Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
An RGB color image steganography scheme by binary lower triangular matrix
Steganography is an area where researchers focus on how to develop novel hiding
techniques that are aided by the mathematical or computational model. In order to conceal …
techniques that are aided by the mathematical or computational model. In order to conceal …
Constructing keyed strong S-Box with optimized nonlinearity using nondegenerate 2D hyper chaotic map
A Kadeer, Y Tuersun, H Liu - Physica Scripta, 2024 - iopscience.iop.org
In the realm of information security, the nonlinearity of an S-Box is a pivotal attribute for
ensuring its effectiveness. S-Boxes randomly generated with chaotic maps, however, often …
ensuring its effectiveness. S-Boxes randomly generated with chaotic maps, however, often …
[PDF][PDF] Construction of nonlinear component of block cipher using coset graph
Construction of nonlinear component of block cipher using coset graph Page 1 AIMS
Mathematics, 8(9): 21644–21667. DOI: 10.3934/math.20231104 Received: 24 February 2023 …
Mathematics, 8(9): 21644–21667. DOI: 10.3934/math.20231104 Received: 24 February 2023 …
AES S-box modification uses affine matrices exploration for increased S-box strength
The internet and technological advancements are rapidly growing in this era, potentially
giving rise to new challenges, particularly in data security. One algorithm developed to …
giving rise to new challenges, particularly in data security. One algorithm developed to …
An Improved Image Steganography Security and Capacity Using Ant Colony Algorithm Optimization.
ZKJ Jasim, S Kurnaz - Computers, Materials & Continua, 2024 - search.ebscohost.com
This advanced paper presents a new approach to improving image steganography using
the Ant Colony Optimization (ACO) algorithm. Image steganography, a technique of …
the Ant Colony Optimization (ACO) algorithm. Image steganography, a technique of …
Ceibaco: REST API and Single Page Application for the generation and evaluation of bijective S-boxes
I Martínez-Díaz - arxiv preprint arxiv:2305.17798, 2023 - arxiv.org
In this paper we present the first REST API for the generation and evaluation of bijective S-
boxes. We also present the first Single Page Application tool for researchers and students …
boxes. We also present the first Single Page Application tool for researchers and students …
[PDF][PDF] Web API for S-box evaluation
I Martínez-Díaz - researchgate.net
In this paper we present a Web API for the evaluation of bijective S-boxes. We describe the
API endpoints and also give algorithms in different programming languages for API …
API endpoints and also give algorithms in different programming languages for API …
[PDF][PDF] Image Hiding Using Logistic Map Chaotic Function
M Alirezanejad - Journal of Applied Dynamic Systems and Control, 2022 - journals.iau.ir
Steganography is the action of hiding a secret message within another cover message. The
secret message and the cover image can be text, image, voice even signal. In this article an …
secret message and the cover image can be text, image, voice even signal. In this article an …