Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
On the security of permutation-only image encryption schemes
Permutation is a commonly used primitive in multimedia (image/video) encryption schemes,
and many permutation-only algorithms have been proposed in recent years for the …
and many permutation-only algorithms have been proposed in recent years for the …
[BOK][B] Multimedia security handbook
B Furht, D Kirovski - 2004 - books.google.com
Intellectual property owners who exploit new ways of reproducing, distributing, and
marketing their creations digitally must also protect them from piracy. Multimedia Security …
marketing their creations digitally must also protect them from piracy. Multimedia Security …
Chaos-based encryption for digital image and video
Many digital services, such as pay TV, confidential videoconferencing, and medical and
military imaging systems, require reliable security in storage and transmission of digital …
military imaging systems, require reliable security in storage and transmission of digital …
Secure partial image encryption scheme using scan based algorithm
BD Parameshachari, KMS Soyjaudah… - … Journal of advances …, 2013 - search.proquest.com
Today data security is very important and high priority topic. With rapid growth in
communication and computer technologies, there is a huge data transaction interment …
communication and computer technologies, there is a huge data transaction interment …
SCAN-based compression-encryption-hiding for video on demand
N Bourbakis, A Dollas - IEEE MultiMedia, 2003 - ieeexplore.ieee.org
We present a SCAN-based method for image and video compression-encryption-hiding with
application to digital video on demand. The software SCAN implementation running on a …
application to digital video on demand. The software SCAN implementation running on a …
A hybrid gray image representation using spatial-and DCT-based approach with application to moment computation
KL Chung, YW Liu, WM Yan - Journal of Visual Communication and Image …, 2006 - Elsevier
In this paper, a novel hybrid gray image representation using spatial-and DCT-based
approach is presented. In the first phase, according to the bintree decomposition principle …
approach is presented. In the first phase, according to the bintree decomposition principle …
An image encryption technique using scan based approach and image as key
S Somaraj, M AliHussain - … of the First International Conference on …, 2017 - Springer
In this paper, a new algorithm for image encryption using the scan method is proposed.
Using SCAN language, it is possible to generate a wide range of scanning paths based on …
Using SCAN language, it is possible to generate a wide range of scanning paths based on …
A novel algorithm for image encryption based on couple chaotic systems
XY Wang, T Wang - International Journal of Modern Physics B, 2012 - World Scientific
In this paper, an image encryption algorithm based on couple multiple chaotic systems is
presented. It made the one-dimensional Coupled Map Lattice (CML) formed by Skew Tent …
presented. It made the one-dimensional Coupled Map Lattice (CML) formed by Skew Tent …
A chaos-based image encryption ASIC using reconfigurable logic
Y Zhang, Z Liu, X Zheng - APCCAS 2008-2008 IEEE Asia …, 2008 - ieeexplore.ieee.org
This paper proposes an ASIC implementation of a chaos-based image encryption algorithm,
which features dual-RAM connection and reusable data-path for each round of encryption …
which features dual-RAM connection and reusable data-path for each round of encryption …
[BOK][B] Research on digital image watermark encryption based on hyperchaos
P Wu - 2021 - search.proquest.com
The digital watermarking technique embeds meaningful information into one or more
watermark images hidden in one image, in which it is known as a secret carrier. It is difficult …
watermark images hidden in one image, in which it is known as a secret carrier. It is difficult …