Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A new hybrid digital chaotic system with applications in image encryption
Image encryption provides confidentiality to images by transforming them into
unrecognizable forms that resemble white noise. Digital chaos is one of the areas used to …
unrecognizable forms that resemble white noise. Digital chaos is one of the areas used to …
Cyber security in new space: Analysis of threats, key enabling technologies and challenges
Developments in technologies, attitudes and investment are transforming the space
environment, achieving greater accessibility for an increasing number of parties. New and …
environment, achieving greater accessibility for an increasing number of parties. New and …
Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography
This paper performs a thorough security analysis of a chaotic image encryption algorithm
based on autoblocking and electrocardiography from the view point of modern cryptography …
based on autoblocking and electrocardiography from the view point of modern cryptography …
A novel pseudorandom number generator based on pseudorandomly enhanced logistic map
MA Murillo-Escobar, C Cruz-Hernández… - Nonlinear …, 2017 - Springer
In last years, low-dimensional and high-dimensional chaotic systems have been
implemented in cryptography. The efficiency and performance of these nonlinear systems …
implemented in cryptography. The efficiency and performance of these nonlinear systems …
[HTML][HTML] An image encryption scheme based on block scrambling, modified zigzag transformation and key generation using enhanced logistic—Tent map
Nowadays, the images are transferred through open channels that are subject to potential
attacks, so the exchange of image data requires additional security in many fields, such as …
attacks, so the exchange of image data requires additional security in many fields, such as …
A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption
A novel and robust chaos-based pseudorandom permutation–substitution scheme for image
encryption is proposed. It is a loss-less symmetric block cipher and specifically designed for …
encryption is proposed. It is a loss-less symmetric block cipher and specifically designed for …
Image encryption scheme based on a new secure variant of Hill cipher and 1D chaotic maps
M Essaid, I Akharraz, A Saaidi - Journal of Information Security and …, 2019 - Elsevier
This article suggests a new image encryption algorithm based on a secure variant of Hill
Cipher (HC) and three improved one-dimensional (1D) chaotic maps. The proposed scheme …
Cipher (HC) and three improved one-dimensional (1D) chaotic maps. The proposed scheme …
Sine‐Cosine Optimization‐Based Bijective Substitution‐Boxes Construction Using Enhanced Dynamics of Chaotic Map
AA Alzaidi, M Ahmad, HS Ahmed, EA Solami - Complexity, 2018 - Wiley Online Library
This paper proposes a novel method of constructing strong substitution‐boxes (S‐boxes) of
order n (4≤ n≤ 8) based on a recent optimization algorithm known as sine‐cosine …
order n (4≤ n≤ 8) based on a recent optimization algorithm known as sine‐cosine …
A robust embedded biometric authentication system based on fingerprint and chaotic encryption
MA Murillo-Escobar, C Cruz-Hernández… - Expert Systems with …, 2015 - Elsevier
Fingerprint recognition is a reliable solution in user authentication systems. Nevertheless,
the security and secrecy of the users data are a concern in today's biometric systems and …
the security and secrecy of the users data are a concern in today's biometric systems and …
An image encryption algorithm based on substitution technique and chaos mixing
YPK Nkandeu, A Tiedeu - Multimedia Tools and Applications, 2019 - Springer
These recent years, countless chaos-based image encryption algorithms have been
proposed to meet security needs in real time multimedia communication. However, many of …
proposed to meet security needs in real time multimedia communication. However, many of …