sponsored by the National Natural Science Foundation of China(Grant Nos.62302114,62172353 and U20B2046);the Innovation Fund Program of the Engineering Research Center for Integration and Application of Digital Learning Technology of Ministry of Education(Nos.1331007,1311022);the Natural Science Foundation of Guangdong Province(No.2024A1515010177).
1 Introduction Traditional covert communication[1]usually relies on centralized channels,which are efficient in transmission but susceptible to eavesdropping and attacks,leading to information leakage.However,distribu...
supported by the Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province(Grant No.SKLACSS-202208);the Natural Science Foundation of Chongqing(Grant No.CSTB2023NSCQLZX0139);the National Natural Science Foundation of China(Grant No.61772295).
With the rapid development of digital information technology,images are increasingly used in various fields.To ensure the security of image data,prevent unauthorized tampering and leakage,maintain personal privacy,and...
Project supported by the National Natural Science Foundation of China(Grant No.62061014);the Natural Science Foundation of Liaoning province of China(Grant No.2020-MS-274).
Security during remote transmission has been an important concern for researchers in recent years.In this paper,a hierarchical encryption multi-image encryption scheme for people with different security levels is desi...
This work was supported by the National Key R&D Program of China under Grant No.2020YFB1710200.
The goal of cross-domain named entity recognition is to transfer mod-els learned from labelled source domain data to unlabelled or lightly labelled target domain datasets.This paper discusses how to adapt a cross-doma...
With the guidance of Erikson’s identity theory,the article analyzes the clones’identity exploration through role identification in Never Let Me Go.It interprets the clones’puzzlement about their identity,and the pr...
Deanship for Research&Innovation,Ministry of Education in Saudi Arabia for funding this research work through the Project Number:IFP22UQU4400257DSR031.
Information security has emerged as a key problem in encryption because of the rapid evolution of the internet and networks.Thus,the progress of image encryption techniques is becoming an increasingly serious issue an...
supported in part by the National Natural Science Foundation of China(Grant Number 61971078);Chongqing University of Technology Graduate Innovation Foundation(Grant Number gzlcx20222064).
With the improvement of image editing technology,the threshold of image tampering technology decreases,which leads to a decrease in the authenticity of image content.This has also driven research on image forgery dete...
This research was funded by Deanship of Scientific Research,Taif University Researches Supporting Project number(TURSP-2020/216),Taif University,Taif,Saudi Arabia.
This paper introduces an efficient image cryptography system.The pro-posed image cryptography system is based on employing the two-dimensional(2D)chaotic henon map(CHM)in the Discrete Fourier Transform(DFT).The propos...
funded by Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2022R87),Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
In today’s digital world,the most inevitable challenge is the protection of digital information.Due to the weak confidentiality preserving techniques,the existing world is facing several digital information breaches.T...
Encryption algorithms are one of the methods to protect dataduring its transmission through an unsafe transmission medium. But encryptionmethods need a lot of time during encryption and decryption, so itis necessary t...