Search Results - ((((restoration algorithm) OR (encryption algorithm))) OR (extraction algorithm))

Refine Results
  1. 1

    Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube by Mushtaq, Muhammad Faheem

    Published 2019
    “…The Hybrid Cube Encryption Algorithm (HiSea) has been implemented to validate the encryption keys that are generated from the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    A shift column different offset for better Rijndael security by Mahmod, Ramlan, Ali, Sherif Abdulbari, Abd Ghani, Abdul Azim

    Published 2009
    “…The secrecy of an encryption algorithm is measured in terms of the computational power and time required to extract the secret key. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    An enhanced color image encryption algorithm using LT-PRNG by Mohammed Ismael, Saba

    Published 2018
    “…Several chaos-based image encryption algorithms use low-dimension chaos as the encryption tools. …”
    Get full text
    Get full text
    Thesis
  4. 4

    New Cryptographic Algorithms for Enhancing Security of Voice Data by Al-Hazaimeh, Obaida Mohammad Awad

    Published 2010
    “…The proposed solution consists of a simple, but strong encryption/decryption algorithm as well as an embedded method to exchange the keys between the users. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    On the Computational Cost of Cocks’ Identity Based Encryption by Moo, Gabriel Ka Lin, Arif Mandangan, Rozaimi Zakaria

    Published 2018
    “…Unfortunately, lack of efficiency becomes a major drawback of the Cocks’ Identity Based Encryption. The algorithms in Cocks’ Identity Based Encryption consists of four stages: Setup, Extract, Encrypt and Decrypt. …”
    Get full text
    Get full text
    Article
  6. 6

    Doctor-patient remote consultation system with secure medical images by Teh, Yee Heng

    Published 2022
    “…The result was recorded including the run time and encrypted image size. The final selection of the algorithms depended on the encryption size and computation speed. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  7. 7

    Key generation technique based on triangular coordinate extraction for hybrid cubes by Mushtaq, Muhammad Faheem, Jamel, Sapiee, Mohamad, Kamaruddin Malik, Ahmad Khalid, Shamsul Kamal, Mat Deris, Mustafa

    Published 2017
    “…In this study, we extend the hybrid cube encryption algorithm (HiSea) and our earlier Triangular Coordinate Extraction (TCE) technique for HC by increasing the complexity in the mathematical approaches. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    Chaotic encryption scheme for colour Image using 3D lorenz chaotic map and 3D chen system by Irene Lim Jin Ying, Arif Mandangan

    Published 2024
    “…Chaos-based image encryption system is an encryption method that uses chaotic systems in encrypting digital images for the purpose of enhancing security. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Using genetic algorithms as image watermarking performance optimizer / Zuhaili Zahid by Zahid, Zuhaili

    Published 2008
    “…As a result, these errors will produce less accurate results during the process of extraction to the original watermark. Thus, this project will introduce a genetic-algorithms-based technique to overcome the rounding error problem. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Blotch removal using multi-level scanning, shape analysis, and meta heuristic techniques by Khammar, Mohammad Reza

    Published 2015
    “…The subjective evaluation also was done by requesting some respondent to judge the results. The algorithms were applied to two real image sequences which were contaminated to unknown blotches and the results were extracted for evaluation of proposed methods. …”
    Get full text
    Get full text
    Thesis
  14. 14

    An improved wavelet digital watermarking software implementation by Khalifa, Othman Omran, Yusof, Yusnita

    Published 2011
    “…Modification was made to the algorithms where only selected matching subbands were used in embedding and extracting the watermark in this improved method. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  15. 15

    A new secure storing system for biometric templates based encryption and concealment by Khalaf, Emad Taha, Norrozila, Sulaiman

    Published 2015
    “…The Hill Cipher algorithm has been improved to be more secure by using a large and random key with large data block and also extending it to include the special characters. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    RENTAKA: A novel machine learning framework for crypto-ransomware pre-encryption detection by S. M. M Yassin, S. M. Warusia Mohamed, Abdollah, Mohd Faizal, Mohd, Othman, Ariffin, Aswami

    Published 2022
    “…Crypto ransomware is malware that locks its victim’s file for ransom using an encryption algorithm. Its popularity has risen at an alarming rate among the cyber community due to several successful worldwide attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Anti-forensic steganography method based on randomization by Khalaf, Emad Taha, Norrozila, Sulaiman, Mohammed, Muamer N.

    Published 2013
    “…First, the secret information are encrypted using Rijndael Encryption Algorithm. Then, the cover image is divided into several matrices. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing by Hameed, Mustafa Emad

    Published 2022
    “…Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    A true random number generator for crypto embedded systems by M.Thamrin, Norashikin, Ahmad, Illiasaak, Hani, Mohamed Khalil

    Published 2006
    “…Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES. …”
    Get full text
    Get full text
    Article