Results 211 to 220 of about 23,888 (272)
Long‐Tea‐CLIP (Contrastive Language‐Image Pre‐training) presents a multimodal AI framework that integrates visual, metabolomic, and sensory knowledge to grade green tea across appearance, soup color, aroma, taste, and infused leaf. By combining expert‐guided modeling with CLIP‐supervised learning, the system delivers fine‐grained quality evaluation and
Yanqun Xu +9 more
wiley +1 more source
Cascading quantum walks with Chebyshev map for designing a robust medical image encryption algorithm. [PDF]
Alblehai F +3 more
europepmc +1 more source
An efficient image encryption scheme based on Lorenz system and quantum-inspired walks. [PDF]
Karmany M +4 more
europepmc +1 more source
An image encryption scheme using 4-D chaotic system and cellular automaton. [PDF]
Al-Dayel I +3 more
europepmc +1 more source
Reversible data hiding for electronic patient information security for telemedicine applications. [PDF]
Muhudin A +3 more
europepmc +1 more source
Secure data transmission through fractal-based cryptosystem: a Noor iteration approach. [PDF]
Negi D, Kumar R, Kumar V, Dhaka A.
europepmc +1 more source
Image Encryption Algorithm Based on Dynamic Rhombus Transformation and Digital Tube Model. [PDF]
Zhang X, Song Y, Huang K.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2008
A variety of different clock-controlled stream ciphers and attacks on them have been described in a number of papers. However, few word-oriented algorithms with an irregular clocking mechanism have been proposed. This paper proposes a new design of irregular clocking for word-oriented stream ciphers that is dynamic feedback control and show analysis ...
Shinsaku Kiyomoto +2 more
openaire +1 more source
A variety of different clock-controlled stream ciphers and attacks on them have been described in a number of papers. However, few word-oriented algorithms with an irregular clocking mechanism have been proposed. This paper proposes a new design of irregular clocking for word-oriented stream ciphers that is dynamic feedback control and show analysis ...
Shinsaku Kiyomoto +2 more
openaire +1 more source
2015
It is desirable that both the encryption and decryption functions be public knowledge and so the secrecy of the message, given the ciphertext, depends totally on the secrecy of the secret key k. Although this well-established principle, called Kerckhoffs’ principle, has been known since the mid-1800s some companies still ignore it and choose to deploy ...
openaire +1 more source
It is desirable that both the encryption and decryption functions be public knowledge and so the secrecy of the message, given the ciphertext, depends totally on the secrecy of the secret key k. Although this well-established principle, called Kerckhoffs’ principle, has been known since the mid-1800s some companies still ignore it and choose to deploy ...
openaire +1 more source
2015
We can interpret a pseudo-random function as a stream cipher. Let {F k } K be a PRF family with codomain C of bitstrings of length l. The PRF family immediately defines a stream cipher for messages of length l bits.
openaire +1 more source
We can interpret a pseudo-random function as a stream cipher. Let {F k } K be a PRF family with codomain C of bitstrings of length l. The PRF family immediately defines a stream cipher for messages of length l bits.
openaire +1 more source

