Search Results - using compressive performance ((evolutionary algorithm) OR (encryption algorithm))

Refine Results
  1. 1

    An efficient secure ECG compression based on 2D-SPIHT and SIT algorithm by Jati, Grafika, Rachmasari, Ardina Rizqy, Jatmiko, Wisnu, Mursanto, Petrus, Sediono, Wahju

    Published 2017
    “…This research proposes an efficient combination of a compression and an encryption algorithms. Two-Dimension Set Partitioning in Hierarchical Tree (2D-SPIHT) used to optimally compress signals then combined with recently lightweight encryption algorithm, namely Secure IoT (SIT). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2
  3. 3
  4. 4

    Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh by Mohammed Saleh, Mohammed Ahmed

    Published 2016
    “…In the first and second methods, the visual video information is secured by encrypting limited transformed coefficients using AES algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Data hiding in medical images using encryption and steganography techniques by Nur Athirah, Abdul Razak

    Published 2019
    “…In this paper, for the sender side, the secret text will be encrypted using Advanced Encryption Standard algorithm and embedded into the chosen cover image using Least Significant Bit algorithm for more security. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    Chaos-based simultaneous compression and encryption for Hadoop by Usama, M., Zakaria, N.

    Published 2017
    “…Numerous data compression and encryption tools are presently available on such platforms and the tools are characteristically applied in sequence, i.e., compression followed by encryption or encryption followed by compression. …”
    Get full text
    Get full text
    Article
  7. 7

    An enhanced color image encryption algorithm using LT-PRNG by Mohammed Ismael, Saba

    Published 2018
    “…Several chaos-based image encryption algorithms use low-dimension chaos as the encryption tools. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Image compression and encryption by Zainal Abidin, Zuhairiah

    Published 2003
    “…Thereafter, the chosen image was compressed and finally, encrypted. In this project, the RC4 encryption algorithm has been used. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation by Abu, Ahmad Zaidee

    Published 2008
    “…This thesis work studied on digital image encryption algorithms performed towards JPEG images. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography by Abomhara, Mohamed, Khalifa, Othman Omran, Zaidan , A. A., Zaidan , B. B., Zakaria, Omar, Gani, Abdullah

    Published 2011
    “…This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): selective cryptography by Abomhara, Mohamed, Khalifa, Othman O., Zaidan, A.A., Zaidan, B.B., Zakaria, Omar, Gani, Abdullah

    Published 2011
    “…This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Pneumatic servo position control optimization using adaptive-domain prescribed performance control with evolutionary mating algorithm by Addie Irawan, Hashim, Mohd Herwan, Sulaiman, Mohd Syakirin, Ramli, Mohd Iskandar Putra, Azahar

    Published 2024
    “…Therefore, this study presents an optimal control strategy using Adaptive Domain Prescribed Performance Control (AD-PPC) cascaded with PID and optimized using the Evolutionary Mating Algorithm (EMA) for a pneumatic servo system (PSS). …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    A comparative review on symmetric and asymmetric dna-based cryptography by Hammad B.T., Sagheer A.M., Ahmed I.T., Jamil N.

    Published 2023
    “…In the present work, we made use of DNA in cryptographic, i.e. its storing capabilities (superior information density) and parallelism, in order to improve other classical cryptographic algorithms. …”
    Article
  16. 16
  17. 17

    A study of watermarking methods in medical application by Ng, Lee Ping

    Published 2004
    “…The three methods of medical image watermarking that have been studied are Least Significant Bit (LSB), Rivest, Shamir and Adleman (RSA) encryption and decryption with LSB, RSA encryption and decryption with feature-based. …”
    Get full text
    Get full text
    Thesis
  18. 18

    An improved public key cryptography based on the elliptic curve by Al-Daoud, Essam Faleh

    Published 2002
    “…A new algorithm to compress and decompress the sparse elements algorithms are introduced to reduce the size of the transited parameters. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Unified GPU Technique to Boost Confidentiality, Integrity and Trim Data Loss in Big Data Transmission by Bhattacharjee, S., Rahim, L.B.A., Watada, J., Roy, A.

    Published 2020
    “…Furthermore, the application of a GPU enhances the execution speed at least 28-fold compared to the CPU performance. Experiments are performed using the standard Calgary Corpuses, text files (sized up to 1 TB), and audio files to validate the objectives. …”
    Get full text
    Get full text
    Article
  20. 20

    Obfuscatable aggregatable signcryption scheme with PadSteg for unattended devices in IoT systems by Uwadiegwu, Inyama Victor

    Published 2019
    “…The simulation result on different nodes showed that the proposed algorithm on Signcryption Obfuscatable and Steganography-PadSteg (SOS) performs 25% reasonably well as expected. …”
    Get full text
    Get full text
    Thesis