Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A lightweight chaos-based medical image encryption scheme using random shuffling and XOR operations
Medical images possess significant importance in diagnostics when it comes to healthcare
systems. These images contain confidential and sensitive information such as patients' X …
systems. These images contain confidential and sensitive information such as patients' X …
Chaos-based confusion and diffusion of image pixels using dynamic substitution
The evolution of wireless and mobile communication from 0G to the upcoming 5G gives rise
to data sharing through the Internet. This data transfer via open public networks are …
to data sharing through the Internet. This data transfer via open public networks are …
DNA and plaintext dependent chaotic visual selective image encryption
Visual selective image encryption can both improve the efficiency of the image encryption
algorithm and reduce the frequency and severity of attacks against data. In this article, a new …
algorithm and reduce the frequency and severity of attacks against data. In this article, a new …
Efficient hashing method using 2D-2D PCA for image copy detection
Image copy detection is an important technology of copyright protection. This paper
proposes an efficient hashing method for image copy detection using 2D-2D (two-directional …
proposes an efficient hashing method for image copy detection using 2D-2D (two-directional …
Dynamic substitution and confusion-diffusion-based noise-resistive image encryption using multiple chaotic maps
The advancement in wireless communication has encouraged the process of data
transferring through the Internet. The process of data sharing via the Internet is prone to …
transferring through the Internet. The process of data sharing via the Internet is prone to …
[HTML][HTML] A novel privacy approach of digital aerial images based on mersenne twister method with DNA genetic encoding and chaos
Aerial photography involves capturing images from aircraft and other flying objects,
including Unmanned Aerial Vehicles (UAV). Aerial images are used in many fields and can …
including Unmanned Aerial Vehicles (UAV). Aerial images are used in many fields and can …
[HTML][HTML] Designing two secure keyed hash functions based on sponge construction and the chaotic neural network
In this paper, we propose, implement, and analyze the structures of two keyed hash
functions using the Chaotic Neural Network (CNN). These structures are based on Sponge …
functions using the Chaotic Neural Network (CNN). These structures are based on Sponge …
Integration of spatial and frequency domain encryption for digital images
Transmission of multimedia data such as images, videos, and audio over the Internet is risky
due to cyberattacks. To overcome the security issues, several encryption schemes are …
due to cyberattacks. To overcome the security issues, several encryption schemes are …
Enhancing the depth perception of DSA images with 2D–3D registration
X Zhang, Y Deng, C Tian, S Chen, Y Wang… - Frontiers in …, 2023 - frontiersin.org
Objective Today, cerebrovascular disease has become an important health hazard.
Therefore, it is necessary to perform a more accurate and less time-consuming registration …
Therefore, it is necessary to perform a more accurate and less time-consuming registration …
[HTML][HTML] An image hashing-based authentication and secure group communication scheme for IoT-enabled MANETs
A Albeshri - Future Internet, 2021 - mdpi.com
Mobile ad hoc networks (MANETs) play a highly significant role in the Internet of Things (IoT)
for managing node mobility. MANET opens the pathway for different IoT-based …
for managing node mobility. MANET opens the pathway for different IoT-based …