Showing 1 - 20 results of 76 for search '"encryption algorithm based"', query time: 0.08s Refine Results
  1. 1

    Experimental images&Table1-10&Figure1-15.docx by Feixian Liu (21987380)

    Published 2025
    “…<p dir="ltr">A Robust Color Image Encryption Algorithm Based on 2D-SQSM Hyperchaotic Map and Cyclic Shift Scrambling</p>…”
  2. 2

    Decrypted color plain. by Ye Tao (326899)

    Published 2025
    “…<div><p>Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. …”
  3. 3

    Keys space. by Ye Tao (326899)

    Published 2025
    “…<div><p>Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. …”
  4. 4

    Encryption and decryption time (unit: Seconds). by Ye Tao (326899)

    Published 2025
    “…<div><p>Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. …”
  5. 5

    Red plain horizontal correlation. by Ye Tao (326899)

    Published 2025
    “…<div><p>Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. …”
  6. 6

    Bifurcation diagram of LSS for <i>β</i> = 200. by Ye Tao (326899)

    Published 2025
    “…<div><p>Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. …”
  7. 7

    Blue plain. by Ye Tao (326899)

    Published 2025
    “…<div><p>Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. …”
  8. 8

    Information entropy. by Ye Tao (326899)

    Published 2025
    “…<div><p>Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. …”
  9. 9

    Green cipher diagonal correlation. by Ye Tao (326899)

    Published 2025
    “…<div><p>Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. …”
  10. 10

    Green cipher vertical correlation. by Ye Tao (326899)

    Published 2025
    “…<div><p>Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. …”
  11. 11

    NPCR and UACI (%). by Ye Tao (326899)

    Published 2025
    “…<div><p>Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. …”
  12. 12

    Green cipher histogram. by Ye Tao (326899)

    Published 2025
    “…<div><p>Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. …”
  13. 13

    Red cipher diagonal correlation. by Ye Tao (326899)

    Published 2025
    “…<div><p>Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. …”
  14. 14

    Red plain vertical correlation. by Ye Tao (326899)

    Published 2025
    “…<div><p>Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. …”
  15. 15

    Encrypted blue plain. by Ye Tao (326899)

    Published 2025
    “…<div><p>Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. …”
  16. 16

    Bifurcation diagram of TLS for <i>β</i> = 50. by Ye Tao (326899)

    Published 2025
    “…<div><p>Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. …”
  17. 17

    Information entropy comparison. by Ye Tao (326899)

    Published 2025
    “…<div><p>Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. …”
  18. 18

    Decrypted green plain. by Ye Tao (326899)

    Published 2025
    “…<div><p>Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. …”
  19. 19

    Color plain. by Ye Tao (326899)

    Published 2025
    “…<div><p>Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. …”
  20. 20

    Image decryption algorithm flow chart. by Ye Tao (326899)

    Published 2025
    “…<div><p>Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. …”