Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A gray image encryption technique using the concept of water waves, chaos and hash function
In this article, an innovative encryption technique is developed by getting the inspiration from
the natural up-down water wave's phenomena that changes a reflection on pond's surface …
the natural up-down water wave's phenomena that changes a reflection on pond's surface …
Intertwining logistic map and Cellular Automata based color image encryption model
M Kumar, S Kumar, R Budhiraja… - … in information and …, 2016 - ieeexplore.ieee.org
In this paper a color image encryption involving pixel confusion and diffusion governed by
three different series generated by intertwining logistic map is proposed. This symmetric …
three different series generated by intertwining logistic map is proposed. This symmetric …
Blood vessel segmentation in pathological retinal image
Z Han, Y Yin, X Meng, G Yang… - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
Retinal vessel segmentation is a fundamental aspect of the automatic retinal image analysis.
The attributes of retinal blood vessels, such as width, tortuosity and branching pattern, play …
The attributes of retinal blood vessels, such as width, tortuosity and branching pattern, play …
Breaking row-column shuffle based image cipher
W Li, Y Yan, N Yu - Proceedings of the 20th ACM international …, 2012 - dl.acm.org
In this paper, a redundancy based cipher-only attack is proposed to break row-column
shuffle based image encryption algorithms, which are considered to be safe under cipher …
shuffle based image encryption algorithms, which are considered to be safe under cipher …
A new diffusion and substitution based cryptosystem for securing medical image applications
L Mancy, SMC Vigila - International Journal of Electronic …, 2018 - inderscienceonline.com
Due to the rising privilege for tele-health facilities have sophisticated responsiveness in the
usage of medicinal image safeguard proficiency. It mainly compact with patient records that …
usage of medicinal image safeguard proficiency. It mainly compact with patient records that …
[PDF][PDF] Inbuilt image encryption and steganography security solutions for wireless systems: a survey
P Praveenkumar, K Thenmozhi… - Research Journal of …, 2017 - researchgate.net
It is increasingly difficult to ensure the sharing of secret information due to uncontrolled
technology explosion. In particular, the field of communication engineering has undergone a …
technology explosion. In particular, the field of communication engineering has undergone a …
Permutation of image encryption system based on block cipher and stream cipher encryption algorithm
H Chunguang, C Hai, S Yu… - 2015 Third International …, 2015 - ieeexplore.ieee.org
In recent years, a variety of encryption algorithms have been investigated to image
cryptosystems. Most of them are based on permutation and diffusion architecture. These two …
cryptosystems. Most of them are based on permutation and diffusion architecture. These two …
Generation and analysis of graphical codes using textured patterns for printed document authentication
I Tkachenko - 2015 - theses.hal.science
Due to the development and availability of printing and scanning devices, the number of
forged/counterfeited valuable documents and product packages is increasing. Therefore …
forged/counterfeited valuable documents and product packages is increasing. Therefore …
An image encryption scheme based on concatenated torus automorphisms
A novel, chaotic map that is based on concatenated torus automorphisms is proposed in this
paper. As we know, cat map, which is based on torus automorphism, is highly chaotic and is …
paper. As we know, cat map, which is based on torus automorphism, is highly chaotic and is …
[PDF][PDF] Speed image encryption scheme using dynamic Galois field GF (P) matrices
Encryption security and encryption speed are two important aspects of image encryption
algorithms. Due to their increasingly large size, video images present a great challenge to …
algorithms. Due to their increasingly large size, video images present a great challenge to …