[PDF][PDF] Emerging and disruptive technologies, nuclear risk, and strategic stability

F Su, J Yuan - … -stability-chinese-literature-review …, 2022 - europeanleadershipnetwork.org
It can support military weapons by rapidly analysing imagesCyber security crisis management
in the field of nuclear weapons and … A comparative study of the views between the expert …

甘肃省“互联网+ 政务服务” 的商用密码安全保障研究

孙翊嘉 - 2020 - ir.lzu.edu.cn
… will affect people's daily life, affect the image of the government, … Therefore, how to protect
the information security of the … Based on the experience and comparative study, this paper …

[PDF][PDF] 在多级文字隐写术中使用图像的拟议算法

GMTK Aldabagh - 西南交通大学学报, 2020 - researchgate.net
… transmit various types of data such as audio, video, image and … cryptography includes various
aspects in data security like … of the algorithm in comparison with standard LSB algorithm. …

基于加密算法和动态模型的无线网络安全技术研究

雒慧霞 - 2015 - ir.lzu.edu.cn
… the security performance of the AES algorithm,encryption … and other aspects of the
study,Finally,a comparative analysisinformation security,finally,the model is analyzed and …

基于受控Dna 编码的图像加密算法

X Zhang, J Di - Available at SSRN 4605007 - papers.ssrn.com
… , this paper proposes an image encryption algorithm based on a … algorithms in a comparative
analysis. This paper uses the … journal of Information Security and Applications. 50: 102428. …

[HTML][HTML] NAYUTA: 一种基于分组密码的加密算法

董旭鹏, 周雪晴, 杨文忠, 孟繁一 - Computer Science and Application, 2023 - hanspub.org
ciphers, block ciphers play an important role in protecting information security; today’s
mainstream block cipher algorithms include DES, AES, SMS4 and other encryption algorithms. As …

[PDF][PDF] 使用网址地址的拟议阿拉伯文本和文本图像分类技术

SA Hussein, MR Kareem - 西南交通大学学报, 2019 - researchgate.net
… authors provided a comparative analysis of data yielded by a … algorithm to extract text from
text images, which reduced a lot … Design a new encryption algorithm that differs from ours to …

尺度不變特徵與半色調視訊之安全議題

許朝詠 - 2012 - airitilibrary.com
… In addition, our proposed security threat is applied to an image copy detection method …
method based on homomorphic encryption. In our method, homomorphic comparison is a key …

基于结构简单的超混沌系统的彩色图像加密研究

郑雅召 - 2020 - ir.lzu.edu.cn
… scheme has better performance in information entropy and resistance to differential attacks,
and comparing the results of related references. 3.A new color image encryption scheme is …

[HTML][HTML] 數位影像與文件保護機制之設計-以視覺式秘密分享和資訊隱藏為基礎

SF Tu - 2005 - ir.lib.ncu.edu.tw
… , called an encryption sequence, on the secret image into m … The second method of our
scheme utilizes a comparison and … gray level image,” The 14th Information Security Conference, …