Search Results - (( java implementation using algorithm ) OR ( using matlab encryption algorithm ))
Search alternatives:
- implementation using »
- java implementation »
- using algorithm »
-
1
Encryption selection for WLAN IEEE802.11G
Published 2013“…Meanwhile for encryption algorithms, the data was encrypted using Kryptel, an encryption freeware. …”
Get full text
Get full text
Thesis -
2
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…Hence, this study aims to improve the limitations found in the existing chaotic-based encryption algorithms for FTP by improving its encryption speed using Henon and Logistic map. …”
Get full text
Get full text
Get full text
Article -
3
Data hiding in medical images using encryption and steganography techniques
Published 2019“…In this paper, for the sender side, the secret text will be encrypted using Advanced Encryption Standard algorithm and embedded into the chosen cover image using Least Significant Bit algorithm for more security. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
4
IoT data encryption algorithm for security
Published 2020Get full text
Get full text
Get full text
Get full text
Thesis -
5
Image steganography for encryption over network security
Published 2017“…The technique studied in this thesis aims to transmit data without losing the quality of cover image and to improve image steganography using MATLAB. To achieve this goal, Least Significant Bit (LSB) algorithm is used for data encoding and decoding. …”
Get full text
Get full text
Student Project -
6
Analysis of avalanche effect on advance encryption standard by using dynamic S-Box depends on rounds keys
Published 2014“…Substitution table or S-Box is the major core of AES algorithm and it is used to provide confusion capability for AES. …”
Get full text
Get full text
Conference or Workshop Item -
7
Enhancing selective encryption for H.264/AVC using advanced encryption standard
Published 2010“…The system is implemented by using Matlab.…”
Get full text
Get full text
Get full text
Article -
8
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
9
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…The performance of the recommended approach makes it possible to thwart an attack using brute force considerably more fast than is possible with the encryption technologies that are currently in use. …”
Get full text
Get full text
Get full text
Thesis -
10
Implementation of hashed cryptography algorithm based on cryptography message syntax
Published 2019“…This design and simulation research is conducted in CMC network security (message encryption context). The design will use MATLAB encryption to show simulation. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
An enhanced fingerprint template protection scheme
Published 2022“…Furthermore, an improved chaos-based encryption algorithm was proposed for encrypting FT. …”
Get full text
Get full text
Thesis -
12
Image compression and encryption
Published 2003“…Thereafter, the chosen image was compressed and finally, encrypted. In this project, the RC4 encryption algorithm has been used. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
14
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
15
EffectiveWatermarking of Digital Audio and Image using Matlab Technique
Published 2009Get full text
Get full text
Book Section -
16
Analysis of image steganography using AES / Nur Amira Muhamad Ghazali
Published 2020“…The project is developed using Matlab software.…”
Get full text
Get full text
Thesis -
17
Implementation of a Symmetric Chaotic Encryption Scheme
Published 2004“…The implementation ofthis scheme is specified to do real time processing ofvoice data. It can also be used to read, encrypt and write a wave file. The entire system is implemented, tested and validated using MATLAB and Visual C++. …”
Get full text
Get full text
Final Year Project -
18
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
19
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
20
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book
