بدائل البحث:
generation algorithm » genetic algorithm (توسيع البحث), detection algorithm (توسيع البحث), selection algorithm (توسيع البحث)
generation algorithm » genetic algorithm (توسيع البحث), detection algorithm (توسيع البحث), selection algorithm (توسيع البحث)
-
1
-
2
-
3
-
4
Comparison of UACI among different algorithms.
منشور في 2025"…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
-
5
Comparison of NPCR among different algorithms.
منشور في 2025"…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
-
6
Encrypted and decrypted images.
منشور في 2025"…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
-
7
Co-authorship network (graph generated using the force-directed Fruchterman-Reingold algorithm).
منشور في 2025"…<p>Co-authorship network (graph generated using the force-directed Fruchterman-Reingold algorithm).…"
-
8
Image Encryption Flow Chart.
منشور في 2025"…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
-
9
-
10
-
11
Comparison of correlation coefficients of adjacent pixels using different encryption methods.
منشور في 2025الموضوعات: -
12
Convergence curve of the DBO algorithm.
منشور في 2025"…For curved workpieces, the curvature adaptive interpolation method is introduced to generate trajectories. An adaptive impedance control strategy is implemented to enhance force control, and PD iteration and RBF neural networks are used to ensure stable contact force and accuracy. …"
-
13
-
14
-
15
-
16
-
17
-
18
-
19
-
20