Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Efficient implementation of chaotic image encryption in transform domains
The primary goal of this paper is security management in data image transmission and
storage. Because of the increased use of images in industrial operations, it is necessary to …
storage. Because of the increased use of images in industrial operations, it is necessary to …
Fusion-based encryption scheme for cancelable fingerprint recognition
This paper presents a fingerprint image encryption scheme based on fingerprint image
fusion with another visible image that is rich in details. The encryption process is performed …
fusion with another visible image that is rich in details. The encryption process is performed …
A selective image encryption based on square-wave shuffling with orthogonal polynomials transformation suitable for mobile devices
In this paper, a selective image encryption algorithm based on square-wave shuffling in the
orthogonal polynomials domain is proposed. This algorithm is adaptive to the user device's …
orthogonal polynomials domain is proposed. This algorithm is adaptive to the user device's …
Denoising and error correction in noisy AES-encrypted images using statistical measures
Cryptography based techniques are used to secure confidential data from unauthorized
access. These techniques are very good for the security and protection of the data but are …
access. These techniques are very good for the security and protection of the data but are …
Wavelet fusion for encrypting images with a few details
This paper introduces a new scheme for encrypting images with a few details based on
wavelet fusion. In this scheme, the image with a few details to be encrypted is fused with …
wavelet fusion. In this scheme, the image with a few details to be encrypted is fused with …
Dual Image Cryptosystem Using Henon Map and Discrete Fourier Transform.
H Alhumyani - Intelligent Automation & Soft Computing, 2023 - search.ebscohost.com
This paper introduces an efficient image cryptography system. The proposed image
cryptography system is based on employing the two-dimensional (2D) chaotic henon map …
cryptography system is based on employing the two-dimensional (2D) chaotic henon map …
New audio encryption package for TV cloud computing
SMS Eldin, SA Khamis, AAIM Hassanin… - International Journal of …, 2015 - Springer
For any cloud computing (ClComp), encryption of multimedia is one of the main applications
as cloud tries to maintain it in a good situation and protect from any tampering. This work …
as cloud tries to maintain it in a good situation and protect from any tampering. This work …
Sparse Matrix Based Low-Complexity, Recursive, and Radix-2 Algorithms for Discrete Sine Transforms
This paper presents factorizations of each discrete sine transform (DST) matrix of types I, II,
III, and IV into a product of sparse, diagonal, bidiagonal, and scaled orthogonal matrices …
III, and IV into a product of sparse, diagonal, bidiagonal, and scaled orthogonal matrices …
Selective region encryption using a fast shape adaptive transform
REL Metzler, SS Agaian - 2010 IEEE International Conference …, 2010 - ieeexplore.ieee.org
Selective regional encryption was performed on nonrectangular, statistically relevant
regions of image media by permutation of coefficients in the domain of a fast, shape …
regions of image media by permutation of coefficients in the domain of a fast, shape …
[PDF][PDF] Comparative Performance of Image Scrambling in Transform Domain using Sinusoidal Transforms
With the rapid development of technology, and the popularization of internet, communication
is been greatly promoted. The communication is not limited only to information but also …
is been greatly promoted. The communication is not limited only to information but also …