Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] A new image encryption technique combining Elliptic Curve Cryptosystem with Hill Cipher
Image encryption is rapidly increased recently by the increasing use of the internet and
communication media. Sharing important images over unsecured channels is liable for …
communication media. Sharing important images over unsecured channels is liable for …
[HTML][HTML] Securing medical information transmission between IoT devices: An innovative hybrid encryption scheme based on quantum walk, DNA encoding, and chaos
The healthcare industry has undergone a transformation due to the widespread use of
advanced communication technologies and wireless sensor networks such as the Internet of …
advanced communication technologies and wireless sensor networks such as the Internet of …
Image encryption scheme based on a new secure variant of Hill cipher and 1D chaotic maps
M Essaid, I Akharraz, A Saaidi - Journal of Information Security and …, 2019 - Elsevier
This article suggests a new image encryption algorithm based on a secure variant of Hill
Cipher (HC) and three improved one-dimensional (1D) chaotic maps. The proposed scheme …
Cipher (HC) and three improved one-dimensional (1D) chaotic maps. The proposed scheme …
[PDF][PDF] Image encryption using advanced hill cipher algorithm
The Hill cipher algorithm is one of the symmetric key algorithms that have several
advantages in data encryption. But, the inverse of the key matrix used for encrypting the …
advantages in data encryption. But, the inverse of the key matrix used for encrypting the …
[PDF][PDF] A new hybrid text encryption approach over mobile ad hoc network
Data exchange has been rapidly increased recently by increasing the use of mobile
networks. Sharing information (text, image, audio and video) over unsecured mobile network …
networks. Sharing information (text, image, audio and video) over unsecured mobile network …
New image encryption scheme based on dynamic substitution and hill cipher
Y Qobbi, A Jarjar, M Essaid, A Benazzi - WITS 2020: Proceedings of the …, 2022 - Springer
In this work, we propose a new color image encryption technique. After transiting of the
original image into a vector and decomposing it into blocks of three pixels, along with …
original image into a vector and decomposing it into blocks of three pixels, along with …
A secure variant of the Hill cipher
The Hill cipher is a classical symmetric encryption algorithm that succumbs to the know-
plaintext attack. Although its vulnerability to cryptanalysis has rendered it unusable in …
plaintext attack. Although its vulnerability to cryptanalysis has rendered it unusable in …
Image encryption based on novel Hill Cipher variant and 2D-IGSCM hyper-chaotic map
Y Zheng, Q Huang, S Cai, X **ong, L Huang - Nonlinear Dynamics, 2025 - Springer
Abstract The Hill Cipher (HC) is a simple and fast encryption technique that is suitable for
encrypting images with large data volume, but it still has some shortcomings like failing to …
encrypting images with large data volume, but it still has some shortcomings like failing to …
A hybrid authenticated image encryption scheme using elliptic curves for enhanced security
The rapid evolution of digital technology has heightened concerns about the security of
multimedia communication across vulnerable platforms. In response to this challenge, our …
multimedia communication across vulnerable platforms. In response to this challenge, our …
A modified hill cipher based on circulant matrices
Secured communication of text information is prime importance across the globe.
Cryptography is one of the methods to attain security. The Hill cipher is a symmetric …
Cryptography is one of the methods to attain security. The Hill cipher is a symmetric …