Search Results - (( java application learning algorithm ) OR ( using quality encryption algorithm ))

Refine Results
  1. 1

    Cryptography: A New Approach of Classical Hill Cipher by Abdul Rahman, Mohd Nordin, Yusof, Mohd Kamir, Abidin @ Bharun, Ahmad Faisal Amri, Mohamad Usop, Nor Surayati

    Published 2013
    “…Apart from this, the encryption quality of the proposed algorithm is also measured by using the maximum deviation and correlation coefficient factors. …”
    Get full text
    Get full text
    Article
  2. 2

    JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation by Abu, Ahmad Zaidee

    Published 2008
    “…With image encryption algorithms, JPEG images can be securely scrambled or encrypted prior to distribution. …”
    Get full text
    Get full text
    Thesis
  3. 3

    An overview of video encryption techniques by Abomhara, Mohamed, Zakaria, Omar, Khalifa, Othman Omran

    Published 2010
    “…A trade-off between quality of video streaming and choice of encryption algorithm were shown. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    New Cryptographic Algorithms for Enhancing Security of Voice Data by Al-Hazaimeh, Obaida Mohammad Awad

    Published 2010
    “…Finally, the implementation result in this research shows the average time needed to encrypt and decrypt a voice packet size using a proposed algorithm with the long key of 1024-bits is much smaller than AES_Rijndael algorithm with a short key length of 128-bits.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Development of key-dependent dynamic S-Boxes with dynamic irreducible polynomial and affine constant by Agarwal, Praveen, Singh, Amandeep, Kilicman, Adem

    Published 2018
    “…Advanced encryption standard is an encryption algorithm which is widely used to provide security to sensitive information by organizations. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Image steganography for encryption over network security by Maimon, Elmy Fadly

    Published 2017
    “…To achieve this goal, Least Significant Bit (LSB) algorithm is used for data encoding and decoding. The system was implemented using MATLAB platform. …”
    Get full text
    Get full text
    Student Project
  8. 8

    A novel enhancement technique of the hill cipher for effective cryptographic purposes. by Abidin, A.F.A., Chuan, O.Y., Kamel Ariffin, Muhammad Rezal

    Published 2011
    “…Results: A comparative study has been made between the proposed algorithm and the existing algorithms. The encryption quality of the proposed algorithm is also measured by using the maximum deviation factor and correlation coefficient factor. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    Chaos-based simultaneous compression and encryption for Hadoop by Usama, M., Zakaria, N.

    Published 2017
    “…In addition, the proposed approach implements a masking pseudorandom keystream that enhances encryption quality. The proposed algorithm demonstrated a congruent fit within the Hadoop framework, providing robust encryption security and compression. © 2017 Usama, Zakaria. …”
    Get full text
    Get full text
    Article
  12. 12

    Implementation of a Symmetric Chaotic Encryption Scheme by Sivanandan, Easwari

    Published 2004
    “…In this scheme, the author uses the bit swapping technique as the second encryption-decryption level and enhances it with a first level encryption-decryption scheme using the two's compliment overflow nonlinearity encoder-decoder pair. …”
    Get full text
    Get full text
    Final Year Project
  13. 13
  14. 14

    A proposed model for text and image encryption using different techniques by Shawkat S.A., Al-Barazanchi I.

    Published 2023
    “…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
    Article
  15. 15
  16. 16
  17. 17

    Anti-forensic steganography method based on randomization by Khalaf, Emad Taha, Norrozila, Sulaiman, Mohammed, Muamer N.

    Published 2013
    “…First, the secret information are encrypted using Rijndael Encryption Algorithm. Then, the cover image is divided into several matrices. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…In this paper, we introduce an education tool for learning metaheuristic algorithms that allows displaying the convergence speed of the corresponding metaheuristic upon setting/changing the dependable parameters. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis