Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Some basic cryptographic requirements for chaos-based cryptosystems
In recent years, a large amount of work on chaos-based cryptosystems have been
published. However, many of the proposed schemes fail to explain or do not possess a …
published. However, many of the proposed schemes fail to explain or do not possess a …
On the dynamical degradation of digital piecewise linear chaotic maps
When chaotic systems are realized with finite precisions in digital computers, their dynamical
properties are often found to be entirely different from the original versions in the continuous …
properties are often found to be entirely different from the original versions in the continuous …
Depreciating motivation and empirical security analysis of chaos-based image and video encryption
Over the past years, an enormous variety of different chaos-based image and video
encryption algorithms have been proposed and published. While any algorithm published …
encryption algorithms have been proposed and published. While any algorithm published …
[HTML][HTML] Color image encryption based on one-time keys and robust chaotic maps
H Liu, X Wang - Computers & Mathematics with Applications, 2010 - Elsevier
We designed a stream-cipher algorithm based on one-time keys and robust chaotic maps, in
order to get high security and improve the dynamical degradation. We utilized the piecewise …
order to get high security and improve the dynamical degradation. We utilized the piecewise …
A chaotic image encryption algorithm based on perceptron model
XY Wang, L Yang, R Liu, A Kadir - Nonlinear Dynamics, 2010 - Springer
Based on the high-dimension Lorenz chaotic system and perceptron model within a neural
network, a chaotic image encryption system with a perceptron model is proposed. This …
network, a chaotic image encryption system with a perceptron model is proposed. This …
Chaos and cryptography: block encryption ciphers based on chaotic maps
G Jakimoski, L Kocarev - … transactions on circuits and systems i …, 2001 - ieeexplore.ieee.org
This paper is devoted to the analysis of the impact of chaos-based techniques on block
encryption ciphers. We present several chaos based ciphers. Using the well-known …
encryption ciphers. We present several chaos based ciphers. Using the well-known …
A robust image encryption scheme using chaotic tent map and cellular automata
PK Naskar, S Bhattacharyya, D Nandy… - Nonlinear Dynamics, 2020 - Springer
This paper suggests a unique image encryption scheme based on key-based block
ciphering followed by shuffling of ciphered bytes with variable-sized blocks, which makes …
ciphering followed by shuffling of ciphered bytes with variable-sized blocks, which makes …
An image encryption approach based on chaotic maps
L Zhang, X Liao, X Wang - Chaos, Solitons & Fractals, 2005 - Elsevier
It is well-known that images are different from texts in many aspects, such as highly
redundancy and correlation, the local structure and the characteristics of amplitude …
redundancy and correlation, the local structure and the characteristics of amplitude …
A new substitution–diffusion based image cipher using chaotic standard and logistic maps
In this paper, we propose a new loss-less symmetric image cipher based on the widely used
substitution–diffusion architecture which utilizes chaotic standard and logistic maps. It is …
substitution–diffusion architecture which utilizes chaotic standard and logistic maps. It is …
Circular inter–intra pixels bit-level permutation and chaos-based image encryption
AV Diaconu - Information Sciences, 2016 - Elsevier
The new image encryption architecture presented in this paper employs a novel circular
inter–intra pixels bit-level permutation strategy. This strategy aims to reduce redundancies …
inter–intra pixels bit-level permutation strategy. This strategy aims to reduce redundancies …