Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Multi-image encryption scheme with quaternion discrete fractional Tchebyshev moment transform and cross-coupling operation
NR Zhou, LJ Tong, WP Zou - Signal Processing, 2023 - Elsevier
With quaternion theory, the traditional discrete fractional Tchebyshev transform is extended
to the quaternion algebra domain for multi-image processing. A new multi-image encryption …
to the quaternion algebra domain for multi-image processing. A new multi-image encryption …
Image Encryption via Base-n PRNGs and Parallel Base-n S-Boxes
The fast-paced advancement in multimedia production and exchanges over unsecured
networks have led to a dire need to develop security applications. In this regard, chaos …
networks have led to a dire need to develop security applications. In this regard, chaos …
A survey of image encryption algorithms based on chaotic system
Many researchers have devoted themselves to studying image encryption based on chaotic
system and have made significant strides in research in recent decades. This paper first …
system and have made significant strides in research in recent decades. This paper first …
Multimedia security using encryption: A survey
Considering the current dependency on digital technology in modern society, the protection
of multimedia is highly important. Encryption is vital in modern digital communication …
of multimedia is highly important. Encryption is vital in modern digital communication …
Image encryption based on 8D hyperchaotic system using Fibonacci Q-Matrix
One of the key tenets of the enormous and still-expanding digital realm is the security of
images. In recent years, the interest in image encryption has increased among researchers …
images. In recent years, the interest in image encryption has increased among researchers …
Adaptive reversible image-data hiding algorithm based on blockchain and zero watermarking
G Ye, Z Chen, X Huang - Optics & Laser Technology, 2024 - Elsevier
An adaptive reversible image-data hiding (ARIdH) algorithm is proposed. First, the variance
of the secret plain image is calculated and taken as feature values, by a new integer …
of the secret plain image is calculated and taken as feature values, by a new integer …
[HTML][HTML] Efficient and secure image encryption using key substitution process with discrete wavelet transform
Over the past few years, there has been a rise in the utilization of chaotic encryption
algorithms for securing images. The majority of chaos-based encryption algorithms adhere …
algorithms for securing images. The majority of chaos-based encryption algorithms adhere …
An image encryption algorithm based on a 3D chaotic Hopfield neural network and random row–column permutation
W Yao, K Gao, Z Zhang, L Cui, J Zhang - Frontiers in Physics, 2023 - frontiersin.org
This study proposes a novel color image encryption algorithm based on a 3D chaotic
Hopfield neural network and random row–column permutation. First, a 3D chaotic Hopfield …
Hopfield neural network and random row–column permutation. First, a 3D chaotic Hopfield …
Fast colored video encryption using block scrambling and multi-key generation
Multimedia information usage is increasing with new technologies such as the Internet of
things (IoT), cloud computing, and big data processing. Video is one of the most widely used …
things (IoT), cloud computing, and big data processing. Video is one of the most widely used …
Color image encryption based on 2D enhanced hyperchaotic logistic-sine map and two-way Josephus traversing
To improve the chaotic behavior of the chaotic map, this paper proposes a new two-
dimensional (2D) chaotic map, namely, 2D enhanced hyperchaotic Logistic-sine map (2D …
dimensional (2D) chaotic map, namely, 2D enhanced hyperchaotic Logistic-sine map (2D …