Search Results - (( developing does encryption algorithm ) OR ( java application need algorithm ))

Refine Results
  1. 1

    Secret channel using video steganography by Lee, Kar Yee, Chuah, Chai Wen

    Published 2017
    “…Most of the steganography software such as DeEgger Embedder and OurSecret does not have encryption algorithm to preserve the confidentiality for the secret message. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Reconstructing applicable chaotic Baptista-type symmetric cryptosystem by Daud, Muhamad Azlan

    Published 2014
    “…This recommended encryption algorithm also overcomes the flaw in Ariffin’s encryption procedure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Advanced Encryption Standard Mobile Application to Improve College Entrance Security in UNIMAS by Azlina, Ahmadi Julaihi, Ping Ping, Tan, Fateen Afeefa, Md Nor

    Published 2022
    “…This paper implements improved entrance security with the Advanced Encryption Standard (AES) algorithm. In addition, this solution also ensures the confidentiality of the visitors’ data. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  4. 4

    An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography by Abomhara, Mohamed, Khalifa, Othman Omran, Zaidan , A. A., Zaidan , B. B., Zakaria, Omar, Gani, Abdullah

    Published 2011
    “…This paper presents an efficient and effective framework for the design and development of enhanced selective video encryption scheme for H.264/AVC based on advanced encryption standard (AES). …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Advanced Encryption Standard Mobile Application to Improve College Entrance Security in UNIMAS by Azlina, Ahmadi Julaihi, Ping Ping, Tan, Fateen Afeefa, Md Noor

    Published 2022
    “…This paper implements improved entrance security with the Advanced Encryption Standard (AES) algorithm. In addition, this solution also ensures the confidentiality of the visitors’ data. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): selective cryptography by Abomhara, Mohamed, Khalifa, Othman O., Zaidan, A.A., Zaidan, B.B., Zakaria, Omar, Gani, Abdullah

    Published 2011
    “…This paper presents an efficient and effective framework for the design and development of enhanced selective video encryption scheme for H.264/AVC based on advanced encryption standard (AES). …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Analysis of image steganography using AES / Nur Amira Muhamad Ghazali by Muhamad Ghazali, Nur Amira

    Published 2020
    “…In this project, we combine the method of cryptography and steganography using Advanced Encryption Standard (AES) and Least Significant Bits (LSB) algorithms. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Performance Analysis of Advanced Encryption Standards for Voice Cryptography with Multiple Patterns by Hazzaa F., Qashou A., Al Barazanchi I.I., Sekhar R., Shah P., Bachute M., Abdulbaqi A.S.

    Published 2025
    “…This work will be exploited in our upcoming research to enhance AES performance by developing new encryption algorithm. ? 2024 The authors.…”
    Article
  9. 9
  10. 10

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Driving school student management system by Tengku Diyana, Tengku Ibrahim

    Published 2005
    “…The ways the company manage their business are too complicated.Worst case comes when there are like a hundred of student to be managed in an hour, while the company Is currently short of workers to find each customer document to be updated.As a result,a system needs to be developed to replace the current system and enhance the company's performance of management.Driving School Student Management System is proposed to handle this job.The system is developed to handle the process of secured login using Rijndael symmetric encryption algorithm,registering new student,searching a student profile and also searching for student progress to be updated using simple linear sequential search algorithm.The expected result from this system is to get the correct output for each function and system is robust and free of error.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
    Get full text
    Get full text
    Thesis
  15. 15

    Implementation and integration of HF messaging system with cryptographic features by Mat Sidek, Abd. Rahim

    Published 2006
    “…This system is suitable for the people at remote areas and sea where the communication infrastructure does not exist. In order to keep information secured while transmission, the system was incorporated with cipher algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Secure lightweight client for cloud-based E-Health Model by Zhang, Xiaowei

    Published 2023
    “…The error between the calculated NSSP values and the measured NSSA values does not exceed 5%. The results of this study will remarkably facilitate the development of a practical secure cloud-based eHealth system.…”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project
  19. 19
  20. 20