Search Results - (( evolution information encryption algorithm ) OR ( java segmentation mining algorithm ))
Search alternatives:
- information encryption »
- evolution information »
- segmentation mining »
- java segmentation »
- mining algorithm »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
Published 2012“…In addition, it uses two keys to encryption and decryption. However, this method needs to be develops and supports the protection of information. …”
Get full text
Get full text
Get full text
Thesis -
3
Comparison of ECC and RSA algorithms in IOT devices
Published 2019Get full text
Get full text
Article -
4
Systematic literature review: Trend analysis on the design of lightweight block cipher
Published 2024journal::journal article -
5
Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain
Published 2017“…In encryption, sensitive information transforms into meaningless data with observable existence, while steganography embeds the secret information inside an object (i.e. image, video, text, and audio) with invisible existence. …”
Get full text
Get full text
Get full text
Thesis
