Search Results - ((((restoration algorithm) OR (encryption algorithm))) OR (extraction algorithm))
Search alternatives:
- restoration algorithm »
- extraction algorithm »
-
1
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…The Hybrid Cube Encryption Algorithm (HiSea) has been implemented to validate the encryption keys that are generated from the proposed algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
A shift column different offset for better Rijndael security
Published 2009“…The secrecy of an encryption algorithm is measured in terms of the computational power and time required to extract the secret key. …”
Get full text
Get full text
Get full text
Article -
3
An enhanced color image encryption algorithm using LT-PRNG
Published 2018“…Several chaos-based image encryption algorithms use low-dimension chaos as the encryption tools. …”
Get full text
Get full text
Thesis -
4
New Cryptographic Algorithms for Enhancing Security of Voice Data
Published 2010“…The proposed solution consists of a simple, but strong encryption/decryption algorithm as well as an embedded method to exchange the keys between the users. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
On the Computational Cost of Cocks’ Identity Based Encryption
Published 2018“…Unfortunately, lack of efficiency becomes a major drawback of the Cocks’ Identity Based Encryption. The algorithms in Cocks’ Identity Based Encryption consists of four stages: Setup, Extract, Encrypt and Decrypt. …”
Get full text
Get full text
Article -
6
Doctor-patient remote consultation system with secure medical images
Published 2022“…The result was recorded including the run time and encrypted image size. The final selection of the algorithms depended on the encryption size and computation speed. …”
Get full text
Get full text
Get full text
Academic Exercise -
7
Key generation technique based on triangular coordinate extraction for hybrid cubes
Published 2017“…In this study, we extend the hybrid cube encryption algorithm (HiSea) and our earlier Triangular Coordinate Extraction (TCE) technique for HC by increasing the complexity in the mathematical approaches. …”
Get full text
Get full text
Article -
8
Securing Data Using Deep Hiding Selected The Least Significant Bit And Adaptive Swarm Algorithm
Published 2024journal::journal article -
9
Two-Phases QR Authentication Algorithm (2PQRA) for Digital Energy and IoT Applications
Published 2023Conference Paper -
10
Chaotic encryption scheme for colour Image using 3D lorenz chaotic map and 3D chen system
Published 2024“…Chaos-based image encryption system is an encryption method that uses chaotic systems in encrypting digital images for the purpose of enhancing security. …”
Get full text
Get full text
Get full text
Article -
11
-
12
Using genetic algorithms as image watermarking performance optimizer / Zuhaili Zahid
Published 2008“…As a result, these errors will produce less accurate results during the process of extraction to the original watermark. Thus, this project will introduce a genetic-algorithms-based technique to overcome the rounding error problem. …”
Get full text
Get full text
Thesis -
13
Blotch removal using multi-level scanning, shape analysis, and meta heuristic techniques
Published 2015“…The subjective evaluation also was done by requesting some respondent to judge the results. The algorithms were applied to two real image sequences which were contaminated to unknown blotches and the results were extracted for evaluation of proposed methods. …”
Get full text
Get full text
Thesis -
14
An improved wavelet digital watermarking software implementation
Published 2011“…Modification was made to the algorithms where only selected matching subbands were used in embedding and extracting the watermark in this improved method. …”
Get full text
Get full text
Get full text
Book Chapter -
15
A new secure storing system for biometric templates based encryption and concealment
Published 2015“…The Hill Cipher algorithm has been improved to be more secure by using a large and random key with large data block and also extending it to include the special characters. …”
Get full text
Get full text
Get full text
Article -
16
RENTAKA: A novel machine learning framework for crypto-ransomware pre-encryption detection
Published 2022“…Crypto ransomware is malware that locks its victim’s file for ransom using an encryption algorithm. Its popularity has risen at an alarming rate among the cyber community due to several successful worldwide attacks. …”
Get full text
Get full text
Get full text
Article -
17
Anti-forensic steganography method based on randomization
Published 2013“…First, the secret information are encrypted using Rijndael Encryption Algorithm. Then, the cover image is divided into several matrices. …”
Get full text
Get full text
Get full text
Article -
18
Rain streaks removal using total variation and sparse coding based on case based reasoning approach
Published 2024journal::journal article -
19
Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing
Published 2022“…Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
Get full text
Get full text
Get full text
Thesis -
20
A true random number generator for crypto embedded systems
Published 2006“…Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES. …”
Get full text
Get full text
Article
