Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A review of various reversible embedding mechanisms
Y Natarajan, RA Raja, NV Kousik… - … of Intelligence and …, 2021 - inderscienceonline.com
The ability of communicating the information and hiding secret information has gained much
advancement in the field of image processing. Watermarking in the image processing hides …
advancement in the field of image processing. Watermarking in the image processing hides …
A robust digital video watermarking based on CT-SVD domain and chaotic DNA sequences for copyright protection
With the growing use of the digital world and its associated challenges, the use of digital
watermarking is a popular and appropriate way of protecting digital content against illegal …
watermarking is a popular and appropriate way of protecting digital content against illegal …
[CARTE][B] Numerical methods for fractal-fractional differential equations and engineering: simulations and modeling
MA Khan, A Atangana - 2023 - taylorfrancis.com
This book is about the simulation and modeling of novel chaotic systems within the frame of
fractal-fractional operators. The methods used, their convergence, stability, and error …
fractal-fractional operators. The methods used, their convergence, stability, and error …
A new chaotic system with stable equilibrium: From theoretical model to circuit implementation
Recent evidences suggest that complex behavior such as chaos can be observed in a
nonlinear system with stable equilibria. However, few studies have investigated chaotic …
nonlinear system with stable equilibria. However, few studies have investigated chaotic …
Discrete stationary wavelet transform and SVD-based digital image watermarking for improved security
R Chellappan, S Satheeskumaran… - International …, 2021 - inderscienceonline.com
Digital image watermarking plays an important role in digital content protection and security
related applications. Embedding watermark is helpful to identify the copyright of an image or …
related applications. Embedding watermark is helpful to identify the copyright of an image or …
A logistic map-based fragile watermarking scheme of digital images with tamper detection
S Trivedy, AK Pal - Iranian Journal of Science and Technology …, 2017 - Springer
Integrity protection is one of the security mechanisms used to prevent the originality of the
content from illegal manipulation. In this paper, the authors have proposed an efficient …
content from illegal manipulation. In this paper, the authors have proposed an efficient …
High performance optical image hiding based on computational ghost imaging with BCH error correction coding technique
X Bai, LZ Zhang, J Li, Z Yu, Z Yang, Y Wang… - Optics & Laser …, 2022 - Elsevier
The conventional image hiding scheme based on computational ghost imaging (CGI) has
low-quality reconstructed watermark and unsatisfied security. In this paper, a high …
low-quality reconstructed watermark and unsatisfied security. In this paper, a high …
Computational techniques for highly oscillatory and chaotic wave problems with fractional-order operator
KM Owolabi - The European Physical Journal Plus, 2020 - Springer
In this paper, we study the dynamic evolution of chaotic and oscillatory waves arising from
dissipative dynamical systems of elliptic and parabolic types of partial differential equations …
dissipative dynamical systems of elliptic and parabolic types of partial differential equations …
A novel chaotic system with heart-shaped equilibrium and its circuital implementation
For the past five years there has been much attention to systems with uncountable equilibria.
This work introduces a new system with an infinite number of equilibrium points. It is worth …
This work introduces a new system with an infinite number of equilibrium points. It is worth …
[HTML][HTML] Correcting errors in image encryption based on DNA coding
As a primary method, image encryption is widely used to protect the security of image
information. In recent years, image encryption pays attention to the combination with DNA …
information. In recent years, image encryption pays attention to the combination with DNA …