Search Results - (( image implementation rsa algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- image implementation »
- implementation rsa »
- java application »
- rsa algorithm »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016“…In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
Get full text
Get full text
Conference or Workshop Item -
2
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…Performance has always been the most critical characteristic of a cryptographic algorithm, which determines its effectiveness. In this research the most popular and used algorithm, which is RSA, is implemented with a new modification in order to reduce the calculation time of the algorithm. …”
Get full text
Get full text
Thesis -
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
4
A study of watermarking methods in medical application
Published 2004“…The three methods of medical image watermarking that have been studied are Least Significant Bit (LSB), Rivest, Shamir and Adleman (RSA) encryption and decryption with LSB, RSA encryption and decryption with feature-based. …”
Get full text
Get full text
Thesis -
5
Two-stage feature selection using ranking self-adaptive differential evolution algorithm for recognition of acceleration activity
Published 2018“…Consequently, this paper proposes a ranking self-adaptive differential evolution (rsaDE) feature selection algorithm. The proposed algorithm is capable of selecting the optimal feature subsets while improving the recognition of acceleration activity using a minimum number of features. …”
Get full text
Get full text
Get full text
Article -
6
Partial encryption of compressed images employing FPGA
Published 2005“…The compression algorithm decomposes images into several different parts. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…Many past studies proposed fingerprint template protection (FTP) using chaotic-based encryption algorithms that are more suitable to secure images than conventional encryption such as DES, AES, and RSA. …”
Get full text
Get full text
Get full text
Article -
8
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis
