Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Digital to quantum watermarking: A journey from past to present and into the future
With the amplification of digitization, the surge in multimedia content, such as text, video,
audio, and images, is incredible. Concomitantly, the incidence of multimedia tampering is …
audio, and images, is incredible. Concomitantly, the incidence of multimedia tampering is …
Privacy‐preserving remote sensing images recognition based on limited visual cryptography
D Zhang, M Shafiq, L Wang… - CAAI Transactions on …, 2023 - Wiley Online Library
With the arrival of new data acquisition platforms derived from the Internet of Things (IoT),
this paper goes beyond the understanding of traditional remote sensing technologies. Deep …
this paper goes beyond the understanding of traditional remote sensing technologies. Deep …
A chaos-based novel approach to video encryption using dynamic S-box
D Dhingra, M Dua - Multimedia Tools and Applications, 2024 - Springer
Video Encryption is the process of converting the video into an unrecognizable form to
protect it from unauthorized access. This paper proposes a novel video encryption method …
protect it from unauthorized access. This paper proposes a novel video encryption method …
A comprehensive review of visual cryptography for enhancing high-security applications
PM Bachiphale, NS Zulpe - Multimedia Tools and Applications, 2024 - Springer
In today's digital era, safeguarding sensitive information is critical. Visual cryptography offers
a promising solution for enhancing security in online banking, web account management …
a promising solution for enhancing security in online banking, web account management …
A new encryption algorithm for image data based on two-way chaotic maps and iterative cellular automata
Due to their simplicity of implementation and compliance with the encryption issue, chaotic
models are often utilized in picture encryption applications. Despite having many benefits …
models are often utilized in picture encryption applications. Despite having many benefits …
Integration of image preprocessing and recognition functions in an optoelectronic coupling organic ferroelectric retinomorphic neuristor
The human visual system (HVS) has the advantages of a low power consumption and high
efficiency because of the synchronous perception and early preprocessing of external image …
efficiency because of the synchronous perception and early preprocessing of external image …
A novel color visual cryptography approach based on Harris Hawks Optimization Algorithm
D Ibrahim, R Sihwail, KAZ Arrifin, A Abuthawabeh… - Symmetry, 2023 - mdpi.com
Hundreds of millions of people worldwide use computing devices and services, including
smartphones, laptops, and messaging apps. Visual cryptography (VC) is one of the most …
smartphones, laptops, and messaging apps. Visual cryptography (VC) is one of the most …
A lightweight privacy-preserving system for the security of remote sensing images on iot
The acquisition of massive remote sensing data makes it possible to deeply fuse remote
sensing and artificial intelligence (AI). The mobility and cost advantages of new sensing …
sensing and artificial intelligence (AI). The mobility and cost advantages of new sensing …
[HTML][HTML] A reversible and lossless secret image sharing scheme with authentication for color images
W Li, C Peng, W Tan, Y Xu, K Niu - … of King Saud University-Computer and …, 2023 - Elsevier
With the increasing concern for public privacy protection, Secret Image Sharing (SIS) has
garnered significant attention among researchers. The goal of SIS is to split a secret image …
garnered significant attention among researchers. The goal of SIS is to split a secret image …
Stbciot: Securing the transmission of biometric images in customer iot
The recent advancement of the Internet of Things (IoT) and information technology has led to
the rapid expansion of interconnectivity among a billion devices across various applications …
the rapid expansion of interconnectivity among a billion devices across various applications …