Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Computational image encryption techniques: a comprehensive review
Images contain very sensitive and confidential information. Because images play a
significant role in many applications such as military communication, remote‐sensing, and …
significant role in many applications such as military communication, remote‐sensing, and …
[HTML][HTML] Enhancement of the cast block algorithm based on novel S-box for image encryption
Background and Aim: due to the rapid growth of data communication and multimedia system
applications, security becomes a critical issue in the communication and storage of images …
applications, security becomes a critical issue in the communication and storage of images …
A robust bit-level image encryption based on Bessel map
A chaotic map plays a critical role in image encryption (IME). The map used to generate
chaotic sequences should perform high dynamic characteristics. In this study, a new chaotic …
chaotic sequences should perform high dynamic characteristics. In this study, a new chaotic …
2D eπ-map for image encryption
A chaotic map generally employed to generate chaotic sequence is key element for an
image encryption algorithm (IEA). In this study, an IEA using novel 2D chaotic map, which is …
image encryption algorithm (IEA). In this study, an IEA using novel 2D chaotic map, which is …
Modified whale optimization algorithm based on tent chaotic map** and its application in structural optimization
Y Li, M Han, Q Guo - KSCE Journal of Civil Engineering, 2020 - Springer
In this paper, a novel modified whale optimization algorithm based on Tent chaos map and
tournament selection strategy (MWOA) was presented. The aim of the improved algorithm is …
tournament selection strategy (MWOA) was presented. The aim of the improved algorithm is …
[HTML][HTML] Principles of fractional signal processing
MD Ortigueira - Digital Signal Processing, 2024 - Elsevier
A general framework for fractional signal processing is described and used to derive several
interesting formulations. This scheme is based on the Liouville approach that gave rise to …
interesting formulations. This scheme is based on the Liouville approach that gave rise to …
Cryptanalysis of an image block encryption algorithm based on chaotic maps
Y Ma, C Li, B Ou - Journal of Information Security and Applications, 2020 - Elsevier
Recently, an image block encryption algorithm was proposed based on some well-known
chaotic maps. The authors claim that the encryption algorithm achieves enough security …
chaotic maps. The authors claim that the encryption algorithm achieves enough security …
A controllable photosensitive neuron model and its application
In this paper, a controllable photosensitive neuron model is designed by incorporating two
phototubes in parallel in the FitzHugh–Nagumo neural circuit. The two phototubes are …
phototubes in parallel in the FitzHugh–Nagumo neural circuit. The two phototubes are …
A novel simultaneous permutation–diffusion image encryption scheme based on a discrete space map
JIM Bezerra, G Machado, A Molter, RI Soares… - Chaos, Solitons & …, 2023 - Elsevier
The constant increase of devices connected to the internet and the development and spread
of technologies such as 5G leads to substantial growth in data-sharing over non-secure …
of technologies such as 5G leads to substantial growth in data-sharing over non-secure …
Efficient image encryption scheme using Henon map, dynamic S-boxes and elliptic curve cryptography
Image encryption schemes can be vulnerable to a variety of cryptanalysis attacks. The use of
key-dependent dynamic S-boxes has been shown to improve security. Threats of chosen …
key-dependent dynamic S-boxes has been shown to improve security. Threats of chosen …