Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A detailed review based on secure data transmission using cryptography and steganography
F Varghese, P Sasikala - Wireless Personal Communications, 2023 - Springer
During the last few decades, digital communication has played a vital role in various sectors
such as healthcare departments, banking, information technology companies, industries …
such as healthcare departments, banking, information technology companies, industries …
EFR-CSTP: Encryption for face recognition based on the chaos and semi-tensor product theory
Face recognition is a relatively common method humans use to confirm their identity.
Protecting the safe transmission of face images has become a hot issue. This paper …
Protecting the safe transmission of face images has become a hot issue. This paper …
[HTML][HTML] Cosine-transform-based chaotic system for image encryption
Chaos is known as a natural candidate for cryptography applications owing to its properties
such as unpredictability and initial state sensitivity. However, certain chaos-based …
such as unpredictability and initial state sensitivity. However, certain chaos-based …
A color image cryptosystem based on dynamic DNA encryption and chaos
This paper presents a color image cryptosystem based on dynamic DNA encryption and
chaos. The color plain image is firstly decomposed into red, green and blue components …
chaos. The color plain image is firstly decomposed into red, green and blue components …
Hidden bursting firings and bifurcation mechanisms in memristive neuron model with threshold electromagnetic induction
Memristors can be employed to mimic biological neural synapses or to describe
electromagnetic induction effects. To exhibit the threshold effect of electromagnetic …
electromagnetic induction effects. To exhibit the threshold effect of electromagnetic …
Two-dimensional memristive hyperchaotic maps and application in secure communication
Continuous memristor has been widely used in chaotic oscillating circuits and neuromorphic
computing systems. However, discrete memristor and its coupling discrete map have not …
computing systems. However, discrete memristor and its coupling discrete map have not …
An image encryption scheme based on a new hybrid chaotic map and optimized substitution box
This paper proposes a new hybrid chaotic map and a different way of using optimization
technique to improve the performance of encryption algorithms. Compared to other chaotic …
technique to improve the performance of encryption algorithms. Compared to other chaotic …
Color image compression and encryption scheme based on compressive sensing and double random encryption strategy
Based on compressive sensing and double random encryption strategy, a novel color image
compression and encryption scheme is proposed in this paper. The architecture of …
compression and encryption scheme is proposed in this paper. The architecture of …
AEA-NCS: An audio encryption algorithm based on a nested chaotic system
Audio information strongly correlates in adjacent times, and the data type of the audio is
float, so the traditional encryption algorithms for the image are unsuitable for audio …
float, so the traditional encryption algorithms for the image are unsuitable for audio …
Image encryption algorithm based on 2D hyperchaotic map
X Gao - Optics & Laser Technology, 2021 - Elsevier
It is well known that chaos is unpredictability and sensitivity to initial values and parameters.
It is a best choice for cryptography application. However, the existing chaotic cryptography …
It is a best choice for cryptography application. However, the existing chaotic cryptography …