default search action
Donghua Jiang 0001
Person information
- affiliation: Sun Yat-sen University, Guangzhou, China
Other persons with the same name
- Donghua Jiang 0002 — Xiamen University, Xiamen, China
- Donghua Jiang 0003 — Jiamusi University, Jiamusi, Heilongjiang Province, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Donghua Jiang, Nestor Tsafack, Wadii Boulila, Jawad Ahmad, J. J. Barba-Franco:
ASB-CS: Adaptive sparse basis compressive sensing model and its application to medical image encryption. Expert Syst. Appl. 236: 121378 (2024) - [j21]Zhufeng Suo, Chao Xia, Donghua Jiang, Haipeng Peng, Fenghua Tong, Xiaoming Chen:
Multitiered Reversible Data Privacy Protection Scheme for IoT Based on Compression Sensing and Digital Watermarking. IEEE Internet Things J. 11(7): 11524-11539 (2024) - [j20]Suo Gao, Herbert Ho-Ching Iu, Mengjiao Wang, Donghua Jiang, Ahmed A. Abd El-Latif, Rui Wu, Xianglong Tang:
Design, Hardware Implementation, and Application in Video Encryption of the 2-D Memristive Cubic Map. IEEE Internet Things J. 11(12): 21807-21815 (2024) - [c1]Yuanfeng Pan, Wenkang Su, Jiangqun Ni, Qingliang Liu, Yulin Zhang, Donghua Jiang:
Model-Based Non-Independent Distortion Cost Design for Effective JPEG Steganography. ACM Multimedia 2024: 2419-2427 - 2023
- [j19]Donghua Jiang, Zeric Tabekoueng Njitacke, Jean De Dieu Nkapkop, Nestor Tsafack, Xingyuan Wang, Jan Awrejcewicz:
A New Cross Ring Neural Network: Dynamic Investigations and Application to WBAN. IEEE Internet Things J. 10(8, April 15): 7143-7152 (2023) - [j18]Donghua Jiang, Lidong Liu, Liya Zhu, Xingyuan Wang, Yingpin Chen, Xianwei Rong:
An efficient meaningful double-image encryption algorithm based on parallel compressive sensing and FRFT embedding. Multim. Tools Appl. 82(18): 27337-27363 (2023) - [j17]Meng Zhang, Lidong Liu, Donghua Jiang:
Joint semantic-aware and noise suppression for low-light image enhancement without reference. Signal Image Video Process. 17(7): 3847-3855 (2023) - 2022
- [j16]Xin Meng, Jinqing Li, Xiaoqiang Di, Yaohui Sheng, Donghua Jiang:
An Encryption Algorithm for Region of Interest in Medical DICOM Based on One-Dimensional eλ-cos-cot Map. Entropy 24(7): 901 (2022) - [j15]Xingyuan Wang, Cheng Liu, Donghua Jiang:
A novel visually meaningful image encryption algorithm based on parallel compressive sensing and adaptive embedding. Expert Syst. Appl. 209: 118426 (2022) - [j14]Liya Zhu, Donghua Jiang, Jiangqun Ni, Xingyuan Wang, Xianwei Rong, Musheer Ahmad:
A visually secure image encryption scheme using adaptive-thresholding sparsification compression sensing model and newly-designed memristive chaotic map. Inf. Sci. 607: 1001-1022 (2022) - [j13]Xingyuan Wang, Cheng Liu, Donghua Jiang:
An efficient double-image encryption and hiding algorithm using a newly designed chaotic system and parallel compressive sensing. Inf. Sci. 610: 300-325 (2022) - [j12]Zhufeng Suo, Youheng Dong, Fenghua Tong, Donghua Jiang, Xi Fang, Xiaoming Chen:
Semiconductor superlattice physical unclonable function based two-dimensional compressive sensing cryptosystem and its application to image encryption. Inf. Sci. 618: 227-252 (2022) - [j11]Liya Zhu, Donghua Jiang, Jiangqun Ni, Xingyuan Wang, Xianwei Rong, Musheer Ahmad, Yingpin Chen:
A stable meaningful image encryption scheme using the newly-designed 2D discrete fractional-order chaotic map and Bayesian compressive sensing. Signal Process. 195: 108489 (2022) - [j10]Ahmed Alkhayyat, Musheer Ahmad, Nestor Tsafack, Muhammad Tanveer, Donghua Jiang, Ahmed A. Abd El-Latif:
A Novel 4D Hyperchaotic System Assisted Josephus Permutation for Secure Substitution-Box Generation. J. Signal Process. Syst. 94(3): 315-328 (2022) - 2021
- [j9]Wei Huang, Donghua Jiang, Yisheng An, Lidong Liu, Xingyuan Wang:
A Novel Double-Image Encryption Algorithm Based on Rossler Hyperchaotic System and Compressive Sensing. IEEE Access 9: 41704-41716 (2021) - [j8]Donghua Jiang, Lidong Liu, Xingyuan Wang, Xianwei Rong:
Image encryption algorithm for crowd data based on a new hyperchaotic system and Bernstein polynomial. IET Image Process. 15(14): 3698-3717 (2021) - [j7]Xingyuan Wang, Cheng Liu, Donghua Jiang:
A novel triple-image encryption and hiding algorithm based on chaos, compressive sensing and 3D DCT. Inf. Sci. 574: 505-527 (2021) - [j6]Lidong Liu, Donghua Jiang, Xingyuan Wang, Xianwei Rong, Renxiu Zhang:
2D Logistic-Adjusted-Chebyshev map for visual color image encryption. J. Inf. Secur. Appl. 60: 102854 (2021) - [j5]Donghua Jiang, Lidong Liu, Liya Zhu, Xingyuan Wang, Xianwei Rong, Hongxiang Chai:
Adaptive embedding: A novel meaningful image encryption scheme based on parallel compressive sensing and slant transform. Signal Process. 188: 108220 (2021) - [j4]Renxiu Zhang, Longfei Yu, Donghua Jiang, Wei Ding, Jian Song, Kuncheng He, Qun Ding:
A Novel Plaintext-Related Color Image Encryption Scheme Based on Cellular Neural Network and Chen's Chaotic System. Symmetry 13(3): 393 (2021) - 2020
- [j3]Lidong Liu, Donghua Jiang, Tingyu An, Yifan Guan:
A Plaintext-Related Dynamical Image Encryption Algorithm Based on Permutation-Combination-Diffusion Architecture. IEEE Access 8: 62785-62799 (2020) - [j2]Lidong Liu, Donghua Jiang, Xingyuan Wang, Linlin Zhang, Xianwei Rong:
A Dynamic Triple-Image Encryption Scheme Based on Chaos, S-Box and Image Compressing. IEEE Access 8: 210382-210399 (2020)
2010 – 2019
- 2019
- [j1]Lidong Liu, Linlin Zhang, Donghua Jiang, Yifan Guan, Zhaolun Zhang:
A Simultaneous Scrambling and Diffusion Color Image Encryption Algorithm Based on Hopfield Chaotic Neural Network. IEEE Access 7: 185796-185810 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint