ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Computing
Computing
Technology
Pure sciences
Research
Industrial engineer
Social Sciences
Mechanical Engineering
Architecture and Urbanism
Education
all records (65)

Languages
English
German
Spanish

Countries
Indonesia
USA
Ukraine
India
Brazil
Switzerland
Canada
Austria
Italy
Iraq
all records (54)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
1.242  Articles
1 of 125 pages  |  10  records  |  more records»
Hyperspectral images (HI) collect information from across the electromagnetic spectrum, and they are an essential tool for identifying materials, recognizing processes and finding objects. However, the information on an HI could be sensitive and must to b... see more

The multimedia application developments in recent years lead to the widespread of 3D model applications. It becomes more popular in various fields as well as exchanging it over the internet. The security of the 3D models is a very important issue now a da... see more

The security of video applications in mobile devices has become recently an important field research. Dealing with video data, which is large compared to text and image and processing it in the mobile platform is a big challenge. Generally, the efficiency... see more

The security of video applications in mobile devices has become recently an important field research. Dealing with video data, which is large compared to text and image and processing it in the mobile platform is a big challenge. Generally, the efficiency... see more

An image encryption algorithm is presented in this paper based on a chaotic map. Different from traditional methods based on the permutation-diffusion structure, the keystream here depends on both secret keys and the pre-processed image. In particular, in... see more

To enhance the encryption proficiency and encourage the protected transmission of multiple images, the current work introduces an encryption algorithm for multiple images using the combination of mixed image elements (MIES) and a two-dimensional economic ... see more

In order to overcome the difficulty of key management in “one time pad” encryption schemes and also resist the attack of chosen plaintext, a new image encryption algorithm based on chaos and SHA-256 is proposed in this paper. The architecture ... see more

With the popularity of the Internet, the transmission of images has become more frequent. It is of great significance to study efficient and secure image encryption algorithms. Based on traditional Logistic maps and consideration of delay, we propose a ne... see more

In this paper, a three-dimensional chaotic system with a hidden attractor is introduced. The complex dynamic behaviors of the system are analyzed with a Poincaré cross section, and the equilibria and initial value sensitivity are analyzed by the me... see more

1 of 125 pages  |  10  records  |  more records»