Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A review on applications of chaotic maps in pseudo-random number generators and encryption
Because of the COVID-19 pandemic, most of the tasks have shifted to an online platform.
Sectors such as e-commerce, sensitive multi-media transfer, online banking have …
Sectors such as e-commerce, sensitive multi-media transfer, online banking have …
Multimedia security using encryption: A survey
Considering the current dependency on digital technology in modern society, the protection
of multimedia is highly important. Encryption is vital in modern digital communication …
of multimedia is highly important. Encryption is vital in modern digital communication …
A multilayered audio signal encryption approach for secure voice communication
In this paper, multilayer cryptosystems for encrypting audio communications are proposed.
These cryptosystems combine audio signals with other active concealing signals, such as …
These cryptosystems combine audio signals with other active concealing signals, such as …
An audio encryption algorithm based on a non-degenerate 2D integer domain hyper chaotic map over GF(2n)
Y Cao, H Liu - Multimedia Tools and Applications, 2024 - Springer
To ensure the security transmission of audio signals in instant messaging tools, a chaos-
based dual-channel one-time one-key audio encryption scheme was proposed. First, a non …
based dual-channel one-time one-key audio encryption scheme was proposed. First, a non …
Dynamic DNA cryptography-based image encryption scheme using multiple chaotic maps and SHA-256 hash function
In today's world, a substantial number of digital images are conserved and transmitted
through diverse online platforms on a daily basis. Preserving the confidentiality of images is …
through diverse online platforms on a daily basis. Preserving the confidentiality of images is …
Securing dual-channel audio communication with a 2-D infinite collapse and logistic map
To provide robust security measures for audio data during transmission, this article has
developed a novel dual-channel audio encryption scheme based on chaos theory …
developed a novel dual-channel audio encryption scheme based on chaos theory …
An enhanced logistic chaotic map based tweakable speech encryption algorithm
This work aims to improves the chaotic behavior of classical logistic chaotic system for voice
encryption. In this study, the classical chaotic system was enhanced. This enhanced map …
encryption. In this study, the classical chaotic system was enhanced. This enhanced map …
[HTML][HTML] Robust biometric identity authentication scheme using quantum voice encryption and quantum secure direct communications for cybersecurity
RI Abdelfatah - Journal of King Saud University-Computer and …, 2024 - Elsevier
A significant problem facing cybersecurity is that most client/server identity authentication
schemes depend on computational complexity which is recently challenged by the super …
schemes depend on computational complexity which is recently challenged by the super …
Chaos-based audio encryption algorithm using biometric image and SHA-256 hash algorithm
Today, Internet users who share personal and professional data are concerned about the
safety of the data. Encryption is one way to safeguard sensitive and private data on internet …
safety of the data. Encryption is one way to safeguard sensitive and private data on internet …
The SPN network for digital audio data based on elliptic curve over a finite field
The mathematical operation of the Elliptic Curve over the prime finite field is wildly used for
secure data communication as it provides high security while utilizing the same size as the …
secure data communication as it provides high security while utilizing the same size as the …