过去一年中添加的文章,按日期排序

Check for A Robust Image Cipher System Based on Cramer-Shoup Algorithm and 5-D Hyper Chaotic System Zainab Khalid Ibrahim) and Ekhlas Abbas Albahrani

ZK Ibrahim - … in Information and Communications Technology … - books.google.com
7 天前 - algorithm is used to substitute the input image after it has … encrypted image in
comparison with the original image … using a variety of methods, and results show that it has a …

Triple DES with Radial Basis Function Networks for Securing in Process of CCTV Footage Images

P Deshpande, AG Kothari - Computing and Informatics, 2024 - cai.sk
9 天前 - … In this study, we look at the creation of a CCTV encryption method that … input data
is spread out and create a measure of anomaly. The comparative analysis of various methods

Deep Learning and Chaos: A combined Approach To Image Encryption and Decryption

BV Nair, SS Muni, A Durdu - arXiv preprint arXiv:2406.16792, 2024 - arxiv.org
10 天前 - comparative analyses illustrate that our encryption scheme possesses excellent
visual security… has been shown that the rise of robust algorithms for data security is of prime …

Acousto-optic cryptosystem based on dynamic DNA encoding and hyperchaotic system in gyrator domains

G Sun, W Song, M Tian, Z Liu, H Chen - 2024 - researchsquare.com
14 天前 - comparative analysis, the Gyrator transform, demonstrating superior performance,
is selected to further encrypt remote sensing image data, … color information security system …

Join security and block watermarking-based evolutionary algorithm and Racah moments for medical imaging

C Chekira, M Marzouq, H El Fadili, Z Lakhliai… - … Signal Processing and …, 2024 - Elsevier
14 天前 - … A comparative analysis with reliable and recent methods in medical image watermarking
… In order to strengthen the data security of our algorithm, we propose a combination of …

Exploiting 2D-SDMCHM and matching embedding driven by flag-shaped hexagon prediction for visually meaningful medical image cryptosystem

X Chai, G Shang, B Wang, Z Gan, W Zhang - Chaos, Solitons & Fractals, 2024 - Elsevier
16 天前 - … The innovation of this study is primarily reflected in three … Comparative analysis
showcases its superior chaos … OMA application further elevates data security and compression …

Comparative Study of Spatial and Frequency DomainImage Steganography Techniques on Grayscale Images

P Padmaja, T Rajeshwari - Disruptive technologies in Computing and … - taylorfrancis.com
21 天前 - Cryptography is a leading technique to encrypt the … Abstract: Data Security is a major
concern in digital … analysis and comparison of spatial domain technique, transform domain …

[HTML][HTML] Color Image Encryption Based on a Novel Fourth-Direction Hyperchaotic System

Z Lei, J Yang, H Qiu, X Zhang, J Liu - Electronics, 2024 - mdpi.com
27 天前 - comparative analysis of correlation values obtained from the proposed encryption
scheme in contrast to other encryption … in image encryption to guarantee data security, and it

Visual double image encryption scheme based on multilayer complex networks and wavelet transform

S Wang, L Hong, J Jiang - Nonlinear Dynamics, 2024 - Springer
30 天前 - … , the secret image is concealed within the host image and … comparative analyses
of various algorithms, the visually double encryption scheme exhibits superior encryption

Comparative Study of Spatial and Frequency DomainImage Steganography Techniques on Grayscale Images 51

T Pydimarri Padmaja - … Conference on Disruptive technologies in …, 2024 - books.google.com
30 天前 - … Abstract: Data Security is a major concern in digital … analysis and comparison of
spatial domain technique, transform domain … Cryptography is a leading technique to encrypt the …