Search Results - (( evaluate information encryption algorithm ) OR ( java application based algorithm ))
Search alternatives:
- information encryption »
- evaluate information »
- application based »
- java application »
-
1
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
The Performance of the 3DES and Fernet Encryption in Securing Data Files
Published 2024journal::journal article -
3
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…A series of simulations were conducted using MATLAB to evaluate the performance of the proposed chaotic-based encryption algorithm for FTP through different analyses covering key sensitivity, histogram, correlations, differential, information entropy, and encryption/decryption speed. …”
Get full text
Get full text
Get full text
Article -
4
-
5
CleverSecure ONLINE System
Published 2008“…This application also can encrypt the folder that contains the private information such as business plan etc. …”
Get full text
Get full text
Final Year Project -
6
The performance of the 3DES and Fernet encryption in securing data files
Published 2024Get full text
Article -
7
Secure mobile AES encryptor (SMAE)
Published 2016“…The reason the AES encryption algorithm selected is because it is considered as one of the most secure encryption algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
8
Audio encryption and decryption using 3D AES block cipher algorithm / Nur Fattin Nadhrah Saifuddin
Published 2018“…In other and, ADDIE model is a methodology that including analysis, design, development, implementation and evaluation that complete the cycle of the project that starts from get the title of project, survey and collect the information about encryption and decryption, and specify the scope to 3D AES block cipher algorithm.…”
Get full text
Get full text
Thesis -
9
Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map
Published 2023“…Results showed that the algorithm was able to securely protect image data and the private information associated with them, while also making it very difficult for unauthorized users to decrypt the information. …”
Get full text
Get full text
Get full text
Article -
10
A DNA-dynamic permutation-diffusion algorithm for image encryption using scaling chaotification models and advanced DNA operations
Published 2025“…To evaluate the proposed algorithm, extensive experiments have been conducted, and results have been compared with the latest encryption algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
-
12
-
13
Analysis of parabolic antennas for radio telescopes and the development of encryption methods for radio astronomical images
Published 2022“…The proposed algorithms include Development of Bit level Scrambling Encryption for Radio Telescope Imageries, Bit-levels Encryption for RGB Telescope Images, Bit-levels Encryption for RGB Telescope Images, Design of Encryption Algorithm in Combined Spatial and Frequency Domains for Telescope Grayscale and Bayer Images, and Combined Spatial and Frequency Domains in Algorithm of RGB Color Image Security for Telescope Images. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Security in robot operating system (ROS) by using Advanced Encryption Standard (AES)
Published 2018“…In particular, this research focuses on using encryption algorithm which is AES. The encryption algorithm will be evaluated according to the performance of the system, both from computing and communications point of view.…”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
15
An enhanced fingerprint template protection scheme
Published 2022“…Furthermore, an improved chaos-based encryption algorithm was proposed for encrypting FT. …”
Get full text
Get full text
Thesis -
16
Designing New Block Cipher Based On Genetic Algorithm Approach
Published 2024“…In this research also, the algorithm has been tested with NIST Statistical Test suite to evaluate the randomness of the output. …”
Article -
17
Image steganography for encryption over network security
Published 2017“…Image steganography was created to hide any form of information within digital image without being noticed by others to avoid decryption of the hidden information. …”
Get full text
Get full text
Student Project -
18
Two-Phases QR Authentication Algorithm (2PQRA) for Digital Energy and IoT Applications
Published 2023Conference Paper -
19
A block cipher based on genetic algorithm
Published 2016“…In this research also, the algorithm has been tested with NIST Statistical Test suite to evaluate the randomness of the output. …”
Get full text
Get full text
Get full text
Thesis -
20
