Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
An efficient image encryption technique based on two-level security for internet of things
This paper proposes an efficient image encryption method based on a hybrid of
watermarking and cryptographic techniques. It is based on two-level security for the secure …
watermarking and cryptographic techniques. It is based on two-level security for the secure …
A new image encryption based on bit replacing, chaos and DNA coding techniques
Millions of confidential images are transmitted every day by people through the multimedia
systems of the internet. Such confidential information in the images may be belong to the …
systems of the internet. Such confidential information in the images may be belong to the …
Protection of image ROI using chaos-based encryption and DCNN-based object detection
Images always contain sensitive information, eg, a clear face on a photo, which needs to be
protected. The simple way is to encrypt the whole image for hiding “everything” securely, but …
protected. The simple way is to encrypt the whole image for hiding “everything” securely, but …
Image encryption model based on novel magic square with differential encoding and chaotic map
In this paper, an encryption model for the grayscale and color images based on novel magic
square, and differential encoding technique along with chaotic map has been proposed. The …
square, and differential encoding technique along with chaotic map has been proposed. The …
An intelligent session key-based hybrid lightweight image encryption algorithm using logistic-tent map and crossover operator for internet of multimedia things
Due to the increasing demand for IoMT applications in numerous fields such as healthcare,
smart city, smart grids, industrial internet, etc. The privacy and security become a major issue …
smart city, smart grids, industrial internet, etc. The privacy and security become a major issue …
Grayscale and colored image encryption model using a novel fused magic cube
In this paper, a novel method for the construction of a fused magic cube of composite order
has been proposed by using the concept of compounding. The replacement of each block …
has been proposed by using the concept of compounding. The replacement of each block …
Privacy protection in surveillance videos using block scrambling-based encryption and DCNN-based face detection
Surely surveillance cameras are certainly important in all aspects of life. We have become in
an era where we need to use surveillance cameras everywhere, homes, schools, banks …
an era where we need to use surveillance cameras everywhere, homes, schools, banks …
Session key based fast, secure and lightweight image encryption algorithm
Nowadays, most of the communications in IoT enabled devices are done in the form of
images. To protect the images from intruders, there is a need for a secure encryption …
images. To protect the images from intruders, there is a need for a secure encryption …
An efficient chaos-based image encryption algorithm using real-time object detection for smart city applications
Currently, an increasing number of digital images are being generated by and for the
general public and professionals. Simultaneously, the protection of these images is crucial …
general public and professionals. Simultaneously, the protection of these images is crucial …
[HTML][HTML] Exploiting 3D fractal cube and chaos for effective multi-image compression and encryption
Y Lu, M Gong, L Cao, Z Gan, X Chai, A Li - Journal of King Saud University …, 2023 - Elsevier
At present, some image compression and encryption algorithms have been presented to
protect digital images by combining chaos and compressed sensing (CS). However, some of …
protect digital images by combining chaos and compressed sensing (CS). However, some of …