Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Chaos-based confusion and diffusion of image pixels using dynamic substitution
The evolution of wireless and mobile communication from 0G to the upcoming 5G gives rise
to data sharing through the Internet. This data transfer via open public networks are …
to data sharing through the Internet. This data transfer via open public networks are …
Chaos-based diffusion for highly autocorrelated data in encryption algorithms
In a single substitution box, the same regions (pixels) of an image are encrypted to one
unique symbol. To reduce this type of autocorrelation in data, chaos has been extensively …
unique symbol. To reduce this type of autocorrelation in data, chaos has been extensively …
Dynamic substitution and confusion-diffusion-based noise-resistive image encryption using multiple chaotic maps
The advancement in wireless communication has encouraged the process of data
transferring through the Internet. The process of data sharing via the Internet is prone to …
transferring through the Internet. The process of data sharing via the Internet is prone to …
Combining RSA and audio steganography on personal computers for enhancing security
This paper proposed an enhanced system for securing sensitive text data on personal
computer benefitting from the combination of both techniques: cryptography and …
computer benefitting from the combination of both techniques: cryptography and …
Blowfish–secured audio steganography
F Hemeida, W Alexan… - 2019 Novel Intelligent and …, 2019 - ieeexplore.ieee.org
Data security has become essential to provide secure communication that is free of attacks.
A combination of steganography and cryptography provides very secure communication …
A combination of steganography and cryptography provides very secure communication …
From diffusion to confusion of RGB pixels using a new chaotic system for color image encryption
Over the past decade, the transmission of images over digital and social networks, as well
as their archiving on clouds, has increased dramatically. It has become necessary and …
as their archiving on clouds, has increased dramatically. It has become necessary and …
Advantages and disadvantages of using cryptography in Steganography
A Hadipour, R Afifi - 2020 17th International ISC Conference on …, 2020 - ieeexplore.ieee.org
The use of cryptographic algorithms varies based on the type of application. Also have
different uses for steganography algorithms based on media type, format and capacity …
different uses for steganography algorithms based on media type, format and capacity …
Logistic map-based image steganography scheme using combined LSB and PVD for security enhancement
In recent, the confidentiality of important data is indispensable for Internet users. Although
both the encryption and steganography schemes are well suited to protect the confidentiality …
both the encryption and steganography schemes are well suited to protect the confidentiality …
[PDF][PDF] Architectural Design for Data Security in Cloud-based Big Data Systems
NI Ali, AG Memon, A Jamali - Baghdad Science Journal, 2024 - iasj.net
Abstract Architecture design of system is creative process after all. Non-functional
requirements and software architecture have a strong relationship. Security of system is one …
requirements and software architecture have a strong relationship. Security of system is one …
Interpolated Implicit Pixel-based Novel Hybrid Approach Towards Image Steganography
R Saini, K Joshi, K Punyani, R Yadav… - Recent Advances in …, 2023 - benthamdirect.com
Background: Steganography is the approach of camouflaging the covert object within
another cover object. This manuscript suggested a novel steganography approach to …
another cover object. This manuscript suggested a novel steganography approach to …