Web app using Streamlit to implement various substitution and transposition cipher techniques. Users can input plaintext, select a cipher (like Caesar, Vigenère, or Hill), enter relevant parameters, ...
Abstract: The rapid proliferation and extensive application of image data have made image encryption technology increasingly important in the field of information security. This article reports a ...
RAE-TPE: A Reversible Adversarial Example Generation Method Based on Thumbnail Preserving Encryption
Abstract: Nowadays, large numbers of private images are stored in the cloud, which may be recognized by unauthorized models, seriously threatening users' privacy security. Although adversarial example ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results