-
141
A Novel Hyperchaotic Image Encryption Scheme Based on DNA Encoding, Pixel-Level Scrambling and Bit-Level Scrambling
Published 2018-01-01“…Experiments results and theoretical analysis show that the proposed scheme is secure enough and can resist known plain text attack, statistical attacks, and differential attacks. …”
Get full text
Article -
142
Design and Enhancing Security Performance of Image Cryptography System Based on Fixed Point Chaotic Maps Stream Ciphers in FPGA
Published 2024-05-01“… Within this document, a novel system for image cryptography design utilizing fixed-point stream cipher chaotic maps is proposed. …”
Get full text
Article -
143
A Novel Multi-Image Encryption Scheme Using Generalized Rectangular Transform and Advanced 5-D Hyperchaotic Map
Published 2025-01-01“…Extensive robustness testing against cropping, salt & pepper noise, and hybrid attacks confirms that GRTPHM can maintain satisfactory decryption accuracy and visual quality, even under severe image distortions. …”
Get full text
Article -
144
A Secure COVID Affected CT Scan Image Encryption Scheme Using Hybrid MLSCM for IoMT Environment
Published 2025-01-01“…The impact of avalanches for sensitive key analysis has been confirmed with a key space of <inline-formula> <tex-math notation="LaTeX">$1.5491 \times 2^{526}$ </tex-math></inline-formula>, enough to withstand multiple attacks.…”
Get full text
Article -
145
A hybrid encryption framework leveraging quantum and classical cryptography for secure transmission of medical images in IoT-based telemedicine networks
Published 2024-12-01“…Furthermore, the framework is tested against various cyberattacks such as brute-force attacks, clipping attacks, and noise attacks on the ciphertext images, to demonstrate its resilience against such threats.…”
Get full text
Article -
146
Enhancing image security via chaotic maps, Fibonacci, Tribonacci transformations, and DWT diffusion: a robust data encryption approach
Published 2024-05-01“…This creates further diffusion (level 3 diffusion) to make it difficult for an attacker to recover the plaintext image from an encrypted image. …”
Get full text
Article -
147
Split Edge-Cloud Neural Networks for Better Adversarial Robustness
Published 2024-01-01Get full text
Article -
148
SMS Scam Detection Application Based on Optical Character Recognition for Image Data Using Unsupervised and Deep Semi-Supervised Learning
Published 2024-09-01“…Similarly, while K-means with vectorizer excels in accuracy, it may struggle with the dynamic and evolving nature of smishing attacks, necessitating continual retraining.…”
Get full text
Article -
149
IELTSoC: enhanced image encryption using combined logistic and Tinkerbell maps with second order cellular automata for internet of things
Published 2025-07-01“…The approach is sufficiently efficient for real-time utilization, rendering it feasible for secure image transmission and storage. The security analyses verify that the proposed method effectively diminishes the correlation between neighboring pixels in encrypted images and provides a substantial key space, hence increasing the difficulty for attackers to decrypt the images. …”
Get full text
Article -
150
Effects of acute sleep deprivation on the brain function of individuals with migraine: a resting-state functional magnetic resonance imaging study
Published 2025-03-01“…Abstract Background Sleep deprivation can trigger acute headache attacks in individuals with migraine; however, the underlying mechanism remains poorly understood. …”
Get full text
Article -
151
A novel color image encryption algorithm based on fractional-order conservative memristive hyperchaotic system and extended zig-zag transform
Published 2025-08-01“…Second, a new extended Zig-Zag confusing method is designed, which realizes the scrambling of pixels in different channels of a color image. Finally, the performance of the designed encryption algorithm is analyzed using key space, information entropy, histogram, differential attack, correlation coefficient and robustness analysis. …”
Get full text
Article -
152
Compression Sensing Satellite Image Pixel Scrambling Scheme using Unique Seed Generation for Intra-Block Confusion with LP Rotation Mechanism
Published 2025-10-01“…Empirical validation of the model includes differential attack analysis, correlation analysis, entropy analysis, and comparative evaluation with recent state-of-the-art algorithms, demonstrating its superior efficacy in ensuring secure and efficient satellite image encryption.…”
Get full text
Article -
153
-
154
-
155
Analysis of parahippocampal gyrus in 115 patients with hippocampal sclerosis
Published 2003-09-01“…PURPOSE: Analysis of the parahippocampal gyrus (PHG) involvement in 115 patients with hippocampal sclerosis (HS) by MR imaging. …”
Get full text
Article -
156
The “Great Meme War:” the Alt-Right and its Multifarious Enemies
Published 2020-04-01“…This theme is linked to Trump’s campaign and to his attacks against two major “enemies” of the U.S., namely Hispanics and Muslims. …”
Get full text
Article -
157
Andrey Bely’s Novel Moscow (1926): Between the Author’s Idea and Publishing Practice
Published 2025-06-01Get full text
Article -
158
-
159
An Automated Microfluidic Platform for In Vitro Raman Analysis of Living Cells
Published 2025-07-01“…Furthermore, membrane damage is emphasized in changes in the 1270, 1301, and 1738 cm<sup>−1</sup> frequencies, as phospholipid synthesis is accelerated in an attempt to compensate for the membrane damage brought about by the ROS attack. This study highlights the potential use of this platform as an alternative to conventional culturing and analysis procedures, considering that cell culturing, optical imaging, and Raman spectroscopy can be performed simultaneously on living cells with minimal cellular stress and without the need for labeling or fixation.…”
Get full text
Article -
160
The Kosovo War in the Media - Analysis of a Global Discursive Order
Published 2002-10-01“…But under the impact of subsequent events, especially the misdirected attacks on Albanian refugees, the news media in both countries turned into a mainly critical image of the NATO bombings. …”
Get full text
Article