Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Region of interest-based medical image encryption technique based on chaotic S-boxes
Block cipher has been one of the most reliable options by which data security is achieved.
The strength of block cipher against various attacks is purely dependent on its confusion …
The strength of block cipher against various attacks is purely dependent on its confusion …
A novel chaos-based privacy-preserving deep learning model for cancer diagnosis
Early cancer identification is regarded as a challenging problem in cancer prevention for the
healthcare community. In addition, ensuring privacy-preserving healthcare data becomes …
healthcare community. In addition, ensuring privacy-preserving healthcare data becomes …
A novel color image encryption scheme based on a new dynamic compound chaotic map and S-box
In modern technological era image encryption has become an attractive and interesting field
for researchers. They work for improving the security of image data from unauthorized …
for researchers. They work for improving the security of image data from unauthorized …
Noise-resistant image encryption scheme for medical images in the chaos and wavelet domain
In this paper, a noise-resistant image encryption scheme is proposed. We have used a cubic-
logistic map, Discrete Wavelet Transform (DWT), and bit-plane extraction method to encrypt …
logistic map, Discrete Wavelet Transform (DWT), and bit-plane extraction method to encrypt …
Particle swarm optimization based highly nonlinear substitution-boxes generation for security applications
Symmetric encryption has been considered as one of the essential means of ensuring
security of end to end communication. The robustness and strength of modern day block …
security of end to end communication. The robustness and strength of modern day block …
A New V‐Net Convolutional Neural Network Based on Four‐Dimensional Hyperchaotic System for Medical Image Encryption
In the transmission of medical images, if the image is not processed, it is very likely to leak
data and personal privacy, resulting in unpredictable consequences. Traditional encryption …
data and personal privacy, resulting in unpredictable consequences. Traditional encryption …
[HTML][HTML] Implementing a symmetric lightweight cryptosystem in highly constrained IoT devices by using a chaotic S-box
In the Internet of Things (IoT), a lot of constrained devices are interconnected. The data
collected from those devices can be the target of cyberattacks. In this paper, a lightweight …
collected from those devices can be the target of cyberattacks. In this paper, a lightweight …
Bijective S-boxes method using improved chaotic map-based heuristic search and algebraic group structures
This paper presents a hybrid method for the construction of cryptographically strong bijective
substitution-boxes by utilizing the merits of chaotic map and algebraic groups. The hybrid …
substitution-boxes by utilizing the merits of chaotic map and algebraic groups. The hybrid …
Efficient key-dependent dynamic S-boxes based on permutated elliptic curves
Key-dependent dynamic substitution boxes (S-boxes) are important building blocks of many
image encryption schemes, in which a session key controls the construction of dynamic S …
image encryption schemes, in which a session key controls the construction of dynamic S …
A novel method for generation of strong substitution-boxes based on coset graphs and symmetric groups
The success of AES encryption standard created challenges for the cryptographers to
construct strong substitution-boxes using different underlying approaches. It is because they …
construct strong substitution-boxes using different underlying approaches. It is because they …