Search Results - (( data evaluation method algorithm ) OR ( based encryption method algorithm ))
Search alternatives:
- encryption method »
- method algorithm »
- data evaluation »
-
1
An Enhanced Hybrid Method Using AES Algorithm And Arabic Text Steganography
Published 2024thesis::master thesis -
2
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
Get full text
Get full text
Get full text
Article -
3
An improved chaotic image encryption algorithm
Published 2018“…Encryption techniques based on Chaos are among the most effectual algorithms for encryption of data image. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map
Published 2023“…The issue of misplaced pixel positions in the image was also adequately addressed, making it an effective method for image encryption. The hybrid technique was simulated on image data and evaluated to gauge its performance. …”
Get full text
Get full text
Get full text
Article -
5
Design and Implementation of a Genetic Algorithm-Based Block Cipher For Enhanced Cryptographic Security
Published 2025conference output::conference proceedings::conference paper -
6
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…The performance of the recommended approach makes it possible to thwart an attack using brute force considerably more fast than is possible with the encryption technologies that are currently in use. Evaluations of algorithms reveal that the proposed algorithm has achieved a level of security and complexity that is 48 times superior to that of other methods that have been tried and tested. …”
Get full text
Get full text
Get full text
Thesis -
7
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…Furthermore, conventional encryption methods such as Data Encryption Standards (DES) are not adapted to image data because of their high redundancy and big capacity. …”
Get full text
Get full text
Thesis -
8
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Although there are few algorithms for data protection in the Cloud, However, such algorithms are still prone to attack, especially in real-time data movement due to the mechanism employed. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…The proposed authentication method, uses an enhanced method where the credentials are encrypted through an algorithm. …”
Get full text
Get full text
Get full text
Thesis -
10
Image steganography for encryption over network security
Published 2017“…The performance of the image steganography method has been evaluated based on the quality of cover image with stego image, robustness and capacity of data hidden in the stego image. …”
Get full text
Get full text
Student Project -
11
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
12
Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
Published 2018“…Hence, a validation protocol algorithm based on hash function labelling provides a one-time security header for transferable files that protects data in transit against any unauthorized injection. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The formal verification is performed using BAN logic to prove the security and mutual authentications. The evaluation of the security of the proposed scheme is based on SVO logic to verify the security of the informal method. …”
Get full text
Get full text
Thesis -
14
Multicast-unicast key management and data delivery method in wireless IPv6 networks
Published 2012“…The overall improvements of communication, computation, and storage costs are more than 64%, 19%, and 29%,respectively. For evaluation of the proposed data delivery method, the proposed method is implemented in indoor and outdoor environments and the results are compared to the conventional multicast method. …”
Get full text
Get full text
Thesis -
15
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008“…In this paper, focus is given on enhanced security scheme in terms of RO based Test-bed evaluation experiment. An enhanced security algorithm is developed on top of MIPv6 RO to secure data. …”
Get full text
Get full text
Conference or Workshop Item -
16
Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain
Published 2017“…In general, high capacity based methods i.e. LSB substitution, employed the multi-bit-planes for concealing the secret data that eventually modify the cover pixel values and becomes more prominent although human vision are not able to identify those changes. …”
Get full text
Get full text
Get full text
Thesis -
17
Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model
Published 2019“…Furthermore, the attacks are detected and prevented by utilizing secure node authentication, data fragmentation algorithms, fully homomorphic encryption, and access control model. …”
Get full text
Get full text
Article -
18
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Get full text
Article -
19
An Improved Rectangle Lightweight Block Cipher Based On 3d Rotation Method
Published 2024thesis::doctoral thesis -
20
Prospective Control Systems and Cyber-Securities for Electrical Secondary Substations
Published 2023Conference Paper
