Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A review on recognition-based graphical password techniques
This paper reviews the recognition-based graphical password system. Twenty-five
recognition-based graphical password systems are studied and analyzed with regards to …
recognition-based graphical password systems are studied and analyzed with regards to …
Graphical password: prevent shoulder-surfing attack using digraph substitution rules
In this paper, a new scheme that uses digraph substitution rules to conceal the mechanism
or activity required to derive password-images is proposed. In the proposed method, a user …
or activity required to derive password-images is proposed. In the proposed method, a user …
[PDF][PDF] A review study on unique way of information hiding: Steganography
M Zeeshan, S Ullah, S Anayat, RG Hussain… - International Journal on …, 2017 - academia.edu
Internet communication become the need of entire world, today internet is like a recourse of
power that is used to run human life. The users, as a layman, may not know that internet, a …
power that is used to run human life. The users, as a layman, may not know that internet, a …
Image steganography in securing sound file using arithmetic coding algorithm, triple data encryption standard (3DES) and modified least significant bit (MLSB)
The amount of data inserted in the form of audio samples that use 8 bits with LSB algorithm,
affect the value of PSNR which resulted in changes in image quality of the insertion (fidelity) …
affect the value of PSNR which resulted in changes in image quality of the insertion (fidelity) …
Preventing Shoulder‐Surfing Attack with the Concept of Concealing the Password Objects' Information
PF Ho, YHS Kam, MC Wee… - The Scientific World …, 2014 - Wiley Online Library
Traditionally, picture‐based password systems employ password objects (pictures/icons/
symbols) as input during an authentication session, thus making them vulnerable to …
symbols) as input during an authentication session, thus making them vulnerable to …
Performance analysis of AES-Blowfish hybrid algorithm for security of patient medical record data
R Siregar - Journal of Physics: Conference Series, 2018 - iopscience.iop.org
A file security is one method to protect data confidentiality, integrity and information security.
Cryptography is one of techniques used to secure and guarantee data confidentiality by …
Cryptography is one of techniques used to secure and guarantee data confidentiality by …
Enhancing Data Protection in Digital Communication: A Novel Method of Combining Steganography and Encryption
KH Abuhmaidan, MA Al-Share… - KSII Transactions on …, 2024 - koreascience.kr
In today's highly digitized landscape, securing digital communication is paramount due to
threats like hacking, unauthorized data access, and network policy violations. The response …
threats like hacking, unauthorized data access, and network policy violations. The response …
Implementasi Steganografi Text To Image Menggunakan Metode One Bit Least Significant Bit Berbasis Android
Informasi merupakan hal yang sangat penting dan berharga, dewasa ini informasi sering
dipertukarkan melalui internet. Kemajuan teknologi smartphone terutama smartphone …
dipertukarkan melalui internet. Kemajuan teknologi smartphone terutama smartphone …
Steganographic approach to enhancing secure data communication using contours and clustering
With the increasing developments in communication technologies, there is a need for
extremely robust information exchange, which is the core aim of steganography …
extremely robust information exchange, which is the core aim of steganography …
Steganography: A flexible embedded randomization technique
With the expansion of digital communication networks, a considerable number of
randomization techniques have been invented and implemented to enhance the different …
randomization techniques have been invented and implemented to enhance the different …