Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A review on applications of chaotic maps in pseudo-random number generators and encryption
Because of the COVID-19 pandemic, most of the tasks have shifted to an online platform.
Sectors such as e-commerce, sensitive multi-media transfer, online banking have …
Sectors such as e-commerce, sensitive multi-media transfer, online banking have …
Hybrid SVD-based image watermarking schemes: a review
Watermarking is an important technique for protecting sensitive e-multimedia data and
intellectual property. Watermarking techniques are used for many applications such as …
intellectual property. Watermarking techniques are used for many applications such as …
Enhancing logistic chaotic map for improved cryptographic security in random number generation
M Alawida - Journal of Information Security and Applications, 2024 - Elsevier
The use of chaotic maps for cryptography is advantageous due to their desirable
characteristics, including complexity, unpredictability, sensitivity to initial values and control …
characteristics, including complexity, unpredictability, sensitivity to initial values and control …
A new chaotic image watermarking scheme based on SVD and IWT
Image watermarking schemes based on singular value decomposition (SVD) have become
popular due to a good trade-off between robustness and imperceptibility. However, the false …
popular due to a good trade-off between robustness and imperceptibility. However, the false …
Coupling chaotic system based on unit transform and its applications in image encryption
G Hu, B Li - Signal Processing, 2021 - Elsevier
Chaotic maps are very important for establishing chaos-based image encryption systems.
This paper introduces a coupling chaotic system based on a certain unit transform, which …
This paper introduces a coupling chaotic system based on a certain unit transform, which …
A chaos-based novel approach to video encryption using dynamic S-box
D Dhingra, M Dua - Multimedia Tools and Applications, 2024 - Springer
Video Encryption is the process of converting the video into an unrecognizable form to
protect it from unauthorized access. This paper proposes a novel video encryption method …
protect it from unauthorized access. This paper proposes a novel video encryption method …
Bijective S-boxes method using improved chaotic map-based heuristic search and algebraic group structures
This paper presents a hybrid method for the construction of cryptographically strong bijective
substitution-boxes by utilizing the merits of chaotic map and algebraic groups. The hybrid …
substitution-boxes by utilizing the merits of chaotic map and algebraic groups. The hybrid …
Chaos based image encryption scheme to secure sensitive multimedia content in cloud storage
Cloud computing offers a variety of on-demand services to users and has gained significant
prominence in the contemporary era. The security of information stored in cloud data centers …
prominence in the contemporary era. The security of information stored in cloud data centers …
An improved digital logistic map and its application in image encryption
H **ang, L Liu - Multimedia tools and applications, 2020 - Springer
Chaos maps are widely used in image encryption systems due to their intrinsic advantages
such as extreme sensitivity to initial values., ergodicity and pseudo-randomness. 1D Logistic …
such as extreme sensitivity to initial values., ergodicity and pseudo-randomness. 1D Logistic …
An image encryption algorithm using cascade chaotic map and S-box
J Zheng, T Bao - Entropy, 2022 - mdpi.com
This paper proposed an image algorithm based on a cascaded chaotic system to improve
the performance of the encryption algorithm. Firstly, this paper proposed an improved …
the performance of the encryption algorithm. Firstly, this paper proposed an improved …