Search alternatives:
algorithm python » algorithm within (Expand Search), algorithms within (Expand Search), algorithm both (Expand Search)
algorithm pre » algorithm pca (Expand Search), algorithm where (Expand Search), algorithm used (Expand Search)
algorithm etc » algorithm _ (Expand Search), algorithm b (Expand Search), algorithm a (Expand Search)
pre function » spread function (Expand Search), sphere function (Expand Search), phase function (Expand Search)
algorithm python » algorithm within (Expand Search), algorithms within (Expand Search), algorithm both (Expand Search)
algorithm pre » algorithm pca (Expand Search), algorithm where (Expand Search), algorithm used (Expand Search)
algorithm etc » algorithm _ (Expand Search), algorithm b (Expand Search), algorithm a (Expand Search)
pre function » spread function (Expand Search), sphere function (Expand Search), phase function (Expand Search)
-
21
-
22
Comparison of UACI among different algorithms.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
23
Comparison of NPCR among different algorithms.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
24
-
25
-
26
-
27
-
28
-
29
-
30
-
31
Modular architecture design of PyNoetic showing all its constituent functions.
Published 2025Subjects: -
32
-
33
-
34
-
35
-
36
-
37
-
38
-
39
-
40