Search Results - ((((reconstruction algorithm) OR (extraction algorithm))) OR (encryption algorithm))
Search alternatives:
- extraction algorithm »
-
1
Reconstructing applicable chaotic Baptista-type symmetric cryptosystem
Published 2014“…This recommended encryption algorithm also overcomes the flaw in Ariffin’s encryption procedure. …”
Get full text
Get full text
Get full text
Thesis -
2
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…The Hybrid Cube Encryption Algorithm (HiSea) has been implemented to validate the encryption keys that are generated from the proposed algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Message based random variable length key encryption algorithm.
Published 2009“…Problem statement: A block ciphers provides confidentiality in cryptography but cryptanalysis of the classical block ciphers demonstrated some old weaknesses grabbing a partial key in any stage of encryption procedure leads to reconstructing the whole key. …”
Get full text
Get full text
Article -
4
A shift column different offset for better Rijndael security
Published 2009“…The secrecy of an encryption algorithm is measured in terms of the computational power and time required to extract the secret key. …”
Get full text
Get full text
Get full text
Article -
5
An enhanced color image encryption algorithm using LT-PRNG
Published 2018“…Several chaos-based image encryption algorithms use low-dimension chaos as the encryption tools. …”
Get full text
Get full text
Thesis -
6
Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing
Published 2022“…Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
New Cryptographic Algorithms for Enhancing Security of Voice Data
Published 2010“…The proposed solution consists of a simple, but strong encryption/decryption algorithm as well as an embedded method to exchange the keys between the users. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
On the Computational Cost of Cocks’ Identity Based Encryption
Published 2018“…Unfortunately, lack of efficiency becomes a major drawback of the Cocks’ Identity Based Encryption. The algorithms in Cocks’ Identity Based Encryption consists of four stages: Setup, Extract, Encrypt and Decrypt. …”
Get full text
Get full text
Article -
9
Image compression and encryption
Published 2003“…In this project, the RC4 encryption algorithm has been used. This project utilized MATLAB Wavelet Toolbox Version 6.5 thoroughly for its implementation. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Doctor-patient remote consultation system with secure medical images
Published 2022“…The result was recorded including the run time and encrypted image size. The final selection of the algorithms depended on the encryption size and computation speed. …”
Get full text
Get full text
Get full text
Academic Exercise -
11
Key generation technique based on triangular coordinate extraction for hybrid cubes
Published 2017“…In this study, we extend the hybrid cube encryption algorithm (HiSea) and our earlier Triangular Coordinate Extraction (TCE) technique for HC by increasing the complexity in the mathematical approaches. …”
Get full text
Get full text
Article -
12
Integrated reconstruction of 2D overlapping coronary artery from x-ray angiography with 3D virtual myocardial model using non-rigid iterative closest point algorithm
Published 2019“…This motivates the 3D reconstruction of real coronary arteries superimposed on a 3D virtual heart model using a non-rigid iterative closest point algorithm, which is the focus of this thesis. …”
Get full text
Get full text
Thesis -
13
Fingerprint reconstruction based on improved directional image
Published 2005“…This thesis presents a fingerprint image reconstruction algorithm using Directional Fourier filtering. …”
Get full text
Get full text
Thesis -
14
Securing Data Using Deep Hiding Selected The Least Significant Bit And Adaptive Swarm Algorithm
Published 2024journal::journal article -
15
Extraction and reconstruction of retinal vasculature
Published 2007“…This paper presents the development of an image processing algorithm for detecting and reconstructing retinal vasculature. …”
Get full text
Get full text
Get full text
Citation Index Journal -
16
Reconstruction of Arabic calligraphy by using Wang-Ball curves / Noorehan Awang ... [et al.]
Published 2021“…Rational Wang-ball which is derived from non-rational Wang-ball curves, where it has been proven that a rational Wang-ball curve is a rational Bezier curve of the same degree and vice versa. A recursive algorithm for plotting rational Bezier and Wang-ball is obtained by the de Casteljau and Wang algorithm using homogeneous coordinates and an efficient algorithm for evaluating a rational Wang-ball curve is attained and has a linear time complexity (Dejdumrong et al., 2001). …”
Get full text
Get full text
Monograph -
17
Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper
Published 2016“…This application should constitute the essential processes for a computer to understand the paper sketch junctions, depth and connections. Feature extraction is a preliminary step before 3D reconstruction and therefore, a junction detection algorithm is proposed. …”
Get full text
Get full text
Thesis -
18
Three dimension reconstruction of coronary artery tree using single-view cineangiogram
Published 2010“…Approach: The algorithm has three stages. The first stage is the vessel extraction and labeling for each view for the purpose of constructing the 3D model, while in the second stage, the vessels information (x, y and z) will be saved in a data file to be forwarded to the next stage. …”
Get full text
Get full text
Get full text
Article -
19
A brief review on vessel extraction and tracking methods
Published 2019“…This step is usually performed by enhancing vessel-like objects in the image, in order to differentiate between blood vessels and background, followed by applying the thinning algorithm to obtain the final output. Another approach is direct extraction of centerline points using exploratory tracing algorithm preceded by a seed point detection schema to provide a set of reliable starting points for the tracing algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
20
Error concealment technique using wavelet neural network for wireless transmitted digital images
Published 2012“…In the case, where the missing regions of pixels are containing textures, edges, and other image features that are not easily handled by concealment algorithms. It therefore, necessitated to use denoising rather than EC algorithms. …”
Get full text
Get full text
Thesis
