Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A roadmap from classical cryptography to post-quantum resistant cryptography for 5G-enabled IoT: Challenges, opportunities and solutions
D Chawla, PS Mehra - Internet of Things, 2023 - Elsevier
Abstract 5th Generation (5G)-enabled Internet of Things (IoT) connects billions of devices for
high-speed data transfer. The data collected fuel many automation applications such as …
high-speed data transfer. The data collected fuel many automation applications such as …
A stable meaningful image encryption scheme using the newly-designed 2D discrete fractional-order chaotic map and Bayesian compressive sensing
In order to safely and covertly protect the digital image information during public channel
transmission and localized storage, a stable image visually secure encryption algorithm by …
transmission and localized storage, a stable image visually secure encryption algorithm by …
A lightweight chaos-based encryption scheme for IoT healthcare systems
D Clemente-Lopez, J de Jesus Rangel-Magdaleno… - Internet of Things, 2024 - Elsevier
Abstract The Internet of Things (IoT) has transformed the healthcare industry by enabling
new services and capabilities through connected devices and sensors. These devices, such …
new services and capabilities through connected devices and sensors. These devices, such …
[HTML][HTML] Metaverse-IDS: Deep learning-based intrusion detection system for Metaverse-IoT networks
Combining the metaverse and the Internet of Things (IoT) will lead to the development of
diverse, virtual, and more advanced networks in the future. The integration of IoT networks …
diverse, virtual, and more advanced networks in the future. The integration of IoT networks …
[HTML][HTML] Quantum-enhanced chaotic image encryption: Strengthening digital data security with 1-D sine-based chaotic maps and quantum coding
MU Rehman - Journal of King Saud University-Computer and …, 2024 - Elsevier
The proposed work delves into the utilization of chaotic maps along with the quantum
mechanisms to strengthen the security of the digital images along with addressing the …
mechanisms to strengthen the security of the digital images along with addressing the …
An efficient image encryption scheme based on S-boxes and fractional-order differential logistic map
YQ Zhang, JL Hao, XY Wang - Ieee Access, 2020 - ieeexplore.ieee.org
In this work, an efficient image encryption based on S-boxes and fractional-order logistic
map is proposed. The features of the fractional-order chaotic system in dynamical behaviors …
map is proposed. The features of the fractional-order chaotic system in dynamical behaviors …
Combined interleaved pattern to improve confusion-diffusion image encryption based on hyperchaotic system
The quality of encryption is dependent on the complexity of the confusion-diffusion pattern
and the quality of the keystream employed. To enhance complexity and randomness, this …
and the quality of the keystream employed. To enhance complexity and randomness, this …
Encryption scheme for RGB images using chaos and affine hill cipher technique
A new color image encryption algorithm is presented in this work by invoking a coupled
configuration of the two-dimensional Hénon map, the three-dimensional logistic map with …
configuration of the two-dimensional Hénon map, the three-dimensional logistic map with …
Finite time chaos synchronization in time-delay channel and its application to satellite image encryption in OFDM communication systems
This paper proposes a finite time chaos synchronization approach for the secure
communication of satellite imaging. To this end, chaotic oscillators are considered in both …
communication of satellite imaging. To this end, chaotic oscillators are considered in both …
Dynamic 3D scrambled image based RGB image encryption scheme using hyperchaotic system and DNA encoding
Hundreds of image encryption schemes based on the conventional 2D image space exist in
the literature. Very few were built using the 3D image space. In this study, for better security …
the literature. Very few were built using the 3D image space. In this study, for better security …