Search Results - (( java segmentation using algorithm ) OR ( using classical encryption algorithm ))

  • Showing 1 - 18 results of 18
Refine Results
  1. 1
  2. 2

    Encrypting text data using elliptic curve cryptography by Ali, Abas Abdullahi

    Published 2018
    “…Elliptic curve cryptography has been proven to be secure and requires small key sizes in comparison to the well-known and most used cryptographic algorithms. In this study, a new approach is proposed to enhance the performance of the encryption which means eliminating classic mapping techniques. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Investigation of data encryption algorithm for secured transmission of electrocardiograph (ECG) signal by Shaikh, Muhammad Umair, Ahmad, Siti Anom, Wan Adnan, Wan Azizun

    Published 2018
    “…The security and privacy features of the system protect the authenticity and confidentiality of the patient's medical data and are implemented using security enhancing techniques. This problem will be solved by encrypting the signals, using the proposed fully homomorphic encryption (FHE) technique. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…Value of random number should be greater than 35 bits and plaintext must be at least 7 bits. A padding algorithm was used for small size messages or big random numbers. …”
    Get full text
    Get full text
    Article
  6. 6

    A review on multimedia communications cryptography by Salem, Yasser, Abomhara, Mohamed, Khalifa, Othman Omran, Zaidan, Aos Alaa, Zaidan, Bilal Bahaa

    Published 2011
    “…This study will presents the currently algorithm of multimedia encryption schemes that have been proposed in the literature and description the effectiveness of the multimedia security. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Suitability of using symmetric key to secure multimedia data: an overview, by Abomhara, Mohamed, Khalifa, Othman Omran, Zakaria, Omar, Zaidan, A. A., Zaidan, B. B., Alanazi, Hamdan O.

    Published 2010
    “…This study addresses the current algorithm of multimedia encryption schemes that have been proposed in the literature and description of multimedia security. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…Finally, the algorithm found, which would solve the image segmentation problem.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Cryptanalysis using biological inspired computing approaches by Ahmad, Badrisham, Maarof, Mohd. Aizaini

    Published 2006
    “…Cryptography is a technique to conceal information by means of encryption and decryption while cryptanalysis is used to break the encrypted information using some methods. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  12. 12

    Feasibility of quantum cryptography with AES for secure communication by Mustaffa, Nurul Muzfirah, Mat Daud, Nurulain Balqis, Sase, Takumi

    Published 2026
    “…Traditional encryption techniques face serious threats from the rapid development of quantum computing, which could soon compromise many classical algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13
  14. 14

    A comparative review on symmetric and asymmetric dna-based cryptography by Hammad B.T., Sagheer A.M., Ahmed I.T., Jamil N.

    Published 2023
    “…In the present work, we made use of DNA in cryptographic, i.e. its storing capabilities (superior information density) and parallelism, in order to improve other classical cryptographic algorithms. …”
    Article
  15. 15

    Proposed method for enhancing quantum bit error rate using quantum key distribution technique by Abubakar, M.Y., Jung, L.T., Zakaria, N.M., Foong, O.M.

    Published 2014
    “…Therefore this high error rate needs to be reduced for better security using two channels qkd. With the current emergence of quantum computers many security algorithm that could take classical computer years to break could now be broken in matter of seconds. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17

    Efficiency analysis for public key systems based on fractal functions. by M. G. AL-Saidi, Nadia, Md. Said, Mohamad Rushdan, M. Ahmed, Adil

    Published 2011
    “…The algorithm is implemented and compared to the classical one, to verify its efficiency and security. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Simulation of quantum growing network / Ong Boon Teong by Ong , Boon Teong

    Published 2003
    “…Should it be possible to build a microprocessor which fully exploits quantum mechanics then it may be possible to carry out such factorisations in remarkably less time. The RSA algorithm, a widely used encryption system, is safe only if such factorisations cannot be performed quickly. …”
    Get full text
    Get full text
    Thesis