Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A multi-layered data encryption and decryption scheme based on genetic algorithm and residual numbers
EY Baagyere, PAN Agbedemnab, Z Qin… - IEEE …, 2020 - ieeexplore.ieee.org
Over the years, Steganography and Cryptography have been complementary techniques for
enforcing security of digital data. The need for the development of robust multi-layered …
enforcing security of digital data. The need for the development of robust multi-layered …
[PDF][PDF] Elliptic Curve Cryptography Performance Evaluation for Securing Multi-Factor Systems in a Cloud Computing Environment
GO Ogunleye, SE Akinsanya - Iraqi Journal of Science, 2022 - iasj.net
In the contemporary world, the security of data and privacy policies are major concerns in
cloud computing. Data stored on the cloud has been claimed to be unsafe and liable to be …
cloud computing. Data stored on the cloud has been claimed to be unsafe and liable to be …
[PDF][PDF] Linear feedback shift registers-based randomization for image steganography
MA Hussein, S Al-Momen - Iraqi Journal of Science, 2023 - iasj.net
Steganography involves concealing information by embedding data within cover media and
it can be categorized into two main domains: spatial and frequency. This paper presents two …
it can be categorized into two main domains: spatial and frequency. This paper presents two …
[PDF][PDF] A coloured image watermarking based on genetic k-means clustering methodology
ZF Hassan, F Al-Shareefi, HQ Gheni - Journal of Advances in Information …, 2023 - jait.us
There are two techniques long-established in image watermarking area, namely the k-
means and genetic algorithms. The first one is commonly used to allocate an image's pixels …
means and genetic algorithms. The first one is commonly used to allocate an image's pixels …
Overlap** complexes detection within protein interaction networks using improved genetic algorithm
DA Abduljabbar - Human Gene, 2024 - Elsevier
Background The protein complexes detection has an important role in analyzing biological
processes and understanding life at the cellular level. Although many complex detection …
processes and understanding life at the cellular level. Although many complex detection …
Using steganography techniques for implicit authentication to enhance sensitive data hiding
RN Kadhum, NHM Ali - International Journal of Nonlinear …, 2022 - ijnaa.semnan.ac.ir
Smartphones recently become indispensable to users due to the services provided, like
Internet access and important applications (eg, financial and health applications). which …
Internet access and important applications (eg, financial and health applications). which …
Information hiding for text files by adopting the genetic algorithm and DNA coding
Hiding information is a process to hide data or include it in different digital media such as
image, audio, video, and text. However, there are many techniques to achieve the process of …
image, audio, video, and text. However, there are many techniques to achieve the process of …
[PDF][PDF] Data hiding using integer lifting wavelet transform and DNA computing
FA Abdullatif, AA Abdullatif… - Periodicals of Engineering …, 2020 - researchgate.net
ABSTRACT DNA computing widely used in encryption or hiding the data. Many researchers
have proposed many developments of encryption and hiding algorithms based on DNA …
have proposed many developments of encryption and hiding algorithms based on DNA …
[PDF][PDF] Video steganography for image and text using deep genetic algorithm and LSB
NM Selim, SK Guirguis, YF Hassan - International Journal of …, 2022 - ijns.jalaxy.com.tw
Data security is a threat for delivering data through the internet, and it is concerned with
protecting sensitive data from unauthorized access. The security threats increase with the …
protecting sensitive data from unauthorized access. The security threats increase with the …
[PDF][PDF] TEXT STEGANOGRAPHY BASED ON ARABIC CHARACTERS LINGUISTIC FEATURES AND WORD SHIFTING METHOD
In the field of data security, the critical challenge of preserving sensitive information during
its transmission through public channels takes centre stage. Steganography, a method …
its transmission through public channels takes centre stage. Steganography, a method …