Search Results - "encryption algorithm"
-
1
Colour image encryption algorithm combining Arnold map, DNA sequence operation, and a Mandelbrot set
ISSN: 2214-2126Published: Elsevier Ltd 01.02.2020Published in Journal of information security and applications (01.02.2020)“…The third party misuse and manipulation of digital images is a threat to security and privacy of human subjects…”
Get full text
Journal Article -
2
Image Encryption Algorithm Based on Plane-Level Image Filtering and Discrete Logarithmic Transform
ISSN: 2227-7390, 2227-7390Published: Basel MDPI AG 01.08.2022Published in Mathematics (Basel) (01.08.2022)“…Image encryption is an effective way to protect image data. However, existing image encryption algorithms are still unable to strike a good balance between security and efficiency…”
Get full text
Journal Article -
3
Medical image encryption algorithm based on a new five-dimensional multi-band multi-wing chaotic system and QR decomposition
ISSN: 2045-2322, 2045-2322Published: London Nature Publishing Group UK 03.01.2024Published in Scientific reports (03.01.2024)“…In this study, we propose a medical image encryption algorithm based on a new five-dimensional (5D…”
Get full text
Journal Article -
4
Hardware Optimization and System Design of Elliptic Curve Encryption Algorithm Based on FPGA
ISSN: 1687-725X, 1687-7268Published: New York Hindawi 11.10.2022Published in Journal of sensors (11.10.2022)“…Since entering the era of big data, the degree of information sharing is getting higher and higher; the information exchange is becoming more and more…”
Get full text
Journal Article -
5
Image encryption algorithm based on genetic operations and chaotic DNA encoding
ISSN: 1432-7643, 1433-7479Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.06.2022Published in Soft computing (Berlin, Germany) (01.06.2022)“…Based on the two-dimensional logistic map and two genetic operations, a new image encryption algorithm is suggested…”
Get full text
Journal Article -
6
A visually meaningful secure image encryption algorithm based on conservative hyperchaotic system and optimized compressed sensing
ISSN: 0942-4962, 1432-1882Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.06.2024Published in Multimedia systems (01.06.2024)“… the original image, this paper proposes a new visually image encryption algorithm, which can embed the compressed and encrypted image into a carrier image to achieve visual security, thus avoiding destruction and attacks…”
Get full text
Journal Article -
7
A DICOM ENCRYPTION ALGORITHM TO INCREASE SECURITY AND PRIVACY IN HEALTH DATA MANAGEMENT BASED ON PATIENT BIOMETRICS DATA, ARTIFICIAL INTELLIGENCE, AND RNA ENCRYPTION ALGORITHM
ISSN: 2306-6172, 2308-9822Published: 01.01.2025Published in Eurasian Journal of Mathematical and Computer Applications (01.01.2025)“… One such technology is encryption, which protects medical images. This paper proposes an efficient hybrid encryption algorithm to secure digital imaging and communications (DICOM) in healthcare…”
Get full text
Journal Article -
8
Highly secured and quickest image encryption algorithm based on trigonometric chaotic map and S-box
ISSN: 1432-7643, 1433-7479Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.08.2023Published in Soft computing (Berlin, Germany) (01.08.2023)“… Motivated by this, we propose another proficient and quick image encryption plan subject to the trigonometric turbulent guide…”
Get full text
Journal Article -
9
A flexible image encryption algorithm based on 3D CTBCS and DNA computing
ISSN: 1380-7501, 1573-7721Published: New York Springer US 01.07.2021Published in Multimedia tools and applications (01.07.2021)“…In this paper, a novel image encryption algorithm based on a new discrete chaotic system is presented…”
Get full text
Journal Article -
10
Security enhancement and attack detection using optimized hybrid deep learning and improved encryption algorithm over Internet of Things
ISSN: 2665-9174, 2665-9174Published: Elsevier 01.12.2023Published in Measurement. Sensors (01.12.2023)“…). There has been an extensive analysis on the Internet traffic detection and classification in the past decade, however this is still a trending subject with respect to IoT…”
Get full text
Journal Article -
11
A 3D Image Encryption Algorithm Based on the Chaotic System and the Image Segmentation
ISSN: 2169-3536, 2169-3536Published: Piscataway IEEE 01.01.2020Published in IEEE access (01.01.2020)“… The security analysis shows that the proposed 3D image file encryption algorithm possesses higher security features to preserve the subject and resist conventional attack…”
Get full text
Journal Article -
12
The Improved Hill Encryption Algorithm towards the Unmanned Surface Vessel Video Monitoring System Based on Internet of Things Technology
ISSN: 1530-8669, 1530-8677Published: Cairo, Egypt Hindawi Publishing Corporation 01.01.2018Published in Wireless communications and mobile computing (01.01.2018)“…Depending on the actual demand of maritime security, this paper analyzes the specific requirements of video encryption algorithm for maritime monitoring system…”
Get full text
Journal Article -
13
Tu-vera: An Encryption Algorithm Using Propositional Logic Calculus
ISSN: 2574-8254, 2574-8270Published: Riga IGI Global 01.04.2018Published in International journal of smart education and urban society (01.04.2018)“…This article describes how the encryption algorithm (called Tu-vera) depends on the transformation of a phrase written in English into a sequence of propositional logic formulas which can be understand by a human receiver…”
Get full text
Journal Article -
14
A new character-level encryption algorithm: how to implement cryptography in an ICT classroom
ISSN: 2013-6374, 2014-5349, 2013-6374Published: JOTSE: Journal of technology and science education 2019Published in Journal of Technology and Science Education (2019)“…It is evident that the society in which we live will demand more and more qualified and specialized positions in the different branches of engineering. Now we…”
Get full text
Journal Article -
15
Symmetric Encryption Algorithm for RFID Systems Using a Dynamic Generation of Key
ISSN: 1694-0814, 1694-0784Published: Mahebourg International Journal of Computer Science Issues (IJCSI) 31.01.2018Published in International journal of computer science issues (31.01.2018)“…The security of RFID systems come to be a major subject today, notably for low cost RFID tags…”
Get full text
Journal Article -
16
A scrambling and encryption algorithm for selective block of identification photo
ISSN: 2472-7628Published: IEEE 01.10.2016Published in International Conference on Wireless Communications and Signal Processing (01.10.2016)“… Therefore, the key point is to distinguish the face details and background details accurately and to design an encryption algorithm with huge key space and sensitivity key…”
Get full text
Conference Proceeding -
17
Privacy protection against attack scenario of federated learning using internet of things
ISSN: 1751-7575, 1751-7583Published: Taylor & Francis 02.09.2023Published in Enterprise information systems (02.09.2023)“… Simultaneously, numerous attack methods and classifications of federated learning systems are examined, as well as the distinctions between different federated learning encryption algorithms…”
Get full text
Journal Article -
18
Security-enhanced watermark embedding and transmission based on synchronized chaotic semiconductor lasers
ISSN: 0924-090X, 1573-269XPublished: Dordrecht Springer Netherlands 01.02.2023Published in Nonlinear dynamics (01.02.2023)“…) subject to identical injection from a driving laser (DL). In this proposed system, the chaotic signal from DL can be optimized after passing through a phase modulator…”
Get full text
Journal Article -
19
Strategies for Optimizing the Integration of Student Management and Curriculum Education Resources in Colleges and Universities Supported by Cloud Computing Platforms
ISSN: 2444-8656, 2444-8656Published: Beirut Sciendo 01.01.2025Published in Applied mathematics and nonlinear sciences (01.01.2025)“… Using encryption algorithms to design the secure storage function of educational resources, and designing the scheduling function of educational resources using cloud computing virtualization technology…”
Get full text
Journal Article -
20
Triple Layered Encryption Algorithm for IEEE 802.11 WLANs in E-Government Services
ISSN: 2074-9090, 2074-9104Published: Hong Kong Modern Education and Computer Science Press 02.09.2013Published in International journal of computer network and information security (02.09.2013)“… to move from one place to another within offices while maintaining connectivity with the network. However, government organizations are subject to strict security policies and other compliance requirements…”
Get full text
Journal Article