咨询与建议

限定检索结果

文献类型

  • 20 篇 期刊文献
  • 11 篇 会议

馆藏范围

  • 31 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 28 篇 工学
    • 12 篇 计算机科学与技术...
    • 7 篇 电气工程
    • 5 篇 光学工程
    • 3 篇 信息与通信工程
    • 3 篇 控制科学与工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 仪器科学与技术
    • 1 篇 电子科学与技术(可...
    • 1 篇 软件工程
    • 1 篇 网络空间安全
  • 12 篇 理学
    • 9 篇 物理学
    • 2 篇 数学
    • 1 篇 系统科学
  • 3 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 特种医学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...

主题

  • 31 篇 image encryption...
  • 5 篇 cryptography
  • 2 篇 matlab-optisyste...
  • 2 篇 communication se...
  • 2 篇 fixed-time synch...
  • 2 篇 block cipher
  • 2 篇 security
  • 2 篇 stochastic stand...
  • 2 篇 image clustering
  • 2 篇 optical fiber
  • 1 篇 internet of thin...
  • 1 篇 leakage time-var...
  • 1 篇 markov jump neur...
  • 1 篇 hill cipher
  • 1 篇 retinopathy
  • 1 篇 corner-modified ...
  • 1 篇 compressed sensi...
  • 1 篇 cipher text
  • 1 篇 bidirectional as...
  • 1 篇 complex-valued m...

机构

  • 1 篇 anna univ rmkcol...
  • 1 篇 ucep dept ece pa...
  • 1 篇 univ jinan sch i...
  • 1 篇 computer science...
  • 1 篇 east china norma...
  • 1 篇 ifet coll engn d...
  • 1 篇 hosp especialida...
  • 1 篇 jntua dept ece a...
  • 1 篇 northeastern uni...
  • 1 篇 jamal mohamed co...
  • 1 篇 shanxi univ coll...
  • 1 篇 caltech andrew &...
  • 1 篇 univ guanajuato ...
  • 1 篇 univ panamerican...
  • 1 篇 al farahidi univ...
  • 1 篇 riso natl lab op...
  • 1 篇 univ sci & techn...
  • 1 篇 univ technol bag...
  • 1 篇 al iraqia univ c...
  • 1 篇 king khalid univ...

作者

  • 2 篇 abass a. k.
  • 2 篇 lang jun
  • 2 篇 rashid fareed f.
  • 1 篇 su zhen
  • 1 篇 brieva jorge
  • 1 篇 gabriel avina-ce...
  • 1 篇 li ji
  • 1 篇 tahsina hashem
  • 1 篇 liu st
  • 1 篇 md. imdadul isla...
  • 1 篇 hussain rashida
  • 1 篇 muhammad taseer
  • 1 篇 kumar manish
  • 1 篇 venkatalakshami ...
  • 1 篇 sekar jai ganesh
  • 1 篇 ali asghar
  • 1 篇 liu yang
  • 1 篇 javed sara
  • 1 篇 chen chao-shen
  • 1 篇 yousif intisar a...

语言

  • 26 篇 英文
  • 5 篇 其他
检索条件"主题词=Image Encryption and Decryption"
31 条 记 录,以下是1-10 订阅
排序:
Dual Event-Triggered Synchronization of Two-Time-Scale Jumping Neural Networks and Its Application in image encryption and decryption
收藏 引用
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING 2025年 第2期12卷 943-954页
作者: Li, Feng Wang, Ya-Nan Shen, Hao Anhui Univ Technol Anhui Prov Key Lab Power Elect & Mot Control Maanshan 243032 Peoples R China Anhui Univ Technol Sch Elect & Informat Engn Maanshan 243032 Peoples R China
Synchronization of neural networks has found widespread applications in practice. The existing results about the event-triggered synchronization of two-time-scale neural networks/systems mainly design a common event-t... 详细信息
来源: 评论
Numerical algorithms for corner-modified symmetric Toeplitz linear system with applications to image encryption and decryption
收藏 引用
JOURNAL OF APPLIED MATHEMATICS AND COMPUTING 2023年 第2期69卷 1967-1987页
作者: Zhang, Xing Zheng, Yanpeng Jiang, Zhaolin Byun, Heejung Linyi Univ Sch Informat Sci & Technol Linyi 276000 Shandong Peoples R China Univ Suwon Coll Informat Technol Hwaseong Si 445743 South Korea Linyi Univ Sch Automat & Elect Engn Linyi 276000 Shandong Peoples R China Linyi Univ Sch Math & Stat Linyi 276000 Shandong Peoples R China
The corner-modified symmetric Toeplitz matrix can be considered as a symmetric Toplitz matrix plus two rank-one matrices. Based on the decomposition of Toeplitz inversion and order-reduction algorithm, two new algorit... 详细信息
来源: 评论
Fixed-time Synchronization of Complex-valued Memristive BAM Neural Network and Applications in image encryption and decryption
收藏 引用
INTERNATIONAL JOURNAL OF CONTROL AUTOMATION AND SYSTEMS 2020年 第2期18卷 462-476页
作者: Guo, Yongzhen Luo, Yang Wang, Weiping Luo, Xiong Ge, Chao Kurths, Juergen Yuan, Manman Gao, Yang Beijing Inst Technol Beijing Peoples R China Software Testing Ctr Beijing Peoples R China USTB Sch Automat & Elect Engn Beijing 100083 Peoples R China USTB Sch Comp & Commun Engn Beijing 100083 Peoples R China Beijing Key Lab Knowledge Engn Mat Sci Beijing Peoples R China Humboldt Univ Inst Phys D-10099 Berlin Germany North China Univ Sci & Technol Inst Informat Engn Tangshan 063210 Peoples R China Humboldt Univ Inst Phys D-10099 Berlin Germany Potsdam Inst Climate Impact Res D-14473 Potsdam Germany China Informat Technol Secur Evaluat Ctr Beijing Peoples R China
This paper focuses on the dynamical characteristics of complex-valued memristor-based BAM neural network (CVMBAMNN) with leakage time-varying delay. With two different controllers, we have obtained fixedtime and finit... 详细信息
来源: 评论
image encryption and decryption Based on Chaotic Algorithm
收藏 引用
Journal of Applied Mathematics and Physics 2020年 第9期8卷 1814-1825页
作者: Yue Hu Ruyue Tian School of Mathematics and Physics China University of Geosciences Wuhan China
This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by inform... 详细信息
来源: 评论
Fpga Implementation Of image encryption and decryption Using AES 128-Bit
Fpga Implementation Of Image Encryption And Decryption Using...
收藏 引用
International Conference on Communication and Electronics Systems (ICCES)
作者: Priyanka, M. P. Prasad, E. Lakshmi Reddy, A. R. MITS Dept ECE Madanapalle India JNTUA Dept ECE Anantapur Andhra Pradesh India MITS Dept ECE ECE Madanapalle India
AES is one of the standard algorithm and widely used to encrypt and decrypt the data. In this paper, image encryption and decryption algorithm implemented by using AES 128-bit core. Here, image information is converte... 详细信息
来源: 评论
image encryption and decryption in Public Key Cryptography based on MR
Image Encryption and Decryption in Public Key Cryptography b...
收藏 引用
International Conference on Computing and Communications Technologies ((ICCCT)
作者: Amalarethinam, D. I. George Geetha, J. Sai Jamal Mohamed Coll Tiruchirappalli India Nehru Mem Coll Dept Comp Sci Puthanampatti Trichy India
In the past decade, image encryption is given much attention in research of information security and a lot of image encryption algorithms have been introduced. Due to some intrinsic features of images like bulk data c... 详细信息
来源: 评论
Synchronization of fractional-order quaternion-valued neural networks with image encryption via event-triggered impulsive control
收藏 引用
KNOWLEDGE-BASED SYSTEMS 2024年 296卷
作者: Zhang, Yanlin Yang, Liqiao Kou, Kit Ian Liu, Yang Univ Macau Fac Sci & Technol Dept Math Taipa 999078 Macao Peoples R China Southwestern Univ Finance & Econ Sch Comp & Artificial Intelligence Chengdu 611130 Peoples R China Zhejiang Normal Univ Coll Math & Comp Sci Jinhua 321004 Zhejiang Peoples R China
The finite-time synchronization and impulsive synchronization of fractional-order quaternion-valued neural networks (FOQVNNs) with delay are investigated in this research. To begin, instead of employing a decompositio... 详细信息
来源: 评论
Design and simulation of secure fiber optic communication system utilizing hill cipher algorithm
收藏 引用
JOURNAL OF OPTICS-INDIA 2024年 第2期53卷 1499-1507页
作者: Mohammed, Senaa H. Abass, A. K. Ali, M. H. Rashid, Fareed F. Al Iraqia Univ Coll Engn Comp Engn Dept Baghdad Iraq Univ Technol Baghdad Laser & Optoelect Dept Laser Engn Branch Baghdad Iraq Al Iraqia Univ Coll Engn Network Engn Dept Baghdad Iraq Al Farahidi Univ Med Tech Coll Med Instruments Tech Engn Dept Baghdad 10021 Iraq
The security is crucial in modern communications systems for preserving the transferred data. In this work, a secure fiber optic communication system utilizing Hill cipher algorithm is demonstrated and investigated vi... 详细信息
来源: 评论
Secure information transmission using the fractional coupled Schrödinger model: a dynamical perspective
收藏 引用
OPTICAL AND QUANTUM ELECTRONICS 2023年 第14期55卷 1-28页
作者: Ali, Asghar Javed, Sara Hussain, Rashida Muhammad, Taseer Mirpur Univ Sci & Technol MUST Dept Math Mirpur 10250 AJK Pakistan King Khalid Univ Coll Sci Dept Math Abha 61413 Saudi Arabia
In this work, the fractional coupled nonlinear Schrodinger model (FCNLSM) in optical fibre can exhibit chaotic dynamics with potential applications in cryptography and applied mathematics. This study investigates the ... 详细信息
来源: 评论
Design and performance analysis of secure optical communication system by implementing blowfish cipher algorithm
收藏 引用
RESULTS IN OPTICS 2024年 16卷
作者: Hussien, Reem A. Radhi, Safa Salam Rashid, Fareed F. Abdulla, Essam N. Abass, A. K. Univ Technol Iraq Laser & Optoelect Dept Laser Engn Branch Baghdad Iraq Al Farahidi Univ Iraq Med Tech Coll Med Instruments Tech Engn Dept Baghdad 10021 Iraq
With the increasing demand for image transmission in various fields including medical, military and multimedia, the security of information contained on these images has become a standing problem.. This work provides ... 详细信息
来源: 评论