Search Results - addition _ (difference OR different) ((detection algorithm) OR (encryption algorithm))
-
1
Error concealment technique using wavelet neural network for wireless transmitted digital images
Published 2012“…The goal behind this scheme is to detect invisible patches that are either occurred in a dusky areas of the image or have been deliberately hidden during the encryption process. …”
Get full text
Get full text
Thesis -
2
Reusable data-path architecture for encryption-then-authentication on FPGA
Published 2023“…Reuse of resources or identical functions however require controllers that enable sharing of data path that can also has different �rounds� of transforms required for different modes either PHOTON or LED in this case, in addition to controllers for individual algorithm. …”
Article -
3
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…All of those encryption algorithms are classified as asymmetric and symmetric algorithms. …”
Get full text
Get full text
Thesis -
4
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…In addition, Triple Data Encryption Standard (3DES) was also simulated as the encryption algorithm to compare the speedup performance with AES encryption.…”
Get full text
Get full text
Thesis -
5
The Performance of the 3DES and Fernet Encryption in Securing Data Files
Published 2024journal::journal article -
6
The performance of the 3DES and Fernet encryption in securing data files
Published 2024“…In addition, this study evaluates the temporal efficiency for the encryption process. …”
Get full text
Article -
7
Enhancing performance of XTS cryptography mode of operation using parallel design
Published 2009“…In addition, the parallel XTS mode was also simulated using Twofish and RC6 encryption algorithms. …”
Get full text
Get full text
Thesis -
8
Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain
Published 2017“…For security aspect, the robustness against steganalysis detection attacks evaluated by RS, pixel difference histogram, and bit-plane analysis. …”
Get full text
Get full text
Get full text
Thesis -
9
Securing Data Using Deep Hiding Selected The Least Significant Bit And Adaptive Swarm Algorithm
Published 2024journal::journal article -
10
The performance of the 3DES and fernet encryption in securing data files
Published 2024“…In addition, this study evaluates the temporal efficiency for the encryption process. …”
Get full text
Get full text
Get full text
Article -
11
Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map
Published 2023“…The study provides a new chaos-based method and extends the application of the probabilistic approach to the domain of symmetric key image encryption. Permutation and substitution approaches of image encryption were deployed to address the issue of images volume and differing sizes. …”
Get full text
Get full text
Get full text
Article -
12
An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices
Published 2017“…To ensure higher security level, the developed system is implemented using the NIST-certified XTS-AES block encryption algorithm. Other storage encryption algorithms, i.e. …”
Get full text
Get full text
Get full text
Thesis -
13
Performance evaluation for different intrusion detection system algorithms using machine learning
Published 2018“…The objectives of this project is to evaluate the performance of various intrusion detection algorithms based on machine learning. The algorithms considered are the Naive Bays Algorithm, Decision Tree Algorithm and Hybrid Algorithm for different datasets. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. …”
Get full text
Get full text
Get full text
Article -
15
-
16
OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA
Published 2004“…The demand for efficient and secure ciphers has given rise to a new generation of block ciphers capable of providing increased protection at lower cost. Among these new algorithms is Twofish. Twofish is a promising 128-bit block which was one of the 5 finalists in the National Institute of Standards and Technology organized competition as the Advanced Encryption Standard. …”
Get full text
Get full text
Final Year Project -
17
Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA
Published 2013“…For an effective storage encryption implementation, two well known methods are software based encryption and hardware based encryption. …”
Get full text
Get full text
Thesis -
18
-
19
Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis
Published 2024“…The Rivest-Shamir-Adleman (RSA) algorithm, known for its slow single-precision multiplication (spm) and overall running time, is not commonly employed to encrypt user data directly. …”
Get full text
Get full text
Get full text
Article -
20
Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis
Published 2024“…The Rivest-Shamir-Adleman (RSA) algorithm, known for its slow single-precision multiplication (spm) and overall running time, is not commonly employed to encrypt user data directly. …”
Get full text
Get full text
Get full text
Article
