Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A comprehensive review on image encryption techniques
Image encryption techniques play a significant role in multimedia applications to secure and
authenticate digital images. This paper presents a comprehensive study of various image …
authenticate digital images. This paper presents a comprehensive study of various image …
An overview of encryption algorithms in color images
Nowadays, security in data transfer is of special importance. Images are of the most
attractive kinds of data in the encryption domain. Color images are more attractive than the …
attractive kinds of data in the encryption domain. Color images are more attractive than the …
2D Logistic-Sine-coupling map for image encryption
Image encryption is a straightforward strategy to protect digital images by transforming
images into unrecognized ones. The chaos theory is a widely used technology for image …
images into unrecognized ones. The chaos theory is a widely used technology for image …
A new hybrid digital chaotic system with applications in image encryption
Image encryption provides confidentiality to images by transforming them into
unrecognizable forms that resemble white noise. Digital chaos is one of the areas used to …
unrecognizable forms that resemble white noise. Digital chaos is one of the areas used to …
Secure image encryption algorithm using chaos-based block permutation and weighted bit planes chain diffusion
Aiming at the problem of insufficient security of image encryption technology, a secure
image encryption algorithm using chaos-based block permutation and weighted bit planes …
image encryption algorithm using chaos-based block permutation and weighted bit planes …
A novel image encryption scheme based on substitution-permutation network and chaos
In this paper, a novel image encryption approach based on permutation-substitution (SP)
network and chaotic systems is proposed. It consists of four cryptographic phases: diffusion …
network and chaotic systems is proposed. It consists of four cryptographic phases: diffusion …
Color image DNA encryption using NCA map-based CML and one-time keys
In this paper, we introduce a novel color image encryption algorithm based on DNA
sequence operations, one-time keys and the spatiotemporal chaos. Firstly, the key streams …
sequence operations, one-time keys and the spatiotemporal chaos. Firstly, the key streams …
Pseudorandom number generator based on novel 2D Hénon-Sine hyperchaotic map with microcontroller implementation
Recently, chaotic maps have been considered to design pseudorandom number generator
(PRNG). However, some chaotic maps present security disadvantages, such as low …
(PRNG). However, some chaotic maps present security disadvantages, such as low …
Real-time RGB image encryption for IoT applications using enhanced sequences from chaotic maps
Four chaotic maps are used herein as case study to design an embedded cryptosystem
based on a pseudo-random number generator (PRNG). The randomness of the sequences …
based on a pseudo-random number generator (PRNG). The randomness of the sequences …
An image encryption method based on elliptic curve elgamal encryption and chaotic systems
Due to the potential security problem about key management and distribution for the
symmetric image encryption schemes, a novel asymmetric image encryption method is …
symmetric image encryption schemes, a novel asymmetric image encryption method is …