Search Results - differential ((((extraction algorithm) OR (encryption algorithm))) OR (selection algorithm))

Search alternatives:

Refine Results
  1. 1
  2. 2

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…Long and variable key length made key exhaustive search and differential attack impossible. None fixed size key caused avoidance of replaying and other attacks that can happen on fixed sized key algorithms. …”
    Get full text
    Get full text
    Article
  3. 3

    Dynamic determinant matrix-based block cipher algorithm by Juremi, Julia

    Published 2018
    “…The performance analysis in terms of processing speed of the encryption and decryption process of the DDBC algorithm shows minimal differences in both AES and DDBC algorithm despite of the difference method of transformation used in both algorithms. …”
    Get full text
    Get full text
    Thesis
  4. 4

    An enhanced fingerprint template protection scheme by Siswanto, Apri

    Published 2022
    “…The results demonstrate that the enhanced chaos-based encryption algorithm for FTP improves its encryption time, which is 0.24 seconds faster than the selected benchmark study. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A Comparison Of The Different Algorithms For Essential Tremor And Parkinson’s Disease Tremor Differentiation Based On Hand Tremor by Boey, Keen Huang

    Published 2018
    “…The distribution of features extracted from each algorithm was tested with Mann Whitney U test, and the sensitivity, specificity and accuracy for each algorithms in correctly classify ET patients were analysed using receiver operating curves (ROC). …”
    Get full text
    Get full text
    Monograph
  6. 6

    A Chaos-Based Substitution Box (S-Box) Design with Improved Differential Approximation Probability (DP) by Khan, M.A., Ali, A., Jeoti, V., Manzoor, S.

    Published 2018
    “…Substitution box is a vital and the only nonlinear component of modern encryption algorithm. S-box is introduced as a confusion component to resist against differential cryptanalysis. …”
    Get full text
    Get full text
    Article
  7. 7

    A Chaos-Based Substitution Box (S-Box) Design with Improved Differential Approximation Probability (DP) by Khan, M.A., Ali, A., Jeoti, V., Manzoor, S.

    Published 2018
    “…Substitution box is a vital and the only nonlinear component of modern encryption algorithm. S-box is introduced as a confusion component to resist against differential cryptanalysis. …”
    Get full text
    Get full text
    Article
  8. 8

    A novel image encryption using an integration technique of blocks rotation based on the Magic cube and the AES Algorithm by Abugharsa, Ahmed Bashir, Hasan Basari, Abd Samad, Almangush, Hamida

    Published 2012
    “…Finally, experimental results and security analysis show that the proposed image encryption scheme not only encrypts the picture to achieve perfect hiding, but the algorithm can also withstand exhaustive, statistical and differential attacks.…”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection by Siswanto, Apri, Katuk, Norliza, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A new image encryption algorithm based on single S-box and dynamic encryption step by Wang, Ji Jun, Tan, Soo Fun

    Published 2021
    “…Under the control of the dynamic encryption step algorithm, it effectively destroys the correlation between the source image’s pixels. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Experiment
  11. 11
  12. 12

    Efficient dynamic DNA-based block cipher algorithm by Chng, Chern Wei

    Published 2023
    “…The DNA-based MixColumns operation functions as a pseudo-random number generator, generating an encrypted random number for the purpose of encryption. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A Hybrid Chaotic Image Encryption Scheme Bas~d on S-Box and Ciphertext Feedback by MUHAMMAD ASIM

    Published 2007
    “…is a complete image encryption scheme. This scheme is also shown insecure against the differential attack in the thesis. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Content-based feature selection for music genre classification by Muda, Noor Azilah, Choo, Yun Huoy, Norashikin, Ahmad

    Published 2022
    “…Besides the selection process, two modules of Negative Selection Algorithm; censoring and monitoring are highlighted as well in this work. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17

    Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation by Ahmadipour, Masoud

    Published 2019
    “…In order to train Ridgelet probabilistic neural network, a modified differential evolution algorithm with new mutation phase, crossover process, and selection mechanism is introduced. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Cryptanalysis and design of chaos based image encryption schemes by Wong , Kuan Wai

    Published 2025
    “…Furthermore, we present a grayscale image encryption scheme utilizing a permutation-diffusion architecture, as well as a color image encryption scheme based on a genetic algorithm and the 2D-SHCM. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Development Of Human Skin Detection Algorithm Using Multilayer Perceptron Neural Network And Clustering Method by Al-Mohair, Hani Kaid Saif

    Published 2017
    “…Additionally, the effect of combining texture information with color information is investigated with the aim of boosting the performance of skin classifiers. The Differential Evolution Algorithm (DE) is used in this work to select the optimum color and texture information to achieve the optimum response. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Development of interactive application for classification of Artocarpus Species by Abdul Ghapar, Nadia

    Published 2020
    “…The combination of Prewitt algorithm, Canny alogorithm, Gray-Level co-occurrence matrix will be used in SVM. …”
    Get full text
    Undergraduate Final Project Report