Search Results - using compressive performance ((evolution algorithm) OR (encryption algorithm))
Search alternatives:
- compressive performance »
- evolution algorithm »
-
1
An efficient secure ECG compression based on 2D-SPIHT and SIT algorithm
Published 2017“…This research proposes an efficient combination of a compression and an encryption algorithms. Two-Dimension Set Partitioning in Hierarchical Tree (2D-SPIHT) used to optimally compress signals then combined with recently lightweight encryption algorithm, namely Secure IoT (SIT). …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
DNA sequences compression by GP2R and selective encryption using modified RSA technique
Published 2020“…The proposed algorithm is a new Lossless Compression algorithm, which compresses data, based on two tiers. …”
Get full text
Get full text
Get full text
Article -
3
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…All of those encryption algorithms are classified as asymmetric and symmetric algorithms. …”
Get full text
Get full text
Book Section -
4
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…In the first and second methods, the visual video information is secured by encrypting limited transformed coefficients using AES algorithm. …”
Get full text
Get full text
Thesis -
5
Data hiding in medical images using encryption and steganography techniques
Published 2019“…In this paper, for the sender side, the secret text will be encrypted using Advanced Encryption Standard algorithm and embedded into the chosen cover image using Least Significant Bit algorithm for more security. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
6
Chaos-based simultaneous compression and encryption for Hadoop
Published 2017“…Numerous data compression and encryption tools are presently available on such platforms and the tools are characteristically applied in sequence, i.e., compression followed by encryption or encryption followed by compression. …”
Get full text
Get full text
Article -
7
An enhanced color image encryption algorithm using LT-PRNG
Published 2018“…Several chaos-based image encryption algorithms use low-dimension chaos as the encryption tools. …”
Get full text
Get full text
Thesis -
8
Image compression and encryption
Published 2003“…Thereafter, the chosen image was compressed and finally, encrypted. In this project, the RC4 encryption algorithm has been used. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
Published 2008“…This thesis work studied on digital image encryption algorithms performed towards JPEG images. …”
Get full text
Get full text
Thesis -
10
Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing
Published 2022“…The compression mechanism is performed using adaptive lossless compression based on Huffman encoding. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography
Published 2011“…This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. …”
Get full text
Get full text
Get full text
Article -
12
An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): selective cryptography
Published 2011“…This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. …”
Get full text
Get full text
Get full text
Article -
13
Securing Data Using Deep Hiding Selected The Least Significant Bit And Adaptive Swarm Algorithm
Published 2024journal::journal article -
14
A comparative review on symmetric and asymmetric dna-based cryptography
Published 2023“…In the present work, we made use of DNA in cryptographic, i.e. its storing capabilities (superior information density) and parallelism, in order to improve other classical cryptographic algorithms. …”
Article -
15
-
16
A study of watermarking methods in medical application
Published 2004“…The three methods of medical image watermarking that have been studied are Least Significant Bit (LSB), Rivest, Shamir and Adleman (RSA) encryption and decryption with LSB, RSA encryption and decryption with feature-based. …”
Get full text
Get full text
Thesis -
17
An improved public key cryptography based on the elliptic curve
Published 2002“…A new algorithm to compress and decompress the sparse elements algorithms are introduced to reduce the size of the transited parameters. …”
Get full text
Get full text
Thesis -
18
-
19
Unified GPU Technique to Boost Confidentiality, Integrity and Trim Data Loss in Big Data Transmission
Published 2020“…Furthermore, the application of a GPU enhances the execution speed at least 28-fold compared to the CPU performance. Experiments are performed using the standard Calgary Corpuses, text files (sized up to 1 TB), and audio files to validate the objectives. …”
Get full text
Get full text
Article -
20
Obfuscatable aggregatable signcryption scheme with PadSteg for unattended devices in IoT systems
Published 2019“…The simulation result on different nodes showed that the proposed algorithm on Signcryption Obfuscatable and Steganography-PadSteg (SOS) performs 25% reasonably well as expected. …”
Get full text
Get full text
Thesis
