Search Results - ((extraction algorithm) OR (encryption algorithm))
Search alternatives:
- extraction algorithm »
-
1
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…The Hybrid Cube Encryption Algorithm (HiSea) has been implemented to validate the encryption keys that are generated from the proposed algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
A shift column different offset for better Rijndael security
Published 2009“…The secrecy of an encryption algorithm is measured in terms of the computational power and time required to extract the secret key. …”
Get full text
Get full text
Get full text
Article -
3
An enhanced color image encryption algorithm using LT-PRNG
Published 2018“…Several chaos-based image encryption algorithms use low-dimension chaos as the encryption tools. …”
Get full text
Get full text
Thesis -
4
New Cryptographic Algorithms for Enhancing Security of Voice Data
Published 2010“…The proposed solution consists of a simple, but strong encryption/decryption algorithm as well as an embedded method to exchange the keys between the users. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
On the Computational Cost of Cocks’ Identity Based Encryption
Published 2018“…Unfortunately, lack of efficiency becomes a major drawback of the Cocks’ Identity Based Encryption. The algorithms in Cocks’ Identity Based Encryption consists of four stages: Setup, Extract, Encrypt and Decrypt. …”
Get full text
Get full text
Article -
6
Doctor-patient remote consultation system with secure medical images
Published 2022“…The result was recorded including the run time and encrypted image size. The final selection of the algorithms depended on the encryption size and computation speed. …”
Get full text
Get full text
Get full text
Academic Exercise -
7
Key generation technique based on triangular coordinate extraction for hybrid cubes
Published 2017“…In this study, we extend the hybrid cube encryption algorithm (HiSea) and our earlier Triangular Coordinate Extraction (TCE) technique for HC by increasing the complexity in the mathematical approaches. …”
Get full text
Get full text
Article -
8
Securing Data Using Deep Hiding Selected The Least Significant Bit And Adaptive Swarm Algorithm
Published 2024journal::journal article -
9
Two-Phases QR Authentication Algorithm (2PQRA) for Digital Energy and IoT Applications
Published 2023Conference Paper -
10
Chaotic encryption scheme for colour Image using 3D lorenz chaotic map and 3D chen system
Published 2024“…Chaos-based image encryption system is an encryption method that uses chaotic systems in encrypting digital images for the purpose of enhancing security. …”
Get full text
Get full text
Get full text
Article -
11
-
12
An improved wavelet digital watermarking software implementation
Published 2011“…Modification was made to the algorithms where only selected matching subbands were used in embedding and extracting the watermark in this improved method. …”
Get full text
Get full text
Get full text
Book Chapter -
13
A new secure storing system for biometric templates based encryption and concealment
Published 2015“…The Hill Cipher algorithm has been improved to be more secure by using a large and random key with large data block and also extending it to include the special characters. …”
Get full text
Get full text
Get full text
Article -
14
RENTAKA: A novel machine learning framework for crypto-ransomware pre-encryption detection
Published 2022“…Crypto ransomware is malware that locks its victim’s file for ransom using an encryption algorithm. Its popularity has risen at an alarming rate among the cyber community due to several successful worldwide attacks. …”
Get full text
Get full text
Get full text
Article -
15
Anti-forensic steganography method based on randomization
Published 2013“…First, the secret information are encrypted using Rijndael Encryption Algorithm. Then, the cover image is divided into several matrices. …”
Get full text
Get full text
Get full text
Article -
16
A true random number generator for crypto embedded systems
Published 2006“…Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES. …”
Get full text
Get full text
Article -
17
Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing
Published 2022“…Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Encryption selection for WLAN IEEE802.11G
Published 2013“…Meanwhile for encryption algorithms, the data was encrypted using Kryptel, an encryption freeware. …”
Get full text
Get full text
Thesis -
19
Fusion of license plate and face recognition for secure parking / Siti Salwa Md Noor
Published 2013“…The methodology proposed is based on algorithms tested for feature extraction of plate and face recognition based on unconstrained minimum average correlation energy (UMACE) filter. …”
Get full text
Get full text
Thesis -
20
Performance evaluation for different data encryption algorithms on wireless sensor network (WSN)
Published 2018“…AES algorithm shows the highest encrypted data size which is with above 234214 bytes. …”
Get full text
Get full text
Get full text
Get full text
Thesis
