Search Results - (( based encryption based algorithm ) OR ( data optimization method algorithm ))
Search alternatives:
- data optimization »
- encryption based »
- method algorithm »
-
1
An efficient secure ECG compression based on 2D-SPIHT and SIT algorithm
Published 2017“…Encrypting successfully produced encrypted data that is highly different data compared to original data. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…The purpose of this thesis is to introduce and demonstrate a new algorithm for Internet and e-mail security. The proposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
Get full text
Get full text
Thesis -
3
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…Then, this study aims to optimize the hyperparameters of the developed DNN model using the Arithmetic Optimization Algorithm (AOA) and, lastly, to evaluate the performance of the newly proposed deep learning model with Simulated Kalman Filter (SKF) algorithm in solving image encryption application. …”
Get full text
Get full text
Thesis -
4
Breaking A Playfair Cipher Using Single and Multipoints Crossover Based on Heuristic Algorithms
Published 2023Conference Paper -
5
New approach of cryptography algorithm for e- mail applications
Published 2005“…The purpose of this paper is to introduce and demonstrate a new algorithm for Internet and e-mail security. The purposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
Get full text
Get full text
Conference or Workshop Item -
6
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Conference or Workshop Item -
7
Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA
Published 2013“…This standard uses AESXTS as a building block for the protection of data. For an effective storage encryption implementation, two well known methods are software based encryption and hardware based encryption. …”
Get full text
Get full text
Thesis -
8
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Get full text
Article -
9
Secured dynamic request scheduling and optimal CSP selection for analyzing cloud service performance using intelligent approaches
Published 2023“…We suggested a chaotic map-based camellia encryption algorithm (CMCE) to boost security. …”
Get full text
Get full text
Get full text
Article -
10
-
11
Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain
Published 2017“…In general, high capacity based methods i.e. LSB substitution, employed the multi-bit-planes for concealing the secret data that eventually modify the cover pixel values and becomes more prominent although human vision are not able to identify those changes. …”
Get full text
Get full text
Get full text
Thesis -
12
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
Published 2006“…The purpose of this project is to implement FPGA Base Encryption Chip using DES algorithm. Throughout the project, the suitability of the implementation DES algorithm in FPGA will be investigated. …”
Get full text
Get full text
Monograph -
13
On the Computational Cost of Cocks’ Identity Based Encryption
Published 2018“…Unfortunately, lack of efficiency becomes a major drawback of the Cocks’ Identity Based Encryption. The algorithms in Cocks’ Identity Based Encryption consists of four stages: Setup, Extract, Encrypt and Decrypt. …”
Get full text
Get full text
Article -
14
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
Published 2008“…With image encryption algorithms, JPEG images can be securely scrambled or encrypted prior to distribution. …”
Get full text
Get full text
Thesis -
15
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
Get full text
Get full text
Get full text
Article -
16
A new image encryption algorithm based on single S-box and dynamic encryption step
Published 2021“…Chaotic-based S-box image encryption schemes promise to be a practical solution for securing digital images. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Experiment -
17
-
18
An enhanced color image encryption algorithm using LT-PRNG
Published 2018“…In this study, a hybrid chaotic map based on logistic map and tent map is proposed for generating a random sequence for enhancing the encryption performance of image encryption algorithms. …”
Get full text
Get full text
Thesis -
19
Enhanced chaotic image encryption algorithm based on Baker's map
Published 2003“…This paper discusses an alternative chaotic image encryption based on Baker’s map. This enhanced symmetric-key algorithm can support a variable-size image as opposed to the algorithm which is mainly based on Baker’s map that requires only square image for encryption. …”
Get full text
Get full text
Article -
20
Image encryption algorithm based on chaotic mapping
Published 2003“…This paper discusses an alternative symmetric-key encryption algorithm for securing images, namely Secure Image Encryption (SIP) that is based on chaos. …”
Get full text
Get full text
Get full text
Article
