Search Results - (( developing image compression algorithm ) OR ( java data encryption algorithm ))
Search alternatives:
- developing image »
- compression »
- java »
-
1
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…ECC, AES, and RSA algorithms will be used to encrypt the files to enhance security data on the cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
3
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…This research hopes to give a clear idea to the readers about ABS algorithm. Further research about this topic is recommended to increase the efficiency of ABS algorithm implemented in communication field, so that more different types of field can be encrypted and decrypted instead of plaintext.…”
Get full text
Get full text
Undergraduates Project Papers -
5
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
6
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
7
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
Get full text
Get full text
Conference or Workshop Item -
8
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
9
Compressing Images Using Multi-Level Wavelet Transform Algorithm (MWTA)
Published 2012“…This study aims to use Wavelet Transform Algorithm for image compression. Multi-levels were used in this study with the aim to produce better results for compressing images.The Multi-level Wavelet Transform Algorithm (MWTA) consists of three phases namely, first level compression, second level compressing in the first level, and algorithm validation by compare.Therefore, Vaishnavi method is used to design and develop the prototype model.In this study, the experiment was conducted using different images (RGB). …”
Get full text
Get full text
Get full text
Thesis -
10
A Comparative Study on Compression of Different Image File Formats
Published 1999“…In this project, an image compression format and algorithm has been analyses. …”
Get full text
Get full text
Thesis -
11
Enhancement of medical image compression algorithm in noisy WLANS transmission
Published 2018“…Advances in telemedicine technology enable rapid medical diagnoses with visualization and quantitative assessment by medical practitioners.In healthcare and hospital networks,medical data exchange-based wireless local area network (WLAN) transceivers remain challenging because of their growing data size,real-time contact with compressed images,and range of bandwidths requiring transmission support.Prior to transmission,medical data are compressed to minimize transmission bandwidth and save transmitting power.Researchers address many challenges in improving performance of compression approaches.Such challenges include energy compaction, computational complexity,high entropy value,drive low compression ratio (CR) and high computational complexity in real-time implementation.Thus,a new approach called Enhanced Independent Component Analysis (EICA) for medical image compression has been developed to boost compression techniques;which transform the image data by block-based Independent Component Analysis (ICA).The proposed method uses Fast Independent Component Analysis (FastICA) algorithm followed by developed quantization architecture based zero quantized coefficients percentage (ZQCP) prediction model using artificial neural network. …”
Get full text
Get full text
Get full text
Thesis -
12
Measuring the performance of image data by using RLE algorithm in lossless compression technique
Published 2015“…In the research, there are one technique that will selected for this problem which is Run-Length Encoding algorithm. From this technique, it will be develop the high quality of data by reducing the size of image but give a high quality of image. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Undergraduates Project Papers -
13
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
14
Image compression and decompression techniques for future application in transmission to remote monitoring center using telephone network: software development / Alwi Hasrat
Published 1995“…This thesis proposes a software development of image data compression and decompression techniques. …”
Get full text
Get full text
Thesis -
15
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
16
-
17
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
18
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…ECC encrypts and transfers the private keys as AES private keys in the proposed scheme, while AES encrypts the plain text (communication data). …”
Get full text
Get full text
Thesis -
19
WAVELET-DCT BASED IMAGE CODER FOR VIDEO CODING APPLICATIONS
Published 2007“…It is proved that the algorithm has better compression performance for difference images compared to conventional DCT. …”
Get full text
Get full text
Final Year Project -
20
Learning Algorithm effect on Multilayer Feed Forward Artificial Neural Network performance in image coding
Published 2007“…One of the essential factors that affect the performance of Artificial Neural Networks is the learning algorithm. The performance of Multilayer Feed Forward Artificial Neural Network performance in image compression using different learning algorithms is examined in this paper. …”
Get full text
Get full text
Get full text
Article
