Abstract: Image encryption utilizes the two-dimensional matrix characteristics of digital images to convert recognizable, information-rich images into indistinguishable, noise-like images by applying ...
We publish the best academic work (that's too often lost to peer reviews & the TA's desk) to the global tech community ...
Abstract: Because the communication network data may be subjected to various malicious attacks in the process of transmission, there are serious risks such as leakage and tampering of communication ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results