Skip to content
VuFind
  • Login
    • English
    • اللغة العربية
Advanced
  • Algorithm flowchart.
  • Cite this
  • Text this
  • Email this
  • Print
  • Export Record
    • Export to RefWorks
    • Export to EndNoteWeb
    • Export to EndNote
  • Save to List
  • Permanent link
Algorithm flowchart.

Algorithm flowchart.

<p>(a) Flowchart of the encryption algorithm. (b) Flowchart of the decryption algorithm.</p>

Saved in:
Bibliographic Details
Main Author: Mingyi Huo (21743594) (author)
Other Authors: Yanpei Zheng (21743597) (author), Jun Huang (127297) (author)
Published: 2025
Subjects:
Pharmacology
Space Science
Biological Sciences not elsewhere classified
Information Systems not elsewhere classified
various cryptographic attacks
simulation results confirm
row shifting steps
round key addition
random operation scheme
personal privacy protection
intricate nonlinear dynamics
experimental results show
dimensional hyperchaotic system
advanced encryption standard
256256 grayscale image
0288 %, respectively
image encryption due
div >< p
security analysis demonstrates
box generation scheme
aes encryption process
0031 %, 0
efficiency </ p
encryption rounds
image data
0046 %,
urgent necessity
traditional fixed
traditional aes
simplified based
robust randomness
preferred solution
performs excellently
paper presents
network security
national security
military strategy
inherent complexity
increased security
fixed sequences
directly applied
digital era
developing efficient
data communication
critical carriers
baci values
aes ),
achieving npcr
Tags: Add Tag
No Tags, Be the first to tag this record!
  • Holdings
  • Description
  • Comments
  • Similar Items
  • Staff View

Similar Items

  • Comparison result of the encryption efficiency required by different encryption algorithms for the Female image at varying sizes.
    by: Mingyi Huo (21743594)
    Published: (2025)
  • Comparison of NPCR, UACI, BACI values of various algorithms for Female image.
    by: Mingyi Huo (21743594)
    Published: (2025)
  • The NPCR, UACI, and BACI values of various images.
    by: Mingyi Huo (21743594)
    Published: (2025)
  • Comparison of correlation coefficient values with existing schemes for Female image.
    by: Mingyi Huo (21743594)
    Published: (2025)
  • Correlation coefficient values between adjacent pixels before and after encryption.
    by: Mingyi Huo (21743594)
    Published: (2025)

Find More

  • Browse the Catalog
  • Browse Alphabetically
  • Explore Channels
  • Course Reserves
  • New Items
Cannot write session to /tmp/vufind_sessions/sess_tdf65rltk1eb9fmlg0hsm96n6e