Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] IWT and RSA based asymmetric image encryption algorithm
S Du, G Ye - Alexandria Engineering Journal, 2023 - Elsevier
An asymmetric image encryption algorithm based on integer wavelet transformation (IWT)
and Rivest-Shamir-Adleman (RSA) algorithm is proposed. Firstly, two plain characteristic …
and Rivest-Shamir-Adleman (RSA) algorithm is proposed. Firstly, two plain characteristic …
Secured IIoT against trust deficit-A flexi cryptic approach
VM Padmapriya, K Thenmozhi, M Hemalatha… - Multimedia Tools and …, 2024 - Springer
This research allows the secure surveillance approach for the Internet of Things (IoT)
methodology to be developed by integrating wireless signalling and image encryption …
methodology to be developed by integrating wireless signalling and image encryption …
Dual-domain image encryption in unsecure medium—A secure communication perspective
H Mahalingam, T Veeramalai, AR Menon, SS… - Mathematics, 2023 - mdpi.com
With the growing demand for digitalization, multimedia data transmission through wireless
networks has become more prominent. These multimedia data include text, images, audio …
networks has become more prominent. These multimedia data include text, images, audio …
A new RGB color image encryption scheme based on cross-channel pixel and bit scrambling using chaos
M Demirtaş - Optik, 2022 - Elsevier
A new RGB color image encryption algorithm is presented in this paper. The hyperchaotic
two-dimensional logistic-sine-coupling map (2D-LSCM), which was previously suggested in …
two-dimensional logistic-sine-coupling map (2D-LSCM), which was previously suggested in …
[HTML][HTML] Securing medical information transmission between IoT devices: An innovative hybrid encryption scheme based on quantum walk, DNA encoding, and chaos
MU Rehman, A Shafique, AB Usman - Internet of Things, 2023 - Elsevier
The healthcare industry has undergone a transformation due to the widespread use of
advanced communication technologies and wireless sensor networks such as the Internet of …
advanced communication technologies and wireless sensor networks such as the Internet of …
Digital image encryption using elliptic curve cryptography: A review
Today, digital images are used in many different applications. They can be social media
applications or critical applications such as military and medical. However, cyber attacks or …
applications or critical applications such as military and medical. However, cyber attacks or …
Image encryption algorithm based on Arnold transform and chaos theory in the multi-wavelet domain
AA Abdul-Kareem, WAM Al-Jawher - International Journal of …, 2023 - Taylor & Francis
Image encryption is essential for ensuring data transmission security over open public
networks. Using Multi-Wavelet Transform, Arnold transform, and two chaotic systems, a …
networks. Using Multi-Wavelet Transform, Arnold transform, and two chaotic systems, a …
DNA-chaos governed cryptosystem for cloud-based medical image repository
N Chidambaram, K Thenmozhi, P Raj… - Cluster Computing, 2024 - Springer
Nowadays, digital medical images have become an essential source for the grand success
of e-health technology. At the same time, the massive storage also plays a vital role. One of …
of e-health technology. At the same time, the massive storage also plays a vital role. One of …
A novel multiple grayscale image encryption method based on 3D bit-scrambling and diffusion
M Demirtaş - Optik, 2022 - Elsevier
Since a large number of digital images are shared widely in our daily life, the demand and
need for multiple-image encryption algorithms are increasing to ensure the security of the …
need for multiple-image encryption algorithms are increasing to ensure the security of the …
Healthcare with datacare—a triangular DNA security
SA Banu, AI Al-Alawi, M Padmaa, PS Priya… - Multimedia Tools and …, 2024 - Springer
One of the fastest-growing industries in recent years has been e-Healthcare. Many
cyberattacks and threats against patient confidentiality exist in electronic health records …
cyberattacks and threats against patient confidentiality exist in electronic health records …