Search Results - "encryption algorithm"

Refine Results
  1. 1

    Colour image encryption algorithm combining Arnold map, DNA sequence operation, and a Mandelbrot set by Jithin, K.C., Sankar, Syam

    ISSN: 2214-2126
    Published: Elsevier Ltd 01.02.2020
    “…The third party misuse and manipulation of digital images is a threat to security and privacy of human subjects…”
    Get full text
    Journal Article
  2. 2

    Image Encryption Algorithm Based on Plane-Level Image Filtering and Discrete Logarithmic Transform by Feng, Wei, Zhao, Xiangyu, Zhang, Jing, Qin, Zhentao, Zhang, Junkun, He, Yigang

    ISSN: 2227-7390, 2227-7390
    Published: Basel MDPI AG 01.08.2022
    Published in Mathematics (Basel) (01.08.2022)
    “…Image encryption is an effective way to protect image data. However, existing image encryption algorithms are still unable to strike a good balance between security and efficiency…”
    Get full text
    Journal Article
  3. 3

    Medical image encryption algorithm based on a new five-dimensional multi-band multi-wing chaotic system and QR decomposition by Zhuang, Zeben, Zhuang, Zhiben, Wang, Tao

    ISSN: 2045-2322, 2045-2322
    Published: London Nature Publishing Group UK 03.01.2024
    Published in Scientific reports (03.01.2024)
    “…In this study, we propose a medical image encryption algorithm based on a new five-dimensional (5D…”
    Get full text
    Journal Article
  4. 4

    Hardware Optimization and System Design of Elliptic Curve Encryption Algorithm Based on FPGA by Li, Jiakun, Gao, Wei

    ISSN: 1687-725X, 1687-7268
    Published: New York Hindawi 11.10.2022
    Published in Journal of sensors (11.10.2022)
    “…Since entering the era of big data, the degree of information sharing is getting higher and higher; the information exchange is becoming more and more…”
    Get full text
    Journal Article
  5. 5

    Image encryption algorithm based on genetic operations and chaotic DNA encoding by Qobbi, Younes, Jarjar, Abdeltif, Essaid, Mohamed, Benazzi, Abdelhamid

    ISSN: 1432-7643, 1433-7479
    Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.06.2022
    Published in Soft computing (Berlin, Germany) (01.06.2022)
    “…Based on the two-dimensional logistic map and two genetic operations, a new image encryption algorithm is suggested…”
    Get full text
    Journal Article
  6. 6

    A visually meaningful secure image encryption algorithm based on conservative hyperchaotic system and optimized compressed sensing by Tong, Xiaojun, Liu, Xilin, Pan, Tao, Zhang, Miao, Wang, Zhu

    ISSN: 0942-4962, 1432-1882
    Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.06.2024
    Published in Multimedia systems (01.06.2024)
    “… the original image, this paper proposes a new visually image encryption algorithm, which can embed the compressed and encrypted image into a carrier image to achieve visual security, thus avoiding destruction and attacks…”
    Get full text
    Journal Article
  7. 7

    A DICOM ENCRYPTION ALGORITHM TO INCREASE SECURITY AND PRIVACY IN HEALTH DATA MANAGEMENT BASED ON PATIENT BIOMETRICS DATA, ARTIFICIAL INTELLIGENCE, AND RNA ENCRYPTION ALGORITHM by Soltani, Mohammad, Shakeri, Hassan, Houshmand, Mahboobeh

    ISSN: 2306-6172, 2308-9822
    Published: 01.01.2025
    “… One such technology is encryption, which protects medical images. This paper proposes an efficient hybrid encryption algorithm to secure digital imaging and communications (DICOM) in healthcare…”
    Get full text
    Journal Article
  8. 8

    Highly secured and quickest image encryption algorithm based on trigonometric chaotic map and S-box by Chinram, Ronnason, Bano, Mahwish, Habib, Umair, Singavananda, Pattarawan

    ISSN: 1432-7643, 1433-7479
    Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.08.2023
    Published in Soft computing (Berlin, Germany) (01.08.2023)
    “… Motivated by this, we propose another proficient and quick image encryption plan subject to the trigonometric turbulent guide…”
    Get full text
    Journal Article
  9. 9

    A flexible image encryption algorithm based on 3D CTBCS and DNA computing by Xu, Ji, Mou, Jun, Xiong, Li, Li, Peng, Hao, Jin

    ISSN: 1380-7501, 1573-7721
    Published: New York Springer US 01.07.2021
    Published in Multimedia tools and applications (01.07.2021)
    “…In this paper, a novel image encryption algorithm based on a new discrete chaotic system is presented…”
    Get full text
    Journal Article
  10. 10

    Security enhancement and attack detection using optimized hybrid deep learning and improved encryption algorithm over Internet of Things by M, Syed Shahul Hameed, Akshaya, V., Mandala, Vishwanadham, Anilkumar, Chunduru, VishnuRaja, P., Aarthi, R.

    ISSN: 2665-9174, 2665-9174
    Published: Elsevier 01.12.2023
    Published in Measurement. Sensors (01.12.2023)
    “…). There has been an extensive analysis on the Internet traffic detection and classification in the past decade, however this is still a trending subject with respect to IoT…”
    Get full text
    Journal Article
  11. 11

    A 3D Image Encryption Algorithm Based on the Chaotic System and the Image Segmentation by Xu, Ji, Zhao, Chen, Mou, Jun

    ISSN: 2169-3536, 2169-3536
    Published: Piscataway IEEE 01.01.2020
    Published in IEEE access (01.01.2020)
    “… The security analysis shows that the proposed 3D image file encryption algorithm possesses higher security features to preserve the subject and resist conventional attack…”
    Get full text
    Journal Article
  12. 12

    The Improved Hill Encryption Algorithm towards the Unmanned Surface Vessel Video Monitoring System Based on Internet of Things Technology by Dong, Jie, Lai, Chengzhe, Li, Yangyang, Yang, Tingting, Xia, Minghua

    ISSN: 1530-8669, 1530-8677
    Published: Cairo, Egypt Hindawi Publishing Corporation 01.01.2018
    “…Depending on the actual demand of maritime security, this paper analyzes the specific requirements of video encryption algorithm for maritime monitoring system…”
    Get full text
    Journal Article
  13. 13

    Tu-vera: An Encryption Algorithm Using Propositional Logic Calculus by Vargas-Vera, Maria

    ISSN: 2574-8254, 2574-8270
    Published: Riga IGI Global 01.04.2018
    “…This article describes how the encryption algorithm (called Tu-vera) depends on the transformation of a phrase written in English into a sequence of propositional logic formulas which can be understand by a human receiver…”
    Get full text
    Journal Article
  14. 14

    A new character-level encryption algorithm: how to implement cryptography in an ICT classroom by Arboledas Brihuega, David

    ISSN: 2013-6374, 2014-5349, 2013-6374
    Published: JOTSE: Journal of technology and science education 2019
    “…It is evident that the society in which we live will demand more and more qualified and specialized positions in the different branches of engineering. Now we…”
    Get full text
    Journal Article
  15. 15

    Symmetric Encryption Algorithm for RFID Systems Using a Dynamic Generation of Key by Labbi, Zouheir, Senhadji, Mohamed, Maarof, Ahmed, Belkasmi, Mostafa

    ISSN: 1694-0814, 1694-0784
    Published: Mahebourg International Journal of Computer Science Issues (IJCSI) 31.01.2018
    “…The security of RFID systems come to be a major subject today, notably for low cost RFID tags…”
    Get full text
    Journal Article
  16. 16

    A scrambling and encryption algorithm for selective block of identification photo by Qingling Jiang, Wu Zeng, Weihua Ou, Renhong Xu

    ISSN: 2472-7628
    Published: IEEE 01.10.2016
    “… Therefore, the key point is to distinguish the face details and background details accurately and to design an encryption algorithm with huge key space and sensitivity key…”
    Get full text
    Conference Proceeding
  17. 17

    Privacy protection against attack scenario of federated learning using internet of things by Yadav, Kusum, Kariri, Elham, Alotaibi, Shoayee Dlaim, Viriyasitavat, Wattana, Dhiman, Gaurav, Kaur, Amandeep

    ISSN: 1751-7575, 1751-7583
    Published: Taylor & Francis 02.09.2023
    Published in Enterprise information systems (02.09.2023)
    “… Simultaneously, numerous attack methods and classifications of federated learning systems are examined, as well as the distinctions between different federated learning encryption algorithms…”
    Get full text
    Journal Article
  18. 18

    Security-enhanced watermark embedding and transmission based on synchronized chaotic semiconductor lasers by Wang, Jun, Tang, Xi, Wang, Fei, Lin, Xiaodong, Zheng, Qiulan, Xia, Guangqiong, Wu, Zhengmao, Deng, Tao

    ISSN: 0924-090X, 1573-269X
    Published: Dordrecht Springer Netherlands 01.02.2023
    Published in Nonlinear dynamics (01.02.2023)
    “…) subject to identical injection from a driving laser (DL). In this proposed system, the chaotic signal from DL can be optimized after passing through a phase modulator…”
    Get full text
    Journal Article
  19. 19

    Strategies for Optimizing the Integration of Student Management and Curriculum Education Resources in Colleges and Universities Supported by Cloud Computing Platforms by Lu, Lei

    ISSN: 2444-8656, 2444-8656
    Published: Beirut Sciendo 01.01.2025
    Published in Applied mathematics and nonlinear sciences (01.01.2025)
    “… Using encryption algorithms to design the secure storage function of educational resources, and designing the scheduling function of educational resources using cloud computing virtualization technology…”
    Get full text
    Journal Article
  20. 20

    Triple Layered Encryption Algorithm for IEEE 802.11 WLANs in E-Government Services by Kabir, M A, Sayeed, K A, Matin, M A, Mehenaz, T, Kamruzzaman, M

    ISSN: 2074-9090, 2074-9104
    Published: Hong Kong Modern Education and Computer Science Press 02.09.2013
    “… to move from one place to another within offices while maintaining connectivity with the network. However, government organizations are subject to strict security policies and other compliance requirements…”
    Get full text
    Journal Article