Search Results - (( java implication tree algorithm ) OR ( data extraction encryption algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube by Mushtaq, Muhammad Faheem

    Published 2019
    “…The Hybrid Cube Encryption Algorithm (HiSea) has been implemented to validate the encryption keys that are generated from the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    A shift column different offset for better Rijndael security by Mahmod, Ramlan, Ali, Sherif Abdulbari, Abd Ghani, Abdul Azim

    Published 2009
    “…The secrecy of an encryption algorithm is measured in terms of the computational power and time required to extract the secret key. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Doctor-patient remote consultation system with secure medical images by Teh, Yee Heng

    Published 2022
    “…But, multimedia data such as video, audio and image are the example of data which are harder to be encrypted. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  5. 5
  6. 6

    Key generation technique based on triangular coordinate extraction for hybrid cubes by Mushtaq, Muhammad Faheem, Jamel, Sapiee, Mohamad, Kamaruddin Malik, Ahmad Khalid, Shamsul Kamal, Mat Deris, Mustafa

    Published 2017
    “…In this study, we extend the hybrid cube encryption algorithm (HiSea) and our earlier Triangular Coordinate Extraction (TCE) technique for HC by increasing the complexity in the mathematical approaches. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    A new secure storing system for biometric templates based encryption and concealment by Khalaf, Emad Taha, Norrozila, Sulaiman

    Published 2015
    “…This study proposes a novel approach that combines an improved encryption method with a new concealment technique to establish a secure data template storing system. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Anti-forensic steganography method based on randomization by Khalaf, Emad Taha, Norrozila, Sulaiman, Mohammed, Muamer N.

    Published 2013
    “…First, the secret information are encrypted using Rijndael Encryption Algorithm. Then, the cover image is divided into several matrices. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing by Hameed, Mustafa Emad

    Published 2022
    “…The noise cancellation of the ECG signal is critical for accurate extraction of useful heart data from ECG. Additionally, the continuous flow of signals may lead to a sheer increase in the volume of the data, the ECG data needs a large memory storage device. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A novel and high capacity audio steganography algorithm based on adaptive data embedding positions by Shahadi H.I., Jidin R., Way W.H.

    Published 2023
    “…Comparisons with the related audio steganography algorithms also show that our proposed scheme outperforms all the selected algorithms. © Maxwell Scientific Organization, 2014.…”
    Article
  15. 15

    Secure lightweight client for cloud-based E-Health Model by Zhang, Xiaowei

    Published 2023
    “…This algorithm verifies the identity and permission of non-group members to meet the strict privacy protection requirements of EHRs data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    The Rise of Blockchain Internet of Things (BIoT): Secured, Device-to-Device Architecture and Simulation Scenarios by Arun Rana, Sharad Sharma, Kashif Nisar, Ag. Asri Ag. Ibrahim, Sachin Dhawan, Bhawani Chowdhry, Samreen Hussain, Nitin Goyal

    Published 2022
    “…As a result, to deliver acceptable services, a new solution is necessary to secure data accountability, increase data privacy and accessibility, and extract hidden patterns and usable knowledge. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Fractal coding of bio-metric image for face authentication by Ahadullah, Md

    Published 2021
    “…The thesis also compares the results of enough images of various sizes generated by the proposed algorithms with the results of other fractal coding methods to confirm the algorithms’ clarity, reliability and validity. …”
    Get full text
    Get full text
    Thesis
  20. 20