm based on highdimension chaotic system: Security and efficiency improvement for image encryption algorithm based on highdimension chaotic system (2009) (0)
- Robust image hashing with tampering recovery capability via low-rank and sparse representation (2015) (0)
- An efficient chaotic image cipher with dynamic lookup table driven bit-level permutation strategy (2016) (0)
- oint SPIHT compression and selective encryption (2014) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Di Xiao?
Di Xiao is affiliated with the following schools: