CONFUSION

作品数:106被引量:47H指数:4
导出分析报告
相关领域:医药卫生更多>>
相关作者:陈容王宜贵刘敏李羽中陈焕华更多>>
相关机构:广西壮族自治区妇幼保健院深圳市松岗中学陕西师范大学广东商学院更多>>
相关期刊:更多>>
相关基金:国家自然科学基金广东省自然科学基金北京市自然科学基金国家重点基础研究发展计划更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
A blockchain-oriented covert communication technology with controlled security level based on addressing confusion ciphertext
《Frontiers of Computer Science》2025年第2期133-135,共3页Lejun ZHANG Bo ZHANG Ran GUO Zhujun WANG Guopeng WANG Jing QIU Shen SU Yuan LIU Guangxia XU Zhihong TIAN Sergey GATAULLIN 
sponsored by the National Natural Science Foundation of China(Grant Nos.62302114,62172353 and U20B2046);the Innovation Fund Program of the Engineering Research Center for Integration and Application of Digital Learning Technology of Ministry of Education(Nos.1331007,1311022);the Natural Science Foundation of Guangdong Province(No.2024A1515010177).
1 Introduction Traditional covert communication[1]usually relies on centralized channels,which are efficient in transmission but susceptible to eavesdropping and attacks,leading to information leakage.However,distribu...
关键词:communication TABLES networks 
Image encryption algorithm based on multiple chaotic systems and improved Joseph block scrambling
《Chinese Physics B》2024年第10期248-257,共10页Dingkang Mou Yumin Dong 
supported by the Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province(Grant No.SKLACSS-202208);the Natural Science Foundation of Chongqing(Grant No.CSTB2023NSCQLZX0139);the National Natural Science Foundation of China(Grant No.61772295).
With the rapid development of digital information technology,images are increasingly used in various fields.To ensure the security of image data,prevent unauthorized tampering and leakage,maintain personal privacy,and...
关键词:mersenne twister algorithm DNA coding confusion pixel XOR operation improved Joseph block scrambling 
A chaotic hierarchical encryption/watermark embedding scheme for multi-medical images based on row-column confusion and closed-loop bi-directional diffusion
《Chinese Physics B》2024年第2期228-237,共10页张哲祎 牟俊 Santo Banerjee 曹颖鸿 
Project supported by the National Natural Science Foundation of China(Grant No.62061014);the Natural Science Foundation of Liaoning province of China(Grant No.2020-MS-274).
Security during remote transmission has been an important concern for researchers in recent years.In this paper,a hierarchical encryption multi-image encryption scheme for people with different security levels is desi...
关键词:chaotic hierarchical encryption multi-medical image encryption differentiated visual effects row-column confusion closed-loop bi-directional diffusion transform domain watermark embedding 
GPDCCL: Cross-Domain Named Entity Recognition with Span-Based Domain Confusion Contrastive Learning
《国际计算机前沿大会会议论文集》2023年第2期202-212,共11页Ye Wang Chenxiao Shi Lijie Li Manyuan Guo 
This work was supported by the National Key R&D Program of China under Grant No.2020YFB1710200.
The goal of cross-domain named entity recognition is to transfer mod-els learned from labelled source domain data to unlabelled or lightly labelled target domain datasets.This paper discusses how to adapt a cross-doma...
关键词:Transfer Learning Named Entity Recognition Domain Adaptation Contrastive Learning Adversarial Training 
An Analysis on the Role Identification of Clones in Never Let Me Go
《Journal of Literature and Art Studies》2023年第12期946-953,共8页PENG Si-yu 
With the guidance of Erikson’s identity theory,the article analyzes the clones’identity exploration through role identification in Never Let Me Go.It interprets the clones’puzzlement about their identity,and the pr...
关键词:Kazuo Ishiguro Never Let Me Go CLONES identity confusion role identity 
A Multi-Stream Scrambling and DNA Encoding Method Based Image Encryption
《Computer Systems Science & Engineering》2023年第11期1321-1347,共27页Nashat Salih Abdulkarim Alsandi Dilovan Asaad Zebari Adel Al-Zebari Falah Y.H.Ahmed Mazin Abed Mohammed Marwan Albahar Abdulaziz Ali Albahr 
Deanship for Research&Innovation,Ministry of Education in Saudi Arabia for funding this research work through the Project Number:IFP22UQU4400257DSR031.
Information security has emerged as a key problem in encryption because of the rapid evolution of the internet and networks.Thus,the progress of image encryption techniques is becoming an increasingly serious issue an...
关键词:Grayscale image encryption stream scrambling-confusion DNA encoding XOR operation chaotic systems 
A New Method for Image Tamper Detection Based on an Improved U-Net
《Intelligent Automation & Soft Computing》2023年第9期2883-2895,共13页Jie Zhang Jianxun Zhang Bowen Li Jie Cao Yifan Guo 
supported in part by the National Natural Science Foundation of China(Grant Number 61971078);Chongqing University of Technology Graduate Innovation Foundation(Grant Number gzlcx20222064).
With the improvement of image editing technology,the threshold of image tampering technology decreases,which leads to a decrease in the authenticity of image content.This has also driven research on image forgery dete...
关键词:Forgery detection multiple receptive fields cyclic residuals U-Net channel coordinate confusion attention 
Dual Image Cryptosystem Using Henon Map and Discrete Fourier Transform被引量:1
《Intelligent Automation & Soft Computing》2023年第6期2933-2945,共13页Hesham Alhumyani 
This research was funded by Deanship of Scientific Research,Taif University Researches Supporting Project number(TURSP-2020/216),Taif University,Taif,Saudi Arabia.
This paper introduces an efficient image cryptography system.The pro-posed image cryptography system is based on employing the two-dimensional(2D)chaotic henon map(CHM)in the Discrete Fourier Transform(DFT).The propos...
关键词:Discrete Fourier Transform(DFT) chaotic henon map(CHM) CONFUSION diffusion CRYPTOGRAPHY 
Classification of Nonlinear Confusion Component Using Hybrid Multi-Criteria Decision Making
《Intelligent Automation & Soft Computing》2023年第5期1451-1463,共13页Nabilah Abughazalah Iqra Ishaque Majid Khan Ammar S.Alanazi Iqtadar Hussain 
funded by Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2022R87),Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
In today’s digital world,the most inevitable challenge is the protection of digital information.Due to the weak confidentiality preserving techniques,the existing world is facing several digital information breaches.T...
关键词:DEMATEL MCDM MOORA NONLINEARITY S-BOX 
A Novel Lightweight Image Encryption Scheme
《Computers, Materials & Continua》2023年第4期2137-2153,共17页Rawia Abdulla Mohammed Maisa’a Abid Ali Khodher Ashwak Alabaichi 
Encryption algorithms are one of the methods to protect dataduring its transmission through an unsafe transmission medium. But encryptionmethods need a lot of time during encryption and decryption, so itis necessary t...
关键词:Chaotic system LIGHTWEIGHT CONFUSION DIFFUSION ENCRYPTION Salsa20 
检索报告 对象比较 聚类工具 使用帮助 返回顶部