Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
An introduction to image steganography techniques
Steganography is a form of security technique through obscurity, the science and art of
hiding the existence of a message between sender and intended recipient. Steganography …
hiding the existence of a message between sender and intended recipient. Steganography …
PSW statistical LSB image steganalysis
Steganography is the art and science of producing covert communications by concealing
secret messages in apparently innocent media, while steganalysis is the art and science of …
secret messages in apparently innocent media, while steganalysis is the art and science of …
SIKM–a smart cryptographic key management framework
For a secure data transmission in symmetric cryptography, data are encrypted and
decrypted using an identical key. The process of creating, distributing, storing, deploying …
decrypted using an identical key. The process of creating, distributing, storing, deploying …
An intelligent cryptographic key management model for secure communications in distributed industrial intelligent systems
For secure communication in a distributed cooperation, generally, the data are encrypted
and decrypted using a symmetric key. The process of creating, distributing, storing …
and decrypted using a symmetric key. The process of creating, distributing, storing …
[PDF][PDF] Innovative approach to improve hybrid cryptography by using DNA steganography
MRN Torkaman, NS Kazazi… - International Journal on …, 2012 - academia.edu
There exists a big demand for innovative secure electronic communications while the
expertise level of attackers increases rapidly and that causes even bigger demands and …
expertise level of attackers increases rapidly and that causes even bigger demands and …
[PDF][PDF] Definitions and criteria of CIA security triangle in electronic voting system
Abstract Confidentiality, Integrity, and Availability are three sides of the famous CIA security
triangle. Since the evoting systems are built from particular components, the CIA security …
triangle. Since the evoting systems are built from particular components, the CIA security …
[PDF][PDF] Security and performance evaluation of lightweight cryptographic algorithms in RFID
This paper analyzes the security and performance of lightweight encryption algorithms,
which are used in RFID applications. Four of the most popular algorithms which are TEA …
which are used in RFID applications. Four of the most popular algorithms which are TEA …
Introduction of DNA computing in cryptography
This chapter provides an overview of cryptography and DNA computing. It presents all the
basics of cryptography and discusses background studies of DNA and the applications of …
basics of cryptography and discusses background studies of DNA and the applications of …
[PDF][PDF] IKM-based security usability enhancement model
S Yazdanpanah, SS Chaeikar - IRACST-International Journal of …, 2012 - researchgate.net
Today by growth of hardware and software technologies new developed products are
delivering more facilities while their security configuration is becoming more and more …
delivering more facilities while their security configuration is becoming more and more …
Secure SMS transmission based on social network messages
SS Chaeikar, S Yazdanpanah… - International Journal of …, 2021 - inderscienceonline.com
Nowadays, short message communication has a wide range of applications in modern lives.
Authentication, announcements, reports, and personal communications are the common …
Authentication, announcements, reports, and personal communications are the common …