Search Results - (( data selection method algorithm ) OR ( based encryption based algorithm ))

Refine Results
  1. 1
  2. 2

    Database encryption for a Web-based Claims System by Syed Zulkarnain Syed Idrus

    Published 2008
    “…Testing was also done on the encryption algorithms and Web browsers selected by increasing both the text length size and key length size and observed its performances. …”
    Get full text
    Thesis
  3. 3

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  4. 4
  5. 5

    An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography by Abomhara, Mohamed, Khalifa, Othman Omran, Zaidan , A. A., Zaidan , B. B., Zakaria, Omar, Gani, Abdullah

    Published 2011
    “…This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Dynamic determinant matrix-based block cipher algorithm by Juremi, Julia

    Published 2018
    “…The performance analysis in terms of processing speed of the encryption and decryption process of the DDBC algorithm shows minimal differences in both AES and DDBC algorithm despite of the difference method of transformation used in both algorithms. …”
    Get full text
    Get full text
    Thesis
  7. 7

    An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): selective cryptography by Abomhara, Mohamed, Khalifa, Othman O., Zaidan, A.A., Zaidan, B.B., Zakaria, Omar, Gani, Abdullah

    Published 2011
    “…This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A new secure storing system for biometric templates based encryption and concealment by Khalaf, Emad Taha, Norrozila, Sulaiman

    Published 2015
    “…This study proposes a novel approach that combines an improved encryption method with a new concealment technique to establish a secure data template storing system. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Mathematical modelling on communication between two parties / Nor Anees Asyiqin Md Disa, Khairunnisa Munawarah Khairul Anwar and Aniesa Farhana Mazlan by Md Disa, Nor Anees Asyiqin, Khairul Anwar, Khairunnisa Munawarah, Mazlan, Aniesa Farhana

    Published 2022
    “…This descriptive-analytical was resolved using the formulation of the study such as point addition, point doubling and double-and-add algorithm. Kuwakado scheme (2018) had be summarized in key generation, encryption, and decryption algorithm. …”
    Get full text
    Get full text
    Student Project
  10. 10

    Image steganography for encryption over network security by Maimon, Elmy Fadly

    Published 2017
    “…The performance of the image steganography method has been evaluated based on the quality of cover image with stego image, robustness and capacity of data hidden in the stego image. …”
    Get full text
    Get full text
    Student Project
  11. 11

    Enhancement of cryptography and transform domain in steganography for higher embedding capacity by Khalaf, Emad T

    Published 2012
    “…In the field of Data Communication, security issues are the top priority.Cryptography and steganography address the necessary elements for secure communication namely privacy, confidentiality,key exchange,authentication,and non-repudiation but reveals the fact that communication is happening.This study proposes a combination of Steganography and Cryptography to enhance security of the transmitted information.Hence this work is composed of two parts:cryptographic and steganographic.In the cryptographic part,an improvement has been proposed to the Hill cipher algorithm to be more secured by using a large and random key with large data block,and also extending it by including the special characters and digits.For the steganographic part,a new method has been proposed by combining Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT),to take the advantageous of both algorithms.The original image is decomposed into four bands using the Haar wavelet LL,HL,LH and HH.Three of these sub-bands have been selected to hiding data (LH,HL and HH)which are less effect to the image than LL sub-band.Then,DCT transform is applied to the selected DWT sub-band,the process of hiding will be in the least significant bit of the DCT coefficients to each sub-band. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Enhancement of cryptography and transform domain in steganography for higher embedding capacity by Khalaf, Emad T

    Published 2012
    “…In the field of Data Communication, security issues are the top priority.Cryptography and steganography address the necessary elements for secure communication namely privacy, confidentiality,key exchange,authentication,and non-repudiation but reveals the fact that communication is happening.This study proposes a combination of Steganography and Cryptography to enhance security of the transmitted information.Hence this work is composed of two parts:cryptographic and steganographic.In the cryptographic part,an improvement has been proposed to the Hill cipher algorithm to be more secured by using a large and random key with large data block,and also extending it by including the special characters and digits.For the steganographic part,a new method has been proposed by combining Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT),to take the advantageous of both algorithms.The original image is decomposed into four bands using the Haar wavelet LL,HL,LH and HH.Three of these sub-bands have been selected to hiding data (LH,HL and HH)which are less effect to the image than LL sub-band.Then,DCT transform is applied to the selected DWT sub-band,the process of hiding will be in the least significant bit of the DCT coefficients to each sub-band. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13
  14. 14

    Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm by Lim, Mui Liang

    Published 2006
    “…The purpose of this project is to implement FPGA Base Encryption Chip using DES algorithm. Throughout the project, the suitability of the implementation DES algorithm in FPGA will be investigated. …”
    Get full text
    Get full text
    Monograph
  15. 15

    On the Computational Cost of Cocks’ Identity Based Encryption by Moo, Gabriel Ka Lin, Arif Mandangan, Rozaimi Zakaria

    Published 2018
    “…Unfortunately, lack of efficiency becomes a major drawback of the Cocks’ Identity Based Encryption. The algorithms in Cocks’ Identity Based Encryption consists of four stages: Setup, Extract, Encrypt and Decrypt. …”
    Get full text
    Get full text
    Article
  16. 16

    JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation by Abu, Ahmad Zaidee

    Published 2008
    “…With image encryption algorithms, JPEG images can be securely scrambled or encrypted prior to distribution. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection by Siswanto, Apri, Katuk, Norliza, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    A new image encryption algorithm based on single S-box and dynamic encryption step by Wang, Ji Jun, Tan, Soo Fun

    Published 2021
    “…Chaotic-based S-box image encryption schemes promise to be a practical solution for securing digital images. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Experiment
  19. 19

    Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain by Mehdi , Hussain

    Published 2017
    “…In general, high capacity based methods i.e. LSB substitution, employed the multi-bit-planes for concealing the secret data that eventually modify the cover pixel values and becomes more prominent although human vision are not able to identify those changes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20