|
|
|
Jiyuan Tan, Limin Zhang and Zhaogen Zhong
Aiming to solve the problem of the distinction of scrambled linear block codes, a method for identifying the scrambling types of linear block codes by combining correlation features and convolution long short-term memory neural networks is proposed in th...
ver más
|
|
|
|
|
|
|
Xiaolong Wang, Haowen Yan and Liming Zhang
Encryption of vector maps, used for copyright protection, is of importance in the community of geographic information sciences. However, some studies adopt one-to-one mapping to scramble vertices and permutate the coordinates one by one according to the ...
ver más
|
|
|
|
|
|
|
Zhi Tang, Yun Zhang, Jing Huang, Hao He and Yue Ding
There is undoubtedly a groundswell of support for the concept of geographic data sharing with the rapid development and wide-ranging application of geographic information science. However, copyright protection and infringement detection in the process of...
ver más
|
|
|
|
|
|
|
Hanmeng Wu, Jun Wang, Ziyi Zhang, Xudong Chen and Zheng Zhu
A multi-image encryption with super-large-capacity is proposed by using spherical diffraction and filtering diffusion. In the proposed method, initial images are processed sequentially by filtering diffusion and chaos scrambling. The images are combined ...
ver más
|
|
|
|
|
|
|
Jianbin He and Jianping Cai
Over the past century, a tremendous amount of work on the Duffing system has been done with continuous external force, including analytical and numerical solution methods, and the dynamic behavior of physical systems. However, hows does the Duffing oscil...
ver más
|
|
|
|
|
|
|
Zhengmao Ye, Hang Yin and Yongmao Ye
This article presents an advanced dual chaotic watermarking scheme to improve information security. To ensure confidentiality in digital image transmission, a secure dual watermarking scheme is proposed by applying the chaotic logistic system and hyper-c...
ver más
|
|
|
|
|
|
|
Nihayatus Sa'adah, I Gede Puja Astawa, Amang Sudarsono
Pág. 217 - 235
Security is a major concern of the internet world because the development of the Internet requires the security of data transmission. The security method helps us to store valuable information and send it over an insecure network so that it can not be re...
ver más
|
|
|
|
|
|
|
Dandan Liu, Jian Shen, Zhihua Xia and Xingming Sun
Content-based image retrieval (CBIR) has been widely used in many applications. Large storage and computation overheads have made the outsourcing of CBIR services attractive. However, the privacy issues brought by outsourcing have become a big problem. I...
ver más
|
|
|
|
|
|
|
Kunisa, A.
Pág. 344 - 349
|
|
|
|
|
|
|
Jiang, J. H. Jone, W.-B. Chang, S.-C. Ghosh, S.
Pág. 435 - 443
|
|
|
|