Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Visually meaningful image encryption algorithm based on digital signature
Traditional image encryption algorithms transform a plain image into a noise-like image. To
lower the chances for the encrypted image being detected by the attacker during the image …
lower the chances for the encrypted image being detected by the attacker during the image …
Dual color images watermarking scheme with geometric correction based on quaternion FrOOFMMs and LS-SVR
LH Gong, HX Luo - Optics & Laser Technology, 2023 - Elsevier
To better describe the features of a color image, the quaternion fractional-order orthogonal
Fourier-Mellin moments (QFrOOFMMs) are defined. By combining QFrOOFMMs with least …
Fourier-Mellin moments (QFrOOFMMs) are defined. By combining QFrOOFMMs with least …
A systematic literature review on chaotic maps-based image security techniques
Images play a substantial role in various applications such as medical imaging, satellite
imaging, and military communications. These images often contain confidential and …
imaging, and military communications. These images often contain confidential and …
Hiding data using efficient combination of RSA cryptography, and compression steganography techniques
Data compression is an important part of information security because compressed data is
more secure and easy to handle. Effective data compression technology creates efficient …
more secure and easy to handle. Effective data compression technology creates efficient …
Boosting image watermarking authenticity spreading secrecy from counting‐based secret‐sharing
A Gutub - CAAI Transactions on Intelligence Technology, 2023 - Wiley Online Library
This study presents enhancing images authentication by securing watermarking hidden data
via shares generated from counting‐based secret sharing. The trustfulness of shares utilised …
via shares generated from counting‐based secret sharing. The trustfulness of shares utilised …
A DWT-SVD based robust digital watermarking for medical image security
In this work, we propose a blind watermarking approach for medical image protection. In this
approach, the watermark will be constituted of the Electronic Patient Record and the image …
approach, the watermark will be constituted of the Electronic Patient Record and the image …
Deterministic chaos game: a new fractal based pseudo-random number generator and its cryptographic application
In this paper, a digital image encryption algorithm is proposed based on the generalized
model of the chaos game. The chaos game is a well-known fractal, which acts as a pseudo …
model of the chaos game. The chaos game is a well-known fractal, which acts as a pseudo …
Coverless image steganography: a survey
J Qin, Y Luo, X **ang, Y Tan, H Huang - IEEE access, 2019 - ieeexplore.ieee.org
With the digitalization of information, a lot of multimedia data are under attack, information
security has become a key issue of public concern. Image steganography, aiming at using …
security has become a key issue of public concern. Image steganography, aiming at using …
End-to-end image steganography using deep convolutional autoencoders
Image steganography is used to hide a secret image inside a cover image in plain sight.
Traditionally, the secret data is converted into binary bits and the cover image is …
Traditionally, the secret data is converted into binary bits and the cover image is …
Digital image scrambling based on a new one-dimensional coupled Sine map
This paper proposes a new one-dimensional chaotic map, called chaotic coupled Sine map
(CCSM), for the scrambling and encryption processes. The purpose of the CCSM design is …
(CCSM), for the scrambling and encryption processes. The purpose of the CCSM design is …