Search Results - (( java application using algorithm ) OR ( using quality encryption algorithm ))
Search alternatives:
- quality encryption »
- java application »
- using algorithm »
-
1
Cryptography: A New Approach of Classical Hill Cipher
Published 2013“…Apart from this, the encryption quality of the proposed algorithm is also measured by using the maximum deviation and correlation coefficient factors. …”
Get full text
Get full text
Article -
2
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
Published 2008“…With image encryption algorithms, JPEG images can be securely scrambled or encrypted prior to distribution. …”
Get full text
Get full text
Thesis -
3
An overview of video encryption techniques
Published 2010“…A trade-off between quality of video streaming and choice of encryption algorithm were shown. …”
Get full text
Get full text
Get full text
Article -
4
A chaotic neural network based encryption algorithm for MPEG-2 encoded video signal
Published 2012Get full text
Working Paper -
5
New Cryptographic Algorithms for Enhancing Security of Voice Data
Published 2010“…Finally, the implementation result in this research shows the average time needed to encrypt and decrypt a voice packet size using a proposed algorithm with the long key of 1024-bits is much smaller than AES_Rijndael algorithm with a short key length of 128-bits.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Development of key-dependent dynamic S-Boxes with dynamic irreducible polynomial and affine constant
Published 2018“…Advanced encryption standard is an encryption algorithm which is widely used to provide security to sensitive information by organizations. …”
Get full text
Get full text
Get full text
Article -
7
Image steganography for encryption over network security
Published 2017“…To achieve this goal, Least Significant Bit (LSB) algorithm is used for data encoding and decoding. The system was implemented using MATLAB platform. …”
Get full text
Get full text
Student Project -
8
A novel enhancement technique of the hill cipher for effective cryptographic purposes.
Published 2011“…Results: A comparative study has been made between the proposed algorithm and the existing algorithms. The encryption quality of the proposed algorithm is also measured by using the maximum deviation factor and correlation coefficient factor. …”
Get full text
Get full text
Get full text
Article -
9
Security enhancement of digital motion image transmission using hybrid AES-DES algorithm
Published 2023Conference paper -
10
Chaos-based simultaneous compression and encryption for Hadoop
Published 2017“…In addition, the proposed approach implements a masking pseudorandom keystream that enhances encryption quality. The proposed algorithm demonstrated a congruent fit within the Hadoop framework, providing robust encryption security and compression. © 2017 Usama, Zakaria. …”
Get full text
Get full text
Article -
11
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
12
Implementation of a Symmetric Chaotic Encryption Scheme
Published 2004“…In this scheme, the author uses the bit swapping technique as the second encryption-decryption level and enhances it with a first level encryption-decryption scheme using the two's compliment overflow nonlinearity encoder-decoder pair. …”
Get full text
Get full text
Final Year Project -
13
Securing Data Using Deep Hiding Selected The Least Significant Bit And Adaptive Swarm Algorithm
Published 2024journal::journal article -
14
-
15
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
16
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
17
Speech coding techniques and algorithms
Published 2011Get full text
Get full text
Get full text
Book Chapter -
18
-
19
Anti-forensic steganography method based on randomization
Published 2013“…First, the secret information are encrypted using Rijndael Encryption Algorithm. Then, the cover image is divided into several matrices. …”
Get full text
Get full text
Get full text
Article -
20
Secured route optimization in mobile IPv6 wireless networks in terms of data integrity
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm at a cost of a small increase in delay. …”
Get full text
Get full text
Conference or Workshop Item
