Search Results - different ((detection algorithm) OR (((extraction algorithm) OR (encryption algorithm))))
Search alternatives:
- extraction algorithm »
-
1
A shift column different offset for better Rijndael security
Published 2009“…The secrecy of an encryption algorithm is measured in terms of the computational power and time required to extract the secret key. …”
Get full text
Get full text
Get full text
Article -
2
Investigation of data encryption algorithm for secured transmission of electrocardiograph (ECG) signal
Published 2018“…This problem will be solved by encrypting the signals, using the proposed fully homomorphic encryption (FHE) technique. …”
Get full text
Get full text
Conference or Workshop Item -
3
Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys
Published 2016“…The Rivest-Shamir-Adleman algorithm (RSA) is one of the most well-known and strongest public key cryptography algorithms. …”
Get full text
Get full text
Get full text
Thesis -
4
Detection and extraction features for signatures images via different techniques
Published 2019Get full text
Get full text
Conference or Workshop Item -
5
A Comparative Analysis of Feature Extraction Algorithms for Augmented Reality Applications
Published 2021“…The quantitative results show that the ORB and SURF algorithms detect and match more features than other algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
-
7
Securing Data Using Deep Hiding Selected The Least Significant Bit And Adaptive Swarm Algorithm
Published 2024journal::journal article -
8
An Algorithm for Vehicle Detection and Tracking
Published 2010“…In this paper, we propose a vehicle detection and tracking algorithm. The detection is done using the median filtering and blob extraction. …”
Get full text
Get full text
Conference or Workshop Item -
9
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Total 1600 different type of files were used for evaluation of the proposed algorithm, results show that 87% of injected objects were correctly detected…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
The noise reduction algorithm for star detection
Published 2025“…To validate the algorithm, synthetic star images with different noise levels were tested. …”
Get full text
Get full text
Get full text
Article -
11
Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments
Published 2018“…In this regard, the aim of this study is to propose an efficient TVS algorithm with high precision and recall values, and low computation cost for detecting different types of transitions. …”
Get full text
Get full text
Get full text
Thesis -
12
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. …”
Get full text
Get full text
Get full text
Article -
13
Optimised content-social based features for fake news detection in social media using text clustering approach
Published 2025“…In general, the process of fake news detection was conducted in two different phases, the topic detection phase using a graph-based unsupervised clustering method based on HFPA and Markov Clustering Algorithm (MCL) called (HFPA-MCL) and the fake news detection phase using an unsupervised clustering method based on K-means algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Machine Vision Application For Automatic Defect Segmentation In Weld Radiographs
Published 2006“…The label removal algorithm was developed to detect and remove labels that are printed on weld radiographs automatically before weld extraction algorithm and defect detection algorithm are applied. …”
Get full text
Get full text
Thesis -
15
Clonal selection algorithm for the cryptanalysis of a simple substitution cipher
Published 2006“…In this paper CSA is used to cryptanalyse a simple substitution cipher, whereby the key used to encrypt the plaintext is searched. The algorithm is based on the Clonalg algorithm developed by de Castro and Von Zuben. …”
Get full text
Get full text
Conference or Workshop Item -
16
Fast temporal video segmentation based on Krawtchouk-Tchebichef moments
Published 2020“…In this regard, this paper proposes a TVS algorithm with high precision and recall values, and low computation cost for detecting different types of video transitions. …”
Get full text
Get full text
Get full text
Article -
17
Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
Published 2018“…A sum total of 1600 different file types were used during training then evaluation of the proposed algorithm, where 87% of the injected objects were correctly detected.…”
Get full text
Get full text
Get full text
Get full text
Article -
18
A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi
Published 2015“…The true and false positive rates achieved by the proposed algorithm outperform several current detection algorithms.…”
Get full text
Get full text
Thesis -
19
An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization
Published 2019“…The evaluation results showed that the Improved AKF algorithm achieved better compression ratio and retained sufficient information in the extracted action key frames under different testing video shots. …”
Get full text
Get full text
Article -
20
Analysis of artificial neural network and viola-jones algorithm based moving object detection
Published 2014“…The utilization of cascade architecture to the extracted features, benefits the algorithm. The algorithms have been tested on simulated events, and the more suitable algorithm with high detection rate is expected to be presented in this paper.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
