Search Results - (( java application based algorithm ) OR ( using matlab encryption algorithm ))
Search alternatives:
-
1
Encryption selection for WLAN IEEE802.11G
Published 2013“…Meanwhile for encryption algorithms, the data was encrypted using Kryptel, an encryption freeware. …”
Get full text
Get full text
Thesis -
2
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…Hence, this study aims to improve the limitations found in the existing chaotic-based encryption algorithms for FTP by improving its encryption speed using Henon and Logistic map. …”
Get full text
Get full text
Get full text
Article -
3
Data hiding in medical images using encryption and steganography techniques
Published 2019“…In this paper, for the sender side, the secret text will be encrypted using Advanced Encryption Standard algorithm and embedded into the chosen cover image using Least Significant Bit algorithm for more security. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
4
IoT data encryption algorithm for security
Published 2020Get full text
Get full text
Get full text
Get full text
Thesis -
5
Image steganography for encryption over network security
Published 2017“…The technique studied in this thesis aims to transmit data without losing the quality of cover image and to improve image steganography using MATLAB. To achieve this goal, Least Significant Bit (LSB) algorithm is used for data encoding and decoding. …”
Get full text
Get full text
Student Project -
6
Analysis of avalanche effect on advance encryption standard by using dynamic S-Box depends on rounds keys
Published 2014“…Substitution table or S-Box is the major core of AES algorithm and it is used to provide confusion capability for AES. …”
Get full text
Get full text
Conference or Workshop Item -
7
Enhancing selective encryption for H.264/AVC using advanced encryption standard
Published 2010“…The system is implemented by using Matlab.…”
Get full text
Get full text
Get full text
Article -
8
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…The performance of the recommended approach makes it possible to thwart an attack using brute force considerably more fast than is possible with the encryption technologies that are currently in use. …”
Get full text
Get full text
Get full text
Thesis -
9
Implementation of hashed cryptography algorithm based on cryptography message syntax
Published 2019“…This design and simulation research is conducted in CMC network security (message encryption context). The design will use MATLAB encryption to show simulation. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
An enhanced fingerprint template protection scheme
Published 2022“…Furthermore, an improved chaos-based encryption algorithm was proposed for encrypting FT. …”
Get full text
Get full text
Thesis -
11
Image compression and encryption
Published 2003“…Thereafter, the chosen image was compressed and finally, encrypted. In this project, the RC4 encryption algorithm has been used. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
EffectiveWatermarking of Digital Audio and Image using Matlab Technique
Published 2009Get full text
Get full text
Book Section -
13
Analysis of image steganography using AES / Nur Amira Muhamad Ghazali
Published 2020“…The project is developed using Matlab software.…”
Get full text
Get full text
Thesis -
14
Implementation of a Symmetric Chaotic Encryption Scheme
Published 2004“…The implementation ofthis scheme is specified to do real time processing ofvoice data. It can also be used to read, encrypt and write a wave file. The entire system is implemented, tested and validated using MATLAB and Visual C++. …”
Get full text
Get full text
Final Year Project -
15
Breaking A Playfair Cipher Using Single and Multipoints Crossover Based on Heuristic Algorithms
Published 2023Conference Paper -
16
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
17
An improved wavelet digital watermarking software implementation
Published 2011Get full text
Get full text
Get full text
Book Chapter -
18
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
19
Hybrid Energy Encryption of Wireless Power Transfer Algorithm for Near Field Range
Published 2024thesis::doctoral thesis -
20
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
