بدائل البحث:
generation algorithm » genetic algorithm (توسيع البحث), detection algorithm (توسيع البحث), encryption algorithm (توسيع البحث)
image generation » data generation (توسيع البحث)
multiple image » multiple images (توسيع البحث), multiple age (توسيع البحث), multiple immune (توسيع البحث)
generation algorithm » genetic algorithm (توسيع البحث), detection algorithm (توسيع البحث), encryption algorithm (توسيع البحث)
image generation » data generation (توسيع البحث)
multiple image » multiple images (توسيع البحث), multiple age (توسيع البحث), multiple immune (توسيع البحث)
-
1
-
2
-
3
Comparison of UACI among different algorithms.
منشور في 2025"…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
-
4
Comparison of NPCR among different algorithms.
منشور في 2025"…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
-
5
-
6
Compare algorithm parameter settings.
منشور في 2025"…The algorithm integrates three key strategies: a precise population elimination strategy, which optimizes the population structure by eliminating individuals with low fitness and intelligently generating new ones; a lens imaging-based opposition learning strategy, which expands the exploration of the solution space through reflection and scaling to reduce the risk of local optima; and a boundary control strategy based on the best individual, which effectively constrains the search range to avoid inefficient searches and premature convergence. …"
-
7
-
8
-
9
-
10
-
11
Lens imaging opposition-based learning.
منشور في 2025"…The algorithm integrates three key strategies: a precise population elimination strategy, which optimizes the population structure by eliminating individuals with low fitness and intelligently generating new ones; a lens imaging-based opposition learning strategy, which expands the exploration of the solution space through reflection and scaling to reduce the risk of local optima; and a boundary control strategy based on the best individual, which effectively constrains the search range to avoid inefficient searches and premature convergence. …"
-
12
Results of low-light image enhancement test.
منشور في 2025"…The algorithm integrates three key strategies: a precise population elimination strategy, which optimizes the population structure by eliminating individuals with low fitness and intelligently generating new ones; a lens imaging-based opposition learning strategy, which expands the exploration of the solution space through reflection and scaling to reduce the risk of local optima; and a boundary control strategy based on the best individual, which effectively constrains the search range to avoid inefficient searches and premature convergence. …"
-
13
-
14
Encrypted and decrypted images.
منشور في 2025"…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
-
15
Image Encryption Flow Chart.
منشور في 2025"…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
-
16
-value on CEC2022 (dim = 20).
منشور في 2025"…The algorithm integrates three key strategies: a precise population elimination strategy, which optimizes the population structure by eliminating individuals with low fitness and intelligently generating new ones; a lens imaging-based opposition learning strategy, which expands the exploration of the solution space through reflection and scaling to reduce the risk of local optima; and a boundary control strategy based on the best individual, which effectively constrains the search range to avoid inefficient searches and premature convergence. …"
-
17
Precision elimination strategy.
منشور في 2025"…The algorithm integrates three key strategies: a precise population elimination strategy, which optimizes the population structure by eliminating individuals with low fitness and intelligently generating new ones; a lens imaging-based opposition learning strategy, which expands the exploration of the solution space through reflection and scaling to reduce the risk of local optima; and a boundary control strategy based on the best individual, which effectively constrains the search range to avoid inefficient searches and premature convergence. …"
-
18
-value on 23 benchmark functions (dim = 30).
منشور في 2025"…The algorithm integrates three key strategies: a precise population elimination strategy, which optimizes the population structure by eliminating individuals with low fitness and intelligently generating new ones; a lens imaging-based opposition learning strategy, which expands the exploration of the solution space through reflection and scaling to reduce the risk of local optima; and a boundary control strategy based on the best individual, which effectively constrains the search range to avoid inefficient searches and premature convergence. …"
-
19
Evaluation metrics obtained by SBOA and MESBOA.
منشور في 2025"…The algorithm integrates three key strategies: a precise population elimination strategy, which optimizes the population structure by eliminating individuals with low fitness and intelligently generating new ones; a lens imaging-based opposition learning strategy, which expands the exploration of the solution space through reflection and scaling to reduce the risk of local optima; and a boundary control strategy based on the best individual, which effectively constrains the search range to avoid inefficient searches and premature convergence. …"
-
20