Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Enhancement of the cast block algorithm based on novel S-box for image encryption
Background and Aim: due to the rapid growth of data communication and multimedia system
applications, security becomes a critical issue in the communication and storage of images …
applications, security becomes a critical issue in the communication and storage of images …
The role of analog signal processing in upcoming telecommunication systems: Concept, challenges, and outlook
With the increasing demands in modern communications, the concepts of energy-efficient
and low-cost processors have received a lot of attention from researchers in recent years …
and low-cost processors have received a lot of attention from researchers in recent years …
Novel multiple-image encryption algorithm based on a two-dimensional hyperchaotic modular model
Z Zhou, X Xu, Y Yao, Z Jiang, K Sun - Chaos, Solitons & Fractals, 2023 - Elsevier
Current multiple-image encryption schemes usually require a fixed number or the same size
of images. Therefore, this paper proposes a multiple-image encryption algorithm that can …
of images. Therefore, this paper proposes a multiple-image encryption algorithm that can …
Comprehensive Analysis of Compressible Perceptual Encryption Methods—Compression and Encryption Perspectives
Perceptual encryption (PE) hides the identifiable information of an image in such a way that
its intrinsic characteristics remain intact. This recognizable perceptual quality can be used to …
its intrinsic characteristics remain intact. This recognizable perceptual quality can be used to …
An n-dimensional polynomial modulo chaotic map with controllable range of Lyapunov exponents and its application in color image encryption
D Ding, H Zhu, H Zhang, Z Yang, D **e - Chaos, Solitons & Fractals, 2024 - Elsevier
In chaos-based image encryption, better performance of the chaotic system represents
higher security of the encryption algorithm, and the Lyapunov exponent (LE) is an important …
higher security of the encryption algorithm, and the Lyapunov exponent (LE) is an important …
The dichotomy of cloud and iot: Cloud-assisted iot from a security perspective
In recent years, the existence of a significant cross-impact between Cloud computing and
Internet of Things (IoT) has lead to a dichotomy that gives raise to Cloud-Assisted IoT …
Internet of Things (IoT) has lead to a dichotomy that gives raise to Cloud-Assisted IoT …
[HTML][HTML] Fractal-based hybrid cryptosystem: Enhancing image encryption with RSA, homomorphic encryption, and chaotic maps
DE Mfungo, X Fu - Entropy, 2023 - mdpi.com
Protecting digital data, especially digital images, from unauthorized access and malicious
activities is crucial in today's digital era. This paper introduces a novel approach to enhance …
activities is crucial in today's digital era. This paper introduces a novel approach to enhance …
Image encryption algorithm based on hyperchaos and DNA coding
L Li - IET Image Processing, 2024 - Wiley Online Library
A novel image encryption algorithm based on hyperchaos and DNA encoding is proposed in
this paper. Unlike the traditional DNA‐based encoding method, a more fine‐grained …
this paper. Unlike the traditional DNA‐based encoding method, a more fine‐grained …
ICFCM-MIE: improved cosine fractional chaotic map based medical image encryption
Advanced healthcare applications such as telemedicine, smart health, and e-health transmit
digital images over an open and insecure communication network. Hence, it becomes …
digital images over an open and insecure communication network. Hence, it becomes …
[HTML][HTML] Securing blockchain-enabled smart health care image encryption framework using Tinkerbell Map
IoT enables the emergence and implementation of smart devices to address real-world
problems and challenges. Today we are surrounded by various smart devices, such as …
problems and challenges. Today we are surrounded by various smart devices, such as …