Search alternatives:
image » images (Expand Search)
Showing 141 - 160 results of 261 for search 'attack image analysis', query time: 0.11s Refine Results
  1. 141

    A Novel Hyperchaotic Image Encryption Scheme Based on DNA Encoding, Pixel-Level Scrambling and Bit-Level Scrambling by Shuliang Sun

    Published 2018-01-01
    “…Experiments results and theoretical analysis show that the proposed scheme is secure enough and can resist known plain text attack, statistical attacks, and differential attacks. …”
    Get full text
    Article
  2. 142

    Design and Enhancing Security Performance of Image Cryptography System Based on Fixed Point Chaotic Maps Stream Ciphers in FPGA by Ahmed Amir Salih, Zaid Abdulsattar Abdulrazaq, Harith Ghanim Ayoub

    Published 2024-05-01
    “… Within this document, a novel system for image cryptography design utilizing fixed-point stream cipher chaotic maps is proposed. …”
    Get full text
    Article
  3. 143

    A Novel Multi-Image Encryption Scheme Using Generalized Rectangular Transform and Advanced 5-D Hyperchaotic Map by Yu-Chi Lan, Chung-Ming Wang

    Published 2025-01-01
    “…Extensive robustness testing against cropping, salt & pepper noise, and hybrid attacks confirms that GRTPHM can maintain satisfactory decryption accuracy and visual quality, even under severe image distortions. …”
    Get full text
    Article
  4. 144

    A Secure COVID Affected CT Scan Image Encryption Scheme Using Hybrid MLSCM for IoMT Environment by Sasmita Padhy, Sachikanta Dash, Naween Kumar, Gyanendra Kumar

    Published 2025-01-01
    “…The impact of avalanches for sensitive key analysis has been confirmed with a key space of <inline-formula> <tex-math notation="LaTeX">$1.5491 \times 2^{526}$ </tex-math></inline-formula>, enough to withstand multiple attacks.…”
    Get full text
    Article
  5. 145

    A hybrid encryption framework leveraging quantum and classical cryptography for secure transmission of medical images in IoT-based telemedicine networks by Arslan Shafique, Syed Ali Atif Naqvi, Ali Raza, Masoud Ghalaii, Panagiotis Papanastasiou, Julie McCann, Qammer H. Abbasi, Muhammad Ali Imran

    Published 2024-12-01
    “…Furthermore, the framework is tested against various cyberattacks such as brute-force attacks, clipping attacks, and noise attacks on the ciphertext images, to demonstrate its resilience against such threats.…”
    Get full text
    Article
  6. 146

    Enhancing image security via chaotic maps, Fibonacci, Tribonacci transformations, and DWT diffusion: a robust data encryption approach by Mohammad Mazyad Hazzazi, Mujeeb Ur Rehman, Arslan Shafique, Amer Aljaedi, Zaid Bassfar, Aminu Bello Usman

    Published 2024-05-01
    “…This creates further diffusion (level 3 diffusion) to make it difficult for an attacker to recover the plaintext image from an encrypted image. …”
    Get full text
    Article
  7. 147
  8. 148

    SMS Scam Detection Application Based on Optical Character Recognition for Image Data Using Unsupervised and Deep Semi-Supervised Learning by Anjali Shinde, Essa Q. Shahra, Shadi Basurra, Faisal Saeed, Abdulrahman A. AlSewari, Waheb A. Jabbar

    Published 2024-09-01
    “…Similarly, while K-means with vectorizer excels in accuracy, it may struggle with the dynamic and evolving nature of smishing attacks, necessitating continual retraining.…”
    Get full text
    Article
  9. 149

    IELTSoC: enhanced image encryption using combined logistic and Tinkerbell maps with second order cellular automata for internet of things by Biswarup Yogi, Satyabrata Roy, Ajoy Kumar Khan, Umashankar Rawat, Mahesh Jangid, Pronaya Bhattacharya

    Published 2025-07-01
    “…The approach is sufficiently efficient for real-time utilization, rendering it feasible for secure image transmission and storage. The security analyses verify that the proposed method effectively diminishes the correlation between neighboring pixels in encrypted images and provides a substantial key space, hence increasing the difficulty for attackers to decrypt the images. …”
    Get full text
    Article
  10. 150

    Effects of acute sleep deprivation on the brain function of individuals with migraine: a resting-state functional magnetic resonance imaging study by Shuqing Wang, Longteng Ma, Song Wang, Caohui Duan, Xinyu Wang, Xiangbing Bian, Deqi Zhai, Yin Sun, Siyuan Xie, Shuhua Zhang, Yingyuan Liu, Xiaoxue Lin, Ruobing Wang, Xiu Liu, Shengyuan Yu, Xin Lou, Zhao Dong

    Published 2025-03-01
    “…Abstract Background Sleep deprivation can trigger acute headache attacks in individuals with migraine; however, the underlying mechanism remains poorly understood. …”
    Get full text
    Article
  11. 151

    A novel color image encryption algorithm based on fractional-order conservative memristive hyperchaotic system and extended zig-zag transform by Fanqi Meng, Gang Wu, Juxiao Zhang

    Published 2025-08-01
    “…Second, a new extended Zig-Zag confusing method is designed, which realizes the scrambling of pixels in different channels of a color image. Finally, the performance of the designed encryption algorithm is analyzed using key space, information entropy, histogram, differential attack, correlation coefficient and robustness analysis. …”
    Get full text
    Article
  12. 152

    Compression Sensing Satellite Image Pixel Scrambling Scheme using Unique Seed Generation for Intra-Block Confusion with LP Rotation Mechanism by Ram Chandra Barik, Devendra Kumar Yadav, Pragyan Mishra

    Published 2025-10-01
    “…Empirical validation of the model includes differential attack analysis, correlation analysis, entropy analysis, and comparative evaluation with recent state-of-the-art algorithms, demonstrating its superior efficacy in ensuring secure and efficient satellite image encryption.…”
    Get full text
    Article
  13. 153
  14. 154
  15. 155

    Analysis of parahippocampal gyrus in 115 patients with hippocampal sclerosis by Nelson Fortes Ferreira, Vanessa de Oliveira, Lázaro Amaral, Renato Mendonça, Sérgio Santos Lima

    Published 2003-09-01
    “…PURPOSE: Analysis of the parahippocampal gyrus (PHG) involvement in 115 patients with hippocampal sclerosis (HS) by MR imaging. …”
    Get full text
    Article
  16. 156

    The “Great Meme War:” the Alt-Right and its Multifarious Enemies by Maxime Dafaure

    Published 2020-04-01
    “…This theme is linked to Trump’s campaign and to his attacks against two major “enemies” of the U.S., namely Hispanics and Muslims. …”
    Get full text
    Article
  17. 157
  18. 158
  19. 159

    An Automated Microfluidic Platform for In Vitro Raman Analysis of Living Cells by Illya Klyusko, Stefania Scalise, Francesco Guzzi, Luigi Randazzini, Simona Zaccone, Elvira Immacolata Parrotta, Valeria Lucchino, Alessio Merola, Carlo Cosentino, Ulrich Krühne, Isabella Aquila, Giovanni Cuda, Enzo Di Fabrizio, Patrizio Candeloro, Gerardo Perozziello

    Published 2025-07-01
    “…Furthermore, membrane damage is emphasized in changes in the 1270, 1301, and 1738 cm<sup>−1</sup> frequencies, as phospholipid synthesis is accelerated in an attempt to compensate for the membrane damage brought about by the ROS attack. This study highlights the potential use of this platform as an alternative to conventional culturing and analysis procedures, considering that cell culturing, optical imaging, and Raman spectroscopy can be performed simultaneously on living cells with minimal cellular stress and without the need for labeling or fixation.…”
    Get full text
    Article
  20. 160

    The Kosovo War in the Media - Analysis of a Global Discursive Order by Birgitta Höijer, Stig Arne Nohrstedt, Rune Ottosen

    Published 2002-10-01
    “…But under the impact of subsequent events, especially the misdirected attacks on Albanian refugees, the news media in both countries turned into a mainly critical image of the NATO bombings. …”
    Get full text
    Article