Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Encryption techniques.

Zeitschriftenartikel zum Thema „Encryption techniques“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Encryption techniques" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Et. al., Jaichandran R,. "A Hybrid Encryption Model with Attribute Based Encryption and Advanced Encryption Standard Techniques." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 334–36. http://dx.doi.org/10.17762/turcomat.v12i2.720.

Der volle Inhalt der Quelle
Annotation:
The emergence of cloud computing has completely changed the information technology sector, storage of information’s and access control. The main challenge in the migration of enterprises is the security to gain data owners confidence. In existing approach, many digital signatures based methodologies are used. In the existing approach, encryption time, security, encryption complexity are the parameters which need more focus. To overcome the existing issue, in this paper we proposed an hybrid architecture invoking attribute based encryption (ABE) for encrypting the key and advanced encryption st
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Ramanathan, Thirumalaimuthu, Md Jakir Hossen, Md Shohel Sayeed, and Joseph Emerson Raja. "Survey on computational intelligence based image encryption techniques." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 3 (2020): 1428. http://dx.doi.org/10.11591/ijeecs.v19.i3.pp1428-1435.

Der volle Inhalt der Quelle
Annotation:
Image encryption is an important area in visual cryptography that helps in protecting images when shared through internet. There is lot of cryptography algorithms applied for many years in encrypting images. In the recent years, artificial intelligence techniques are combined with cryptography algorithms to support image encryption. Some of the benefits that artificial intelligence techniques can provide are prediction of possible attacks on cryptosystem using machine learning algorithms, generation of cryptographic keys using optimization algorithms, etc. Computational intelligence algorithms
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Thirumalaimuthu, T. Ramanathan, Hossen J., Sayeed S., and Emerson Raja J. "Survey on computational intelligence based image encryption techniques." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 3 (2020): 1428–35. https://doi.org/10.11591/ijeecs.v19.i3.pp1428-1435.

Der volle Inhalt der Quelle
Annotation:
Image encryption is an important area in visual cryptography that helps in protecting images when shared through internet. There is lot of cryptography algorithms applied for many years in encrypting images. In the recent years, artificial intelligence techniques are combined with cryptography algorithms to support image encryption. Some of the benefits that artificial intelligence techniques can provide are prediction of possible attacks on cryptosystem using machine learning algorithms, generation of cryptographic keys using optimization algorithms, etc. Computational intelligence algorithms
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Li, Zongwei. "Data Privacy Protection Utilizing Homomorphic Encryption Techniques." Applied and Computational Engineering 135, no. 1 (2025): 1–9. https://doi.org/10.54254/2755-2721/2025.21090.

Der volle Inhalt der Quelle
Annotation:
In the current era with the rapid development of the Internet, although a variety of technologies have offered convenience to people's lives, numerous problems have arisen regarding the security of individual and collective data, Problems such as data privacy leakage occur continuously. The content of this review is data privacy protection based on homomorphic encryption. Firstly, the basic principle and formula of homomorphic encryption are briefly introduced. Then, the homomorphic encryption-based data privacy protection approach is developed in response to the importance of safeguarding dat
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Ansari, Tasin Habib Ahmad* Dr. J. W. Bakal. "ENHANCING PRIVACY USING COLLABORATIVE ATTRIBUTE ENCRYPTION TECHNIQUES." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 11 (2016): 83–91. https://doi.org/10.5281/zenodo.164906.

Der volle Inhalt der Quelle
Annotation:
In the era where computers dominate the other facilities, it becomes even more productive once connected to the world with the help of internet. Although it possesses certain challenges to connect oneself to the world. The challenges of Authenticity, confidentiality, and anonymity and all of the notions of security with the concern aspects. Depending on the application the encryption techniques differs the most recent assortment that is the attribute based encryption, unlike traditional encryption technique this technique doesn’t reveals its identity Security tends to be the most important asp
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Parenreng‬, Jumadi Mabe, Sahraeni Maulida Mustari, and Abdul Wahid. "E-mail Security System Using El-Gamal Hybrid Algorithm and AES (Advanced Encryption Standard) Algorithm." Internet of Things and Artificial Intelligence Journal 2, no. 1 (2022): 1–9. http://dx.doi.org/10.31763/iota.v2i1.510.

Der volle Inhalt der Quelle
Annotation:
E-mail is a medium of long-distance communication via the internet, which is currently often used for message exchange needs. But the use of e-mail has security problems, especially regarding data leakage when sending messages via e-mail. One of the efforts to improve the security of data and information is the application of cryptographic techniques and methods, namely end-to-end encryption. Cryptography is the science of reducing the risk of security threats by encrypting and decrypting data and information. In the implementation of the e-mail system, at least 2 (two) suitable encryption tec
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Sharma, Ramandeep, Richa Sharma, and Harmanjit Singh. "Classical Encryption Techniques." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 1 (2012): 84–90. http://dx.doi.org/10.24297/ijct.v3i1b.2745.

Der volle Inhalt der Quelle
Annotation:
This paper reviews some of the classical encryption and modern techniques which are widely used to solve the problem in open networked systems, where information is being received and misused by adversaries by means of facilitating attacks at various levels in the communication. In this paper the proposition of building the basics of classical encryption and modern techniques and the comparison has been done between each of them.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Vaishnavi Agrawal. "Enhancing Privacy on Online Social Networs: A comparative study of encryption techniques." Journal of Advances and Scholarly Researches in Allied Education 21, no. 5 (2024): 25–32. http://dx.doi.org/10.29070/cqryaz86.

Der volle Inhalt der Quelle
Annotation:
The ability to connect with people all over the world and share private information has made online social networks (OSNs) indispensable to contemporary communication. Because of the serious privacy and security concerns that come with their fast growth, protecting user data is of the utmost importance. In order to improve OSN privacy, this study examines several encryption techniques. It discusses symmetric encryption (ECC and RSA) and synthetic encryption (AES) as well as hybrid methods that combine the two types of encryption. Using examples from well-known sites such as LinkedIn, Facebook,
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Yeow, Sin-Qian, and Kok-Why Ng. "Neural Network Based Data Encryption: A Comparison Study among DES, AES, and HE Techniques." JOIV : International Journal on Informatics Visualization 7, no. 3-2 (2023): 2086. http://dx.doi.org/10.30630/joiv.7.3-2.2336.

Der volle Inhalt der Quelle
Annotation:
With the improvement of technology and the continuous expansion and deepening of neural network technology, its application in computer network security plays an important role. However, the development of neural networks is accompanied by new threats and challenges. This paper proposes to encrypt the weight data using encryption algorithms and embed image encryption algorithms to improve protected data security further. The purpose is to address the feasibility and effectiveness of using modern encryption algorithms for data encryption in machine learning in response to data privacy breaches.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Li, Bingcheng, Dingkang Li, and Mingyuan Zhu. "Application analysis of data encryption technology." Applied and Computational Engineering 50, no. 1 (2024): 199–205. http://dx.doi.org/10.54254/2755-2721/50/20241502.

Der volle Inhalt der Quelle
Annotation:
Data encryption technology is a key method to secure sensitive data. The privacy and confidentiality of data is protected by encrypting the data, i.e., transforming the original data into a form that cannot be understood without authorization. However, the security of traditional encryption algorithms is gradually challenged with the increase in computing power. Therefore, studying how to apply more advanced encryption techniques has become a current research hotspot. This study aims to analyze the application of data encryption techniques and explore the advantages and applicability of emergi
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Thabit, Zainab Hasan, Sadiq A. Mehdi, and Bashar M. Nema. "Enhancing Color Image Security: Encryption with Dynamic Chaotic Three-Dimensional System and Robust Security Analysis." Al-Mustansiriyah Journal of Science 34, no. 4 (2023): 87–95. http://dx.doi.org/10.23851/mjs.v34i4.1411.

Der volle Inhalt der Quelle
Annotation:
The rapid tech growth and widespread internet usage caused a surge in sharing multimedia (text, images, videos, audio) across public networks. Protecting this data is vital, demanding encryption to prevent unauthorized access. Image encryption distorts images for security. This paper highlights encryption's vital role in safeguarding multimedia, especially amid rising internet use and media exchange. It introduces a novel solution: a chaotic three-dimensional system for color image encryption. The study scrutinizes system traits using math software. It employs a new chaotic system to generate
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Yang, Ming, Monica Trifas, Guillermo Francia III, and Lei Chen. "Cryptographic and Steganographic Approaches to Ensure Multimedia Information Security and Privacy." International Journal of Information Security and Privacy 3, no. 3 (2009): 37–54. http://dx.doi.org/10.4018/jisp.2009100703.

Der volle Inhalt der Quelle
Annotation:
Information security and privacy have traditionally been ensured with data encryption techniques. Generic data encryption standards, such as DES, RSA, AES, are not very efficient in the encryption of multimedia contents due to the large volume. In order to address this issue, different image/video encryption methodologies have been developed. These methodologies encrypt only the key parameters of image/video data instead of encrypting it as a bitstream. Joint compression-encryption is a very promising direction for image/video encryption. Nowadays, researchers start to utilize information hidi
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Isidhore, Smitty V. "Modern Cryptosystems for Color Image Encryption: Insights and Future Directions." International Scientific Journal of Engineering and Management 04, no. 04 (2025): 1–7. https://doi.org/10.55041/isjem02918.

Der volle Inhalt der Quelle
Annotation:
Abstract - In the current digital age, the widespread use of color images in areas like healthcare, surveillance, and multimedia communications has significantly increased concerns about image security. By incorporating a systematic approach following PRISMA guidelines, this paper presents a critical review of recent developments in cryptosystems used for color image encryption. Through a standardized examination of the state-of-the-art techniques, this review assesses techniques that ensure the authenticity, confidentiality, and integrity of color images. We focus on offering insights into cu
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Alslman, Yasmeen, Eman Alnagi, Ashraf Ahmad, Yousef AbuHour, Remah Younisse, and Qasem Abu Al-haija. "Hybrid Encryption Scheme for Medical Imaging Using AutoEncoder and Advanced Encryption Standard." Electronics 11, no. 23 (2022): 3967. http://dx.doi.org/10.3390/electronics11233967.

Der volle Inhalt der Quelle
Annotation:
Recently, medical image encryption has gained special attention due to the nature and sensitivity of medical data and the lack of effective image encryption using innovative encryption techniques. Several encryption schemes have been recommended and developed in an attempt to improve medical image encryption. The majority of these studies rely on conventional encryption techniques. However, such improvements have come with increased computational complexity and slower processing for encryption and decryption processes. Alternatively, the engagement of intelligent models such as deep learning a
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Mohammed, Zahraa A., Hadeel Qasem Gheni, Zahraa Jabbar Hussein, and Ali Kadhum M. Al-Qurabat. "Advancing Cloud Image Security via AES Algorithm Enhancement Techniques." Engineering, Technology & Applied Science Research 14, no. 1 (2024): 12694–701. http://dx.doi.org/10.48084/etasr.6601.

Der volle Inhalt der Quelle
Annotation:
Communication system and internet dominance in our society, has made image security a matter of paramount concern. Cryptography involves encrypting data to protect information exchange between senders and receivers, establishing a foundation for secure communication. The Advanced Encryption Standard (AES) is an exceptional algorithm that plays a pivotal role in this area because of its ability to consistently transform plain data into cipher data using the same encryption key. This algorithm engages intricate encryption techniques, harnessing a variety of algorithms and transformations to ensu
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Zhu, Bingxin, Puwen Wei, and Mingqiang Wang. "Adaptive Security of Broadcast Encryption, Revisited." Security and Communication Networks 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/1404279.

Der volle Inhalt der Quelle
Annotation:
We provide a strong security notion for broadcast encryption, called adaptive security in the multichallenge setting (MA-security), where the adversary can adaptively have access to the key generation oracle and the encryption oracle many times (multichallenge). The adversary specially can query for the challenge ciphertexts on different target user sets adaptively, which generalizes the attacks against broadcast encryptions in the real world setting. Our general result shows that the reduction of the adaptive secure broadcast encryption will lose a factor of q in the MA setting, where q is th
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Wedad Abdul Khuder Naser, Amal Abbas Kadhim, and Safana Hyder Abbas. "Subject review: Image encryption techniques." Global Journal of Engineering and Technology Advances 15, no. 3 (2023): 029–31. http://dx.doi.org/10.30574/gjeta.2023.15.3.0098.

Der volle Inhalt der Quelle
Annotation:
Security is one of the core areas of study in recent days. Encryption of the image is widely known as an effective method for its secure transmission. The objective of any image encryption method is to obtain a top quality hidden image in order to keep information secret. This paper is a study of research authors in the field of image encryption with a research review to see how the field of image encryption has progressed and the best algorithms in their performance.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Wedad, Abdul Khuder Naser, Abbas Kadhim Amal, and Hyder Abbas Safana. "Subject review: Image encryption techniques." Global Journal of Engineering and Technology Advances 16, no. 1 (2023): 029–31. https://doi.org/10.5281/zenodo.8275766.

Der volle Inhalt der Quelle
Annotation:
Security is one of the core areas of study in recent days. Encryption of the image is widely known as an effective method for its secure transmission. The objective of any image encryption method is to obtain a top quality hidden image in order to keep information secret. This paper is a study of research authors in the field of image encryption with a research review to see how the field of image encryption has progressed and the best algorithms in their performance.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Farhan, Mohammed Mahmoud. "Image Authentication Using Public Key." Al-Salam Journal for Engineering and Technology 4, no. 1 (2024): 78–87. http://dx.doi.org/10.55145/ajest.2025.04.01.007.

Der volle Inhalt der Quelle
Annotation:
This study talked about importance of data protection during Internet communication and highlights the utilize of image encryption as a specialized method. Image encryptions contain the utilize of unique key values to hide and show messages within images, with algorithms that are difficult to decryption. This work focuses on a modified version of the Rivest-Shamir-Adleman (RSA) encryption system, which is compatible with grayscale and color images and is implemented in C#. Additionally, it combines Advanced Encryption Standard (AES) and cryptography techniques to enhance encryption protection.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Annadurai, Narmadha, and Agusthiyar Ramu. "Bolstering image encryption techniques with blockchain technology - a systematic review." International Journal of Informatics and Communication Technology (IJ-ICT) 14, no. 2 (2025): 594. https://doi.org/10.11591/ijict.v14i2.pp594-604.

Der volle Inhalt der Quelle
Annotation:
Multimedia data plays a momentous role in present world. With the advancements in various fields of research like internet of things (IoT), industrial IoT (IIoT), cloud computing, medical image processing, and many more technologies, the digital images have already encroached the multimedia eon. The major challenge lies in providing a tamper proof image with higher level of security and confidentiality while being transmitted through a public network. Image encryption techniques are considered to be the predominant method to anticipate security from any unauthorized user access. This has indee
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Pushpendra, Tiwari. "A study and comparison of the various cryptography technique standards within fifteen factors." i-manager's Journal on Digital Forensics & Cyber Security 1, no. 1 (2023): 21. http://dx.doi.org/10.26634/jdf.1.1.19134.

Der volle Inhalt der Quelle
Annotation:
This paper focuses on analyzing the performance of various encryption algorithms, namely RSA, ECC, and DSA, in terms of encrypting and decrypting sensitive data. Encryption is crucial for ensuring the security of data, and there are two types of encryption algorithms: Symmetric key and Asymmetric-key encryption. RSA is highly secure but has high computation time, whereas ECC provides equivalent security with lower computing power and battery usage. The study compares the implementation and analysis of DES, 3DES, AES, RSA, ECC, and DSA, highlighting their strengths and weaknesses. The paper aim
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Dr., Khaled Musa. "Evaluating Encryption Algorithm Method Based on Software Encryption Tools for Information Security." International Journal of Current Science Research and Review 06, no. 06 (2023): 3188–94. https://doi.org/10.5281/zenodo.8013027.

Der volle Inhalt der Quelle
Annotation:
<strong>ABSTRACT:</strong> Information security is the combination of policies, rules and practices to prevent any unauthorized access or attacks that causes corruption to data, information, and computing services. Information security techniques and programs are built around the core objective to secure data and information by adapting encryption algorithms methods. Encryption algorithm methods impeded in the information security programs or encryption software tools enforce more security by encrypting and decrypting data and information. Encryption algorithm methods are based on algorithms t
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

El-Yahyaoui, Ahmed, and Mohamed Daifr Ech-Cherif El Kettani. "About Fully Homomorphic Encryption Improvement Techniques." International Journal of Embedded and Real-Time Communication Systems 10, no. 3 (2019): 1–20. http://dx.doi.org/10.4018/ijertcs.2019070101.

Der volle Inhalt der Quelle
Annotation:
Fully homomorphic encryption schemes (FHE) are a type of encryption algorithm dedicated to data security in cloud computing. It allows for performing computations over ciphertext. In addition to this characteristic, a verifiable FHE scheme has the capacity to allow an end user to verify the correctness of the computations done by a cloud server on his encrypted data. Since FHE schemes are known to be greedy in term of processing consumption and slow in terms of runtime execution, it is very useful to look for improvement techniques and tools to improve FHE performance. Parallelizing computatio
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Joshi, Bineet, Bansidhar Joshi, Anupama Mishra, Varsha Arya, Avadhesh Kumar Gupta, and Dragan Peraković. "A Comparative Study of Privacy-Preserving Homomorphic Encryption Techniques in Cloud Computing." International Journal of Cloud Applications and Computing 12, no. 1 (2022): 1–11. http://dx.doi.org/10.4018/ijcac.309936.

Der volle Inhalt der Quelle
Annotation:
In cloud computing, a third party hosts a client's data, which raises privacy and security concerns. To maintain privacy, data should be encrypted by cryptographic techniques. However, encrypting the data makes it unsuitable for indexing and fast processing, as data needs to be decrypted to plain text before it can be further processed. Homomorphic encryption helps to overcome this shortcoming by allowing users to perform operations on encrypted data without decryption. Many academics have attempted to address the issue of data security, but none have addressed the issue of data privacy in clo
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Al-khafaji, Baydaa-Jaffer. "An approach for encrypting images using a four-dimensional logistic map." Wasit Journal for Pure sciences 3, no. 2 (2024): 140–45. http://dx.doi.org/10.31185/wjps.343.

Der volle Inhalt der Quelle
Annotation:
Encrypting image transmission has been one of the most complex challenges with communication technology ever. Millions of people utilize and share photographs via the internet for personal and professional purposes. One approach to secure picture transfer over the network is to use encryption techniques to transform the original picture into an unreadable or garbled version. Several novel and encouraging possibilities for creating secure Image data encryption techniques are presented by cryptographic algorithms grounded in chaotic logistic theory. Developing a foolproof method for encrypting b
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Kaur, Mandeep, Surender Singh, and Manjit Kaur. "Computational Image Encryption Techniques: A Comprehensive Review." Mathematical Problems in Engineering 2021 (July 19, 2021): 1–17. http://dx.doi.org/10.1155/2021/5012496.

Der volle Inhalt der Quelle
Annotation:
Images contain very sensitive and confidential information. Because images play a significant role in many applications such as military communication, remote-sensing, and medical-imaging, therefore, it is necessary to protect sensitive and confidential information from unauthorized use and modification. To achieve this objective, encryption is one of the best methods among the information hiding methods. In recent years, many image encryption approaches are designed by the researchers. They use different concepts for image encryption to increase security. The main aim of this paper is to pres
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Kumar, Brijesh, and Amrita Saraswat. "Security on Cloud using High Level Encryption Techniques." International Journal of Trend in Scientific Research and Development Volume-1, Issue-6 (2017): 915–18. http://dx.doi.org/10.31142/ijtsrd4712.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Selvi, J. Helen Arokia, and T. Rajendran. "DNA Encoding and Chaos based Image Encryption Technique for Cloud Storage and Communications." Indian Journal Of Science And Technology 18, no. 9 (2025): 734–44. https://doi.org/10.17485/ijst/v18i9.3557.

Der volle Inhalt der Quelle
Annotation:
Objectives: To suggest an image encryption system that uses DNA encoding and chaotic maps with SHA -512 secret key to provide a secure, efficient, and deterministic mechanism for protecting digital RGB images from unwanted access, manipulation during transmission and cloud storage. Methods: This strategy uses the distinctive features of DNA encoding and chaotic systems to improve image encryption performance. The hybrid technique in the present study uses DNA Encoding with 4 rules and a chaotic mechanism with SHA-512 secret key for image encryption. This technique is compared with Advanced Enc
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Mahna, Shivanku, and Sravan Ch. "Data Encryption Techniques for USB." International Journal of Computer Applications 104, no. 7 (2014): 14–17. http://dx.doi.org/10.5120/18213-9162.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

SIROMONEY, RANI, K. G. SUBRAMANIAN, and P. J. ABISHA. "ENCRYPTION-DECRYPTION TECHNIQUES FOR PICTURES." International Journal of Pattern Recognition and Artificial Intelligence 03, no. 03n04 (1989): 497–503. http://dx.doi.org/10.1142/s0218001489000371.

Der volle Inhalt der Quelle
Annotation:
Language theoretic public key cryptosystems for strings and pictures are discussed. Two methods of constructing public key cryptosystems for the safe transmission or storage of chain code pictures are presented; the first one encrypts a chain code picture as a string and the second one as a two-dimensional array.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Vasim Ahamad, Mohd, Misbah Urrahman Siddiqui, Maria Masroor, and Urooj Fatima. "An Improved Playfair Encryption Technique Using Fibonacci Series Generated Secret Key." International Journal of Engineering & Technology 7, no. 4.5 (2018): 347. http://dx.doi.org/10.14419/ijet.v7i4.5.20104.

Der volle Inhalt der Quelle
Annotation:
With the technology advancements and easy availability of internet, every day millions of users share information electronically through emails, file sharing, e-commerce, etc. As, internet is highly vulnerable to various attacks, sending sensitive information over the Internet may be dangerous. One of the ways to protect the sensitive Information is using the cryptographic techniques. So, while sharing sensitive information over the Internet, it should be sent in encrypted form to prevent the access by unauthorized person. Encryption can be defined as the process of transforming information in
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Ranjan, Kumar H. S., Safeeriya S. P. Fathimath, Ganesh Aithal, and Surendra Shetty. "A Survey on Key(s) and Keyless Image Encryption Techniques." Cybernetics and Information Technologies 17, no. 4 (2017): 134–64. http://dx.doi.org/10.1515/cait-2017-0046.

Der volle Inhalt der Quelle
Annotation:
AbstractAs in recent years digital data transmission and image application have been increasing, maintaining secure transmission of image is of high importance. Image Encryption is implemented to achieve security on image applications. This paper exhibits a survey on various existing image encryption techniques. The paper mainly focuses on two types: Image encryption with Key(s) and Image Encryption without Key(s). In addition it also describes several properties of a good image encryption technique. The paper presents a survey of most popular algorithms and research papers that are related wi
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Adeyemi Afolayan Adesola, Awele Mary-rose Ilusanmi, and Peter Chimee. "A review of the cryptographic approaches to data security: The impact of quantum computing, evolving challenges and future solutions." World Journal of Advanced Research and Reviews 25, no. 2 (2025): 1916–24. https://doi.org/10.30574/wjarr.2025.25.2.0434.

Der volle Inhalt der Quelle
Annotation:
Cryptography plays a fundamental role in defending digital data against cyberthreats and emerging quantum computer capabilities. This review discusses core cryptographic techniques such as symmetric encryption, asymmetric encryption and cryptographic hashing, as well as advanced techniques like lattice-based cryptography , code-based cryptography, multi-variate polynomial cryptography and hash-based cryptography that are quantum resistant. The review share insight into the applications of cryptographic techniques in securing communications, encrypting databases, blockchain technology, and heal
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

Dr.R.Premkumar., Dr.C.Priya., S.Vengatesh Kumar.,, Dr M. Vidhyalakshmi &. Dr S. Saranya;. "Investigation on Image Encryption Using Chaos Based Techniques." International Journal for Modern Trends in Science and Technology 7, no. 05 (2021): 147–53. http://dx.doi.org/10.46501/ijmtst0705025.

Der volle Inhalt der Quelle
Annotation:
As the trading of information over the open systems and internet is quickly developing, security of the information turns into a major concern. One conceivable answer for this issue is to encode the information. Chaos has been generally utilized for image encryption for its diverse elements. There are numerous chaotic based encryption procedures for information concealing like validation, hashing, cryptography have been created and are in practice nowadays. This paper moreover investigates the properties of various mapping techniques that stretches out to the execution parameters utilized as a
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

S, Murugesan, S. Ashok Kumar, Tamilselvi K, and Thiyagarajan T. "PRIVACY-PRESERVING TECHNIQUES IN BIG DATA AND INFORMATION SECURITY." ICTACT Journal on Communication Technology 15, no. 3 (2024): 3320–24. http://dx.doi.org/10.21917/ijct.2024.0493.

Der volle Inhalt der Quelle
Annotation:
In the era of big data, ensuring privacy while processing vast amounts of sensitive information poses a significant challenge. Traditional encryption methods often fall short in maintaining both privacy and data utility during computation. This paper introduces Two-Trapdoor Homomorphic Encryption (TTHE), a novel approach designed to enhance privacy-preserving capabilities in big data and information security. TTHE combines the strengths of trapdoor functions with homomorphic encryption to enable secure data processing without compromising privacy. With the exponential growth of data, safeguard
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Alauldeen Al-Bayati, Hajir, Lahieb M. Jawad, and Dalal N. Hamod. "Exploring Visual Cryptography Techniques: A Comprehensive Review." Al-Nahrain Journal of Science 27, no. 3 (2024): 97–108. https://doi.org/10.22401/anjs.27.3.12.

Der volle Inhalt der Quelle
Annotation:
The backdrop: visual cryptography represents a contemporary encryption technology valued for its ease of implementation and comprehensibility, eliminating the need for a secure channel for key transmission and similar requirements. This paper aims: delve into the diverse methods employed in optical encryption, exploring their advantages and drawbacks, with a particular focus on image encryption techniques and the outcomes documented in various research studies. The objective is to identify the strengths and weaknesses inherent in these methodologies, paving the way for potential solutions in t
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Parthasarathy, Rajamohan, Seow Soon Loong, and Preethy Ayyappan. "An Efficient Encryption Implementation Using AES Algorithm Techniques." Journal of Engineering & Technological Advances 3, no. 1 (2018): 61–70. http://dx.doi.org/10.35934/segi.v3i1.61.

Der volle Inhalt der Quelle
Annotation:
The AES algorithm is a symmetric block cipher that can encrypt, (encipher), and decrypt, (decipher), information. Encryption converts data to an unintelligible form called cipher-text. Decryption of the cipher-text converts the data back into its original form, which is called plaintext. The AES algorithm is capable of using cryptographic keys of 128, 192, and 256 bits to encrypt and decrypt data in blocks of 128 bits. The National Institute of Standards and Technology, (NIST), solicited proposals for the Advanced Encryption Standard, (AES). The AES is a Federal Information Processing Standard
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Namdeo, Thorat Nilesh, Amit Singla, and Tanaji Dhaigude. "VISUAL CRYPTOGRAPHY WITH COLOR IMAGE ENCRYPTION VIA IMPROVED ELLIPTIC CURVE CRYPTOGRAPHY (ECC) AND OTP GENERATION: SELF-IMPROVED GOLD RUSH OPTIMIZATION ALGORITHM FOR OPTIMAL KEY GENERATION." International Journal of Innovations & Research Analysis 04, no. 03(I) (2024): 52–58. http://dx.doi.org/10.62823/ijira/4.3(i).6808.

Der volle Inhalt der Quelle
Annotation:
Visual Cryptography is a cryptographic technique that involves encrypting images in such a way that decryption can be performed visually without the need for complex computations. This technique holds significant importance in secure image sharing, as it ensures that sensitive visual information remains confidential during transmission. Recognizing this significance, a novel approach named Self-Improved Gold Rush Optimization (SIGRO)-based Visual Cryptography has been proposed in this research. This approach encompasses two main phases: Embedding and Extraction. It involves encrypting three or
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

Abdulbaqi, et. al., Azmi Shawkat. "Exploring the potential of offline cryptography techniques for securing ECG signals in healthcare." Periodicals of Engineering and Natural Sciences (PEN) 11, no. 3 (2023): 148–54. https://doi.org/10.21533/pen.v11.i3.142.

Der volle Inhalt der Quelle
Annotation:
In the research, a software for ECG signal based on Chaos encryption based on C#-programmed and Kit of Microsoft Visual Studio Development was implemented. A chaos logic map (ChLMp ) and its initial value are utilized to create Level-1 ECG signal based on Chaos encryption bit streams. A ChLMp, an initial value, a ChLMp bifurcation parameter, and two encryption level parameters are utilized to create level-2 ECG signal based on Chaos encryption bit streams. The level-3 ECG signal based on Chaos encryption software utilizes two parameters for the level of encryption, a permutation mechanism, an
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

Jameel, Enas Ali, and Sameera Abbas Fadhel. "Digital Image Encryption Techniques: Article Review." Technium: Romanian Journal of Applied Sciences and Technology 4, no. 2 (2022): 24–35. http://dx.doi.org/10.47577/technium.v4i2.6026.

Der volle Inhalt der Quelle
Annotation:
In this age of the multi-media, images have an important impact on communication. When users upload images over an insecure communication network, total security is a difficult problem to address in order to maintain image confidentiality. Also, encryption is a technique for keeping images secret. This study gives a basic introduction to cryptography, as well as a concise overview regarding the many image encryption algorithms' elemental security criteria. This paper includes an overview of several image encryption approaches as well as a comparison of discrete image encoding techniques, befor
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Simkin, Mark G. "Using Spreadsheets to Teach Data Encryption Techniques." AIS Educator Journal 1, no. 1 (2006): 27–37. http://dx.doi.org/10.3194/aise.2006.1.1.27.

Der volle Inhalt der Quelle
Annotation:
There are a variety of reasons why understanding encryption technology is likely to become increasingly important in the future, and therefore why accounting courses are likely to include encryption materials in future curricula. This paper discusses five encryption techniques: transposition ciphers, cyclic substitution ciphers, Vigenere ciphers, exclusive OR ciphers, and permutation ciphers. Accompanying these discussions are explanations of how instructors can demonstrate these techniques with spreadsheet models. The author's experiences with such models in classroom use have been uniformly
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Subramanian N., Dr Venkata, and Dr Shankar Sriram V S. "Mitigating DDoS Attacks in Virtual Machine Migration: An In-Depth Security Framework Utilizing Deep Learning and Advanced Encryption Techniques." International Journal of Innovative Technology and Exploring Engineering 14, no. 2 (2025): 12–20. https://doi.org/10.35940/ijitee.b1032.14020125.

Der volle Inhalt der Quelle
Annotation:
Safeguarding virtual machines (VMs) during migration is essential to avert Service Level Agreement (SLA) violations. This research article presents a robust security framework that utilizes deep learning and advanced encryption methods to reduce the impact of Distributed Denial of Service (DDoS) attacks during virtual machine migration. The study introduces an Improved Sparrow Search Algorithm-based Deep Neural Network (ISSA-DNN) for the classification of DDoS attacks and utilizes Advanced Encryption Standard-Elliptic Curve Cryptography (AES-ECC) to safeguard virtual machine images. The primar
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Dr., Venkata Subramanian N. "Mitigating DDoS Attacks in Virtual Machine Migration: An In-Depth Security Framework Utilizing Deep Learning and Advanced Encryption Techniques." International Journal of Innovative Technology and Exploring Engineering (IJITEE) 14, no. 2 (2025): 12–20. https://doi.org/10.35940/ijitee.B1032.14020125.

Der volle Inhalt der Quelle
Annotation:
<strong>Abstract: </strong>Safeguarding virtual machines (VMs) during migration is essential to avert Service Level Agreement (SLA) violations. This research article presents a robust security framework that utilizes deep learning and advanced encryption methods to reduce the impact of Distributed Denial of Service (DDoS) attacks during virtual machine migration. The study introduces an Improved Sparrow Search Algorithm-based Deep Neural Network (ISSA-DNN) for the classification of DDoS attacks and utilizes Advanced Encryption Standard-Elliptic Curve Cryptography (AES-ECC) to safeguard virtual
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Omolara Patricia Olaiya, Temitayo Oluwadamilola Adesoga, Azeez Adekunle Adebayo, Fehintola Moyosore Sotomi, Oluwaseun Aaron Adigun, and Paschal M Ezeliora. "Encryption techniques for financial data security in fintech applications." International Journal of Science and Research Archive 12, no. 1 (2024): 2942–49. http://dx.doi.org/10.30574/ijsra.2024.12.1.1210.

Der volle Inhalt der Quelle
Annotation:
In the dynamic world of financial technology (Fintech), securing financial data is a key priority. Increasing digital connectivity, adoption of cloud-based services requiring complex measures to protect the integrity, privacy and availability of sensitive information. Encryption techniques are emerging as a key tool to achieve these goals about itself by converting plaintext into ciphertext, protected from unauthorized access and probability violations. This review paper examines the various encryption techniques required to secure financial information in fintech applications. The main method
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Abu Zitar, Raed, and Muhammed J. Al-Muhammed. "Hybrid encryption technique: Integrating the neural network with distortion techniques." PLOS ONE 17, no. 9 (2022): e0274947. http://dx.doi.org/10.1371/journal.pone.0274947.

Der volle Inhalt der Quelle
Annotation:
This paper proposes a hybrid technique for data security. The computational model of the technique is grounded on both the non-linearity of neural network manipulations and the effective distortion operations. To accomplish this, a two-layer feedforward neural network is trained for each plaintext block. The first layer encodes the symbols of the input block, making the resulting ciphertext highly uncorrelated with the input block. The second layer reverses the impact of the first layer by generating weights that are used to restore the original plaintext block from the ciphered one. The disto
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Gosavi, Mr Abhijeet, Mr Sakib Shaikh, Mr Adnan Sayyed, Mr Somesh Sapa, Mr Ayan Shaikh, and Prof A. A. Pund. "Enabling Encrypted Cloud Emails with Data Encryption using Advanced Encryption Techniques." International Journal for Research in Applied Science and Engineering Technology 11, no. 6 (2023): 864–69. http://dx.doi.org/10.22214/ijraset.2023.53709.

Der volle Inhalt der Quelle
Annotation:
Abstract: Cloud computing offers a flexible and convenient means of exchanging data, with several advantages for both society and individuals. With the widespread usage of cloud emails and frequent reports of large-scale email leakage occurrences, the security property known as forward secrecy has become desirable and necessary for both users and cloud email service providers to increase the security of cloud email systems. Typical techniques of attaining forward secrecy, such as Diffie-Hellman key exchange and forward-secure public-key encryption, have not been extensively authorized and used
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Prashant, MD Sohail Haque, Amrinder Kaur, and Pankaj Yadav. "Comparative Analysis of AES and RSA with Other Encryption Techniques for Secure Communication." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 2 (2024): 565–74. http://dx.doi.org/10.32628/cseit2410263.

Der volle Inhalt der Quelle
Annotation:
In today’s digitized era, where the whole world is interconnected and every information about individuals are collected, it is important to process and store the data such that it is safe from unauthorized access. Encryption is used to turn the plain text into cipher text which makes the data unreadable, thus maintaining its confidentiality and integrity. Among the several encryption methods available, Advanced Encryption Standard (AES) and Rivest Shamir Adleman (RSA) are popularly used due to their effectiveness and efficiency. However, alternative encryption techniques exist, each offers dif
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Al-Fayoumi, Mustafa A., Ammar Odeh, Ismail Keshta, and Ashraf Ahmad. "Techniques of medical image encryption taxonomy." Bulletin of Electrical Engineering and Informatics 11, no. 4 (2022): 1990–97. http://dx.doi.org/10.11591/eei.v11i4.3850.

Der volle Inhalt der Quelle
Annotation:
Medical images are one of the most significant and sensitive data types in computer systems. Sending medical images over the internet necessitates using a robust encryption scheme that is resistant to cryptographic attacks. Confidentiality is the most critical part of the three security objectives for information systems security, namely confidentiality, integrity, and availability. Confidentiality is the most critical aspect for the secure storage and transfer of medical images. In this study, we attempt to classify various encryption methods in order to assist researchers in selecting the op
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Mustafa, A. Al-Fayoumi, Odeh Ammar, Keshta Ismail, and Ahmad Ashraf. "Techniques of medical image encryption taxonomy." Bulletin of Electrical Engineering and Informatics 11, no. 4 (2022): 1990~1997. https://doi.org/10.11591/eei.v11i4.3850.

Der volle Inhalt der Quelle
Annotation:
Medical images are one of the most significant and sensitive data types in computer systems. Sending medical images over the internet necessitates using a robust encryption scheme that is resistant to cryptographic attacks. Confidentiality is the most critical part of the three security objectives for information systems security, namely confidentiality, integrity, and availability. Confidentiality is the most critical aspect for the secure storage and transfer of medical images. In this study, we attempt to classify various encryption methods in order to assist researchers in selecting the op
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

M, Sreekala, and Varghese Paul. "A Novel Hybrid Encryption Method for Multimedia Encryption Using Elliptic Curve Cryptography and TDMRC." International Journal of Emerging Research in Management and Technology 6, no. 7 (2018): 1. http://dx.doi.org/10.23956/ijermt.v6i7.178.

Der volle Inhalt der Quelle
Annotation:
We are in the era of digital revolution and the benefits are remarkable. People are much dependent on digital technology and can’t survive without it. With the advancement of Internet and its applications, we share a wide range of data including texts, images, audios and videos in a more extensive space and time scope that we never had before. This increases the need for security day by day. Cryptography is an art of Science that uses complex logic in order to design powerful encryption techniques. Both symmetric and asymmetric key encryptions have their own advantages. Time Dependant Multiple
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!