咨询与建议

限定检索结果

文献类型

  • 20 篇 期刊文献
  • 11 篇 会议

馆藏范围

  • 31 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 28 篇 工学
    • 12 篇 计算机科学与技术...
    • 7 篇 电气工程
    • 5 篇 光学工程
    • 3 篇 信息与通信工程
    • 3 篇 控制科学与工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 仪器科学与技术
    • 1 篇 电子科学与技术(可...
    • 1 篇 软件工程
    • 1 篇 网络空间安全
  • 12 篇 理学
    • 9 篇 物理学
    • 2 篇 数学
    • 1 篇 系统科学
  • 3 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 特种医学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...

主题

  • 31 篇 image encryption...
  • 5 篇 cryptography
  • 2 篇 matlab-optisyste...
  • 2 篇 communication se...
  • 2 篇 fixed-time synch...
  • 2 篇 block cipher
  • 2 篇 security
  • 2 篇 stochastic stand...
  • 2 篇 image clustering
  • 2 篇 optical fiber
  • 1 篇 internet of thin...
  • 1 篇 leakage time-var...
  • 1 篇 markov jump neur...
  • 1 篇 hill cipher
  • 1 篇 retinopathy
  • 1 篇 corner-modified ...
  • 1 篇 compressed sensi...
  • 1 篇 cipher text
  • 1 篇 bidirectional as...
  • 1 篇 complex-valued m...

机构

  • 1 篇 anna univ rmkcol...
  • 1 篇 ucep dept ece pa...
  • 1 篇 univ jinan sch i...
  • 1 篇 computer science...
  • 1 篇 east china norma...
  • 1 篇 ifet coll engn d...
  • 1 篇 hosp especialida...
  • 1 篇 jntua dept ece a...
  • 1 篇 northeastern uni...
  • 1 篇 jamal mohamed co...
  • 1 篇 shanxi univ coll...
  • 1 篇 caltech andrew &...
  • 1 篇 univ guanajuato ...
  • 1 篇 univ panamerican...
  • 1 篇 al farahidi univ...
  • 1 篇 riso natl lab op...
  • 1 篇 univ sci & techn...
  • 1 篇 univ technol bag...
  • 1 篇 al iraqia univ c...
  • 1 篇 king khalid univ...

作者

  • 2 篇 abass a. k.
  • 2 篇 lang jun
  • 2 篇 rashid fareed f.
  • 1 篇 su zhen
  • 1 篇 brieva jorge
  • 1 篇 gabriel avina-ce...
  • 1 篇 li ji
  • 1 篇 tahsina hashem
  • 1 篇 liu st
  • 1 篇 md. imdadul isla...
  • 1 篇 hussain rashida
  • 1 篇 muhammad taseer
  • 1 篇 kumar manish
  • 1 篇 venkatalakshami ...
  • 1 篇 sekar jai ganesh
  • 1 篇 ali asghar
  • 1 篇 liu yang
  • 1 篇 javed sara
  • 1 篇 chen chao-shen
  • 1 篇 yousif intisar a...

语言

  • 26 篇 英文
  • 5 篇 其他
检索条件"主题词=Image Encryption and Decryption"
31 条 记 录,以下是11-20 订阅
排序:
Enhancing healthcare security in the digital era: Safeguarding medical images with lightweight cryptographic techniques in IoT healthcare applications
收藏 引用
BIOMEDICAL SIGNAL PROCESSING AND CONTROL 2024年 88卷
作者: Nadhan, Archana S. Jacob, Jeena GITAM Univ GITAM Sch Technol Dept CSE NH 207 Bengaluru 561203 Karnataka India
The Internet of Things has allowed for the connectivity of medical imaging devices to the healthcare sector's data backbone. This development, made possible by the IoT, will speed up the diagnosis and treatment ph... 详细信息
来源: 评论
Secure Medical image encryption Approach Based on Langton's Ant and Jigsaw Transform  17
Secure Medical Image Encryption Approach Based on Langton's ...
收藏 引用
17th International Symposium on Medical Information Processing and Analysis
作者: Moya-Albor, Ernesto Romero-Arellano, Andres Brieva, Jorge Cruz-Aceves, Ivan Gabriel Avina-Cervantes, Juan Alicia Hernandez-Gonzalez, Martha Miguel Lopez-Montero, Luis Univ Panamericana Fac Ingn Augusto Rodin 498 Ciudad De Mexico 03920 Mexico CONACYT Ctr Invest Matemat CIMAT AC Jalisco S-N Guanajuato 36000 GTO Mexico Univ Guanajuato Engn Div Dept Elect Engn Campus Irapuato Salamanca Salamanca 36885 Mexico Hosp Especialidades 1 IMSS Ctr Med Nacl Bajio Unidad Med Alta Especialidad UMAE Leon 37320 Gto Mexico
In this work, we propose a medical image encryption method. It is based on the Jigsaw transform, cyclic permutations, and a deterministic noise approach to hide visual information in the images. On the other hand, Lan... 详细信息
来源: 评论
An efficient chaotic system based hybrid radiation heat transfer sunflower optimization algorithm for securing digital image transmission
收藏 引用
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE 2022年 第10期34卷
作者: Sekar, Jai Ganesh Ezhumalai, Periyathambi Chokkalingam, Arun Anna Univ RMKColl Engn & Technol Dept Elect & Commun Engn Chennai Tamil Nadu India Anna Univ RMD Engn Coll Dept Comp Sci & Engn Chennai Tamil Nadu India
At the pixel level, several chaos-based image encryption and decryption models have been developed throughout the years. However, due to long-haul, privacy, and security considerations, it has a number of drawbacks, i... 详细信息
来源: 评论
Fixed/Predefined-time synchronization of memristor-based complex-valued BAM neural networks for image protection
收藏 引用
FRONTIERS IN NEUROROBOTICS 2022年 16卷 1000426页
作者: Liu, Aidi Zhao, Hui Wang, Qingjie Niu, Sijie Gao, Xizhan Su, Zhen Li, Lixiang Univ Jinan Sch Informat Sci & Engn Shandong Prov Key Lab Network Based Intelligent Co Jinan Peoples R China Chongqing Univ Posts & Telecommun Coll Comp Sci & Technol Chongqing Peoples R China Beijing Univ Posts & Telecommun Informat Secur Ctr State Key Lab Networking & Switching Technol Beijing Peoples R China
This paper investigates the fixed-time synchronization and the predefined-time synchronization of memristive complex-valued bidirectional associative memory neural networks (MCVBAMNNs) with leakage time-varying delay.... 详细信息
来源: 评论
A new algorithm for the colored image encryption via the modified Chua's circuit
收藏 引用
ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH 2020年 第3期23卷 595-604页
作者: Arpaci, Batuhan Kurt, Erol Celik, Kayhan Gazi Univ Informat Inst Informat Syst Dept Ankara Turkey Gazi Univ Technol Fac Dept Elect & Elect Engn TR-06500 Ankara Turkey
A genuine encryption/decryption algorithm has been developed by using a new chaotic circuit, namely modified Chua's circuit (MCC). The importance of MCC is that it exhibits hyper-chaotic behaviour for a large para... 详细信息
来源: 评论
An Efficient Medical image encryption Using Magic Square and PSO  1
An Efficient Medical Image Encryption Using Magic Square and...
收藏 引用
International Conference on Smart Technologies and Systems for Next Generation Computing (ICSTSN)
作者: Senthilnayaki, B. Venkatalakshami, K. Dharanyadevi, P. Nivetha, G. Devi, A. Anna Univ Coll Engn Dept Informat Sci & Technol Chennai Tamil Nadu India UCET Dept ECE Tindivanam India Puducherry Technol Univ Dept CSE Pondicherry India UCEP Dept ECE Pantruti India IFET Coll Engn Dept ECE Villupuram India
encryption is essential for protecting sensitive data, especially images, against unauthorized access and exploitation. The goal of this work is to develop a more secure image encryption technique for image-based comm... 详细信息
来源: 评论
Enhancement of an encryption System Performance using MPI  13
Enhancement of an Encryption System Performance using MPI
收藏 引用
13th International Conference on Communications (COMM)
作者: Amar, Islam Abutaha, Mohammed Palestine Polytech Univ PPU Coll Informat Technol & Comp Engn Hebron Palestine
Nowadays with a tremendous speed and continuous development, the world's connection to the Internet has increased to a point that it has become part of their unsteady *** as technology evolves, encryption has beco... 详细信息
来源: 评论
Binary Galois field extensions dependent multimedia data security scheme
收藏 引用
MICROPROCESSORS AND MICROSYSTEMS 2020年 77卷 103181-103181页
作者: Shah, Dawood Shah, Tariq Quaid I Azam Univ Dept Math Islamabad Pakistan
Finite fields are widely used in modern cryptographic architecture. The prominent finite field based symmetric and asymmetric cryptosystems are (ECC) elliptic curve cryptography, RSA, (AES) advanced encryption standar... 详细信息
来源: 评论
Compressed 3D image Information and Communication Security
收藏 引用
ADVANCED QUANTUM TECHNOLOGIES 2018年 第2期1卷 1800034-1-1800034-8页
作者: Yang, Chengshuai Ding, Yuyang Liang, Jinyang Cao, Fengyan Qi, Dalong Jia, Tianqing Sun, Zhenrong Zhang, Shian Chen, Wei Yin, Zhenqiang Wang, Shuang Han, Zhengfu Guo, Guangcan Wang, Lihong, V East China Normal Univ State Key Lab Precis Spect Shanghai 200062 Peoples R China Univ Sci & Technol China CAS Key Lab Quantum Informat Hefei 230026 Peoples R China Univ Sci & Technol China Synerget Innovat Ctr Quantum Informat & Quantum P Hefei 230026 Peoples R China Univ Quebec Ctr Energie Mat Telecommun Inst Natl Rech Sci Quebec City PQ J3X 1S2 Canada Shanxi Univ Collaborat Innovat Ctr Extreme Opt Taiyuan 030006 Peoples R China CALTECH Andrew & Peggy Cherng Dept Med Engn Dept Elect Engn Div Engn & Appl Sci Pasadena CA 91125 USA
Ensuring information and communication security in military messages, government instructions, scientific experiments, as well as in personal data processing, is critical. In this study, a new hybrid classical-quantum... 详细信息
来源: 评论
Analysis and Improvement of image encryption Algorithm Based Translation Chaotic System
Analysis and Improvement of Image Encryption Algorithm Based...
收藏 引用
2018 2nd International Conference on Applied Mathematics, Modeling and Simulation (AMMS 2018)
作者: Yue LIU College of Electrical and Electronic Engineering Changchun University of Technology
In this paper,we propose and improvement the translation chaotic system is applied to the field of image encryption and decryption,which is analyzed for Lena *** the cryptographic system studied,firstly,the row and co... 详细信息
来源: 评论