Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of image encryption algorithms
Security of data/images is one of the crucial aspects in the gigantic and still expanding
domain of digital transfer. Encryption of images is one of the well known mechanisms to …
domain of digital transfer. Encryption of images is one of the well known mechanisms to …
An image encryption method based on chaos system and AES algorithm
A Arab, MJ Rostami, B Ghavami - The Journal of Supercomputing, 2019 - Springer
In this paper, a novel image encryption algorithm is proposed based on the combination of
the chaos sequence and the modified AES algorithm. In this method, the encryption key is …
the chaos sequence and the modified AES algorithm. In this method, the encryption key is …
[PDF][PDF] Image encryption using different techniques: A review
KD Patel, S Belani - International Journal of Emerging Technology …, 2011 - researchgate.net
In present times, the protection of multimedia data is becoming very important. The
protection of this multimedia data can be done with encryption. There are so many different …
protection of this multimedia data can be done with encryption. There are so many different …
A RGB image encryption algorithm based on total plain image characteristics and chaos
MA Murillo-Escobar, C Cruz-Hernández… - Signal Processing, 2015 - Elsevier
Currently, color image encryption is important to ensure its confidentiality during its
transmission on insecure networks or its storage. The fact that chaotic properties are related …
transmission on insecure networks or its storage. The fact that chaotic properties are related …
Privacy-aware and security-enhanced efficient matchmaking encryption
Data sharing technologies enable users to outsource data and privately share information
with arbitrary recipients without geographic barriers. However, existing efforts for secure …
with arbitrary recipients without geographic barriers. However, existing efforts for secure …
A novel hybrid encryption algorithm based on chaos and S-AES algorithm
In this study, a novel chaos-based hybrid encryption algorithm design for secure and
effective image encryption is presented. To design the algorithm, the Zhongtang chaotic …
effective image encryption is presented. To design the algorithm, the Zhongtang chaotic …
Secure and fast image encryption algorithm based on modified logistic map
In the past few decades, the transmission of data over an unsecure channel has resulted in
an increased rate of hacking. The requirement to make multimedia data more secure is …
an increased rate of hacking. The requirement to make multimedia data more secure is …
A novel bit permutation-based image encryption algorithm
In recent years, substantial work has been done for develo** image encryption algorithms.
Image encryption requires handling of large data, which needs computationally efficient …
Image encryption requires handling of large data, which needs computationally efficient …
Verifiable, fair and privacy-preserving broadcast authorization for flexible data sharing in clouds
The cloud-based data sharing technology with cryptographic primitives enables data owners
to outsource data into paradigms and privately share information with arbitrary recipients …
to outsource data into paradigms and privately share information with arbitrary recipients …
High throughput and low area architectures of secure IoT algorithm for medical image encryption
Z Mishra, B Acharya - Journal of Information Security and Applications, 2020 - Elsevier
The favor that lightweight encryption algorithms have gained over the recent years regarding
data and image security in a resource constrained environment of the smart device sort in …
data and image security in a resource constrained environment of the smart device sort in …