News

Personally identifiable information has been found in DataComp CommonPool, one of the largest open-source data sets used to ...
IGIS Tech Notes describe workflows and techniques for using geospatial science and technologies in research and extension.
Due to the large amount of computation required for authentication and matching in the data sharing phase, there is a certain delay in the real-time performance of the corresponding efficiency.
To protect image information security, we propose an encryption algorithm based on chaotic sequences and bits' cross-diffusion. First, two chaotic sequences are generated by two-dimensional logic-sine ...