Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Computational image encryption techniques: a comprehensive review
Images contain very sensitive and confidential information. Because images play a
significant role in many applications such as military communication, remote‐sensing, and …
significant role in many applications such as military communication, remote‐sensing, and …
A comprehensive survey on encryption techniques for digital images
With the widespread adoption of smart devices and high-speed networks, investigators are
focusing on securing digital image applications, such as those on social media, in …
focusing on securing digital image applications, such as those on social media, in …
Lightweight cryptography system for IoT devices using DNA
Many lightweight encryption algorithms have been developed for tackling the limitations of
resources on the Internet of Things (IoT) devices. Such devices have limited processing …
resources on the Internet of Things (IoT) devices. Such devices have limited processing …
A new image encryption algorithm based on single S-box and dynamic encryption step
Chaotic-based S-box image encryption schemes promise to be a practical solution for
securing digital images. However, the high-dimensional continuous chaotic has increased …
securing digital images. However, the high-dimensional continuous chaotic has increased …
A visually secure image encryption scheme using newly designed 1D sinusoidal chaotic map and P-tensor product compressive sensing
The traditional image encryption method is to encrypt the plain image (PLI) into a noise-like
encrypted image (EI), which can hide the information of the PLI well. However, when the EI …
encrypted image (EI), which can hide the information of the PLI well. However, when the EI …
Deep learning-based encryption for secure transmission digital images: A survey
With the innovation of high-throughput big data storage technology and the construction of
digital information systems in media applications, images are the common and most popular …
digital information systems in media applications, images are the common and most popular …
Color image encryption algorithm based on a chaotic model using the modular discrete derivative and Langton's ant
In this work, a color image encryption and decryption algorithm for digital images is
presented. It is based on the modular discrete derivative (MDD), a novel technique to …
presented. It is based on the modular discrete derivative (MDD), a novel technique to …
[HTML][HTML] A dynamic DNA color image encryption method based on SHA-512
This paper presents a dynamic deoxyribonucleic acid (DNA) image encryption based on
Secure Hash Algorithm-512 (SHA-512), having the structure of two rounds of permutation …
Secure Hash Algorithm-512 (SHA-512), having the structure of two rounds of permutation …
A color image encryption scheme using customized map
The paper presents a new method for encrypting color images using a customized globally
coupled lattice (CGCL) map. The process involves generating an initial parameter for the …
coupled lattice (CGCL) map. The process involves generating an initial parameter for the …
A novel image encryption based on rossler map diffusion and particle swarm optimization generated highly non-linear substitution boxes
Symmetric encryption is appraised as one of the key ways in which end-to-end data transfer
security is guaranteed. To inject confusion in the substitution phase of the modern block …
security is guaranteed. To inject confusion in the substitution phase of the modern block …