To see the other types of publications on this topic, follow the link: Encryption process.

Journal articles on the topic 'Encryption process'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Encryption process.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Alawi, Attaa R., and Nidaa F. Hassan. "A Proposal Video Encryption Using Light Stream Algorithm." Engineering and Technology Journal 39, no. 1B (2021): 184–96. http://dx.doi.org/10.30684/etj.v39i1b.1689.

Full text
Abstract:
Video encrypting is one technique to protect digital videos, it used to avoid unwanted interference and viewing of the transmitted videos. In this paper, a new selective video cryptography algorithm is suggested using light stream algorithm. As it known video size is large in size and it consume time in the encryption process, ChaCha a light encryption algorithm has been used to reduce the encryption time, encryption is done by Xoring frames of video with the key generated from ChaCha algorithm, it produced an acceptable results from robustness point view, but still encryption process consumed
APA, Harvard, Vancouver, ISO, and other styles
2

Huda Anwar and Zill e Shams. "Algorithms of Encryption Using Graph Theory." Mathematical Sciences and Applications 2, no. 2 (2023): 73–85. http://dx.doi.org/10.52700/msa.v2i2.16.

Full text
Abstract:
Encryption plays a vital role in securing sensitive information in various domains from communication networks to financial transactions. Graph theory, with its vast mathematical framework and powerful algorithms, presents a potential method for creating encryption methods. This abstract introduces an algorithm that leveragesgraph theory concepts to provide a symmetric encryption method. Encryption is the process of hiding the original plain-text message by producing a cipher text; decryption is the process of resolving the cipher text to reveal the original plain-text message. In this researc
APA, Harvard, Vancouver, ISO, and other styles
3

Agarwal, Sohit, and Gagan Joshi. "Hybrid Encryption of Cloud Processing With IOT Devices Using DNA And RSA Cryptography." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 6 (2023): 21–27. http://dx.doi.org/10.17762/ijritcc.v11i6.6767.

Full text
Abstract:
The research paper titled "Hybrid Data Encryption as well as Decryption Using Hybrid RSA and DNA" develops a hybrid cryptosystem by combining the usefulness of such an asymmetric-key (public-key) cryptosystem with the efficacy of a symmetric-key (private-key) cryptosystem. These two types of cryptosystems use different types of keys. The method addresses concerns regarding the users' right to privacy, authentication, and accuracy by utilizing a data encryption process that is secure in both directions. Both the process of encrypting data and the process of decrypting data, which are both utili
APA, Harvard, Vancouver, ISO, and other styles
4

Abeer Salim Jamil, Raghad Abdulaali Azeez, and Nidaa Flaih Hassan. "An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments." International Journal of Online and Biomedical Engineering (iJOE) 19, no. 01 (2023): 93–106. http://dx.doi.org/10.3991/ijoe.v19i01.36901.

Full text
Abstract:
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Guang Shi. "Research on Encryption Method of the GML Spatial Data in Geographic Information Sharing System." Advanced Materials Research 756-759 (September 2013): 1506–10. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1506.

Full text
Abstract:
This paper analyzed the typical architecture of geographic information sharing system based on GML spatial data, pointed out the security risks existed in the network transmission process of the GML spatial data and drawbacks of the existing security transport mechanisms in such a shared system. Further, the paper elaborates on advantages of encrypting the GML data using XML Encryption technology and the encryption process of the GML spatial data. On this basis, the paper gives an application example which encrypts all or part of spatial data in GML documents by the XML Encryption technology.
APA, Harvard, Vancouver, ISO, and other styles
6

Limbachia, Dipen. "Encryption of Card Details Using AES with a 128-bit Key a Secure Approach to Data Protection." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 03 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem29484.

Full text
Abstract:
Data security is a critical concern in today's digital age, particularly regarding the protection of sensitive information such as cardholder data. This research paper explores the implementation of Advanced Encryption Standard (AES) encryption with a 128-bit key as a means of safeguarding card details. The project demonstrates the encryption and decryption process, ensuring data confidentiality and integrity. Utilizing the pycryptodome library in Python, the AES encryption technique is applied to encrypt card details, offering a secure approach to data protection. The methodology section outl
APA, Harvard, Vancouver, ISO, and other styles
7

Abdul Hussien, Farah Tawfiq, Abdul Monem S. Rahma, and Hala Bahjat Abdul Wahab. "A Secure Environment Using a New Lightweight AES Encryption Algorithm for E-Commerce Websites." Security and Communication Networks 2021 (December 24, 2021): 1–15. http://dx.doi.org/10.1155/2021/9961172.

Full text
Abstract:
Providing security for transmitted data through the e-commerce environment requires using a fast and high secure encryption algorithm. Balancing between the speed and the security degree is a problem that many of the encryption algorithms suffer from. Increasing the security degree requires increasing the level of complexity which results in increasing encryption time. On the other hand, increasing the algorithm speed may reduce the complexity degree which affects the security level. This paper aims to design an encryption algorithm that balances time and complexity (speed and security). This
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, Yibo. "Discussion and Optimization of AES and SM4 Encryption Algorithms." Frontiers in Computing and Intelligent Systems 12, no. 1 (2025): 119–24. https://doi.org/10.54097/cm6eq023.

Full text
Abstract:
This paper creates a new direction for the operation optimization of Simplified Message Block Cipher for 128-bit Data encryption (SM4) national cipher algorithm, which combines with AES algorithm to provide a simpler encryption method for SM4 algorithm. The AES algorithm is for the whole file system-based f encryption scheme, and the implementation concept is to encrypt the file and maintain data security by encrypting files to encrypt and maintain data security. The advantages of this encryption method are that they have few key numbers and are easy to manage. The disadvantage is that when a
APA, Harvard, Vancouver, ISO, and other styles
9

Nori, Ahmed S., and Ansam O. Abdulmajeed. "Design and implementation of Threefish cipher algorithm in PNG file." Sustainable Engineering and Innovation 3, no. 2 (2021): 79–91. http://dx.doi.org/10.37868/sei.v3i2.id131.

Full text
Abstract:
This paper is presenting design and implementation of Threefish block cipher on grayscale images. Despite the fact that Threefish block cipher is one of the best secure algorithms, most studies concerning Threefish have focused on hardware implementation and have not commonly been applied on image encryption due to huge amount of data. The main contribution here was to reduce the time and the amount of data to be encrypted while maintaining encryption performance. This objective was achieved by encrypting just the most significant bits of image pixels. A 256-bit plain text blocks of the Threef
APA, Harvard, Vancouver, ISO, and other styles
10

Milian, Yanuar Chris, and Wiwin Sulistyo. "Model Pengembangan Keamanan Data dengan Algoritma ROT 13 Extended Vernam Cipher dan Stream Cipher." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 7, no. 2 (2023): 208–16. http://dx.doi.org/10.35870/jtik.v7i2.716.

Full text
Abstract:
This research focuses on the importance of data security in maintaining confidentiality, particularly for sensitive and critical information that should only be accessed by certain parties. Cryptography is a mathematical method used to secure data. Several methods are available, including ROT13, Vernam Cipher, and Stream Cipher. This study combines these three methods to achieve a higher level of data security. The analysis shows that the combination of these algorithms results in a stronger and more complex encryption process than using a single method. The process involves encrypting plainte
APA, Harvard, Vancouver, ISO, and other styles
11

Zhang, Zhenhua, Deqi Huang, Yating Tu, and Zikuang Ye. "Layer multiplexing and DNA based color image encryption." Journal of Physics: Conference Series 2858, no. 1 (2024): 012039. http://dx.doi.org/10.1088/1742-6596/2858/1/012039.

Full text
Abstract:
Abstract A layer multiplexing-based encrypted image scheme for DNA color images is proposed. Firstly, a memristor is added to the Sprott-B chaotic system to make it a fourth-order memristorised hyper-chaotic system. The hyperchaotic system has better pseudo-randomness. The encryption system proposed generates the initial value of the system by SHA3-256 function to achieve “One image, one secret”. The chaotic sequence is generated by a memory hyperchaotic system for encrypting the image. The encryption process includes image zero complements, image chunking, DNA encryption, layer multiplexing,
APA, Harvard, Vancouver, ISO, and other styles
12

Wu, Yuchen. "Theoretical Analysis of AES Encryption Optimization Based on Quaternions and Rotation Matrices." Theoretical and Natural Science 100, no. 1 (2025): 75–82. https://doi.org/10.54254/2753-8818/2025.21702.

Full text
Abstract:
As a commonly used symmetric encryption method, AES (Advanced Encryption Standard) still has some steps that cannot fully ensure the effectiveness of encryption, and Symmetric Key Encryption has the risk of key leakage in common. This paper mainly researches an optimization model of AES encryption method, which is based on the original AES encryption method. This model adds another password in the SubByte and MixColumns step, in order to ensure the effectiveness of encryption. The optimization model is achieved with programs on python. Experimental data shows that the encryption process is too
APA, Harvard, Vancouver, ISO, and other styles
13

Alrayes, Fatma S., Latifah Almuqren, Abdullah Mohamed, and Mohammed Rizwanullah. "Image encryption with leveraging blockchain-based optimal deep learning for Secure Disease Detection and Classification in a smart healthcare environment." AIMS Mathematics 9, no. 6 (2024): 16093–115. http://dx.doi.org/10.3934/math.2024779.

Full text
Abstract:
<abstract> <p>Blockchain (BC) in healthcare can be used for sharing medical records and secure storage and other confidential data. Deep learning (DL) assists in disease recognition through image analysis, specifically in detecting medical conditions from images. Image encryption ensures the security and privacy of medical images by encrypting the image before sharing or storage. The combination of image encryption, BC, and DL provides an efficient and secure system for medical image analysis and disease detection in healthcare. Therefore, we designed a new BC with an Image Encrypt
APA, Harvard, Vancouver, ISO, and other styles
14

Ranasinghe, Rajitha, Madusha Chathurangi, and Pabasara Athukorala. "A novel improvement in RSA algorithm." Journal of Discrete Mathematical Sciences & Cryptography 27, no. 1 (2024): 143–50. http://dx.doi.org/10.47974/jdmsc-1628.

Full text
Abstract:
In this study, we propose a new cryptographic scheme based on the textbook RSA algorithm associating the concept of continued fractions. The algorithm is designed under the three primary steps of key generation, encryption, and decryption. The key generation of the system is improved to generate a large encryption key without affecting the decryption key. The use of continued fractions gives an additional advantage as it encrypts a string of plaintexts by encrypting only two integers which optimizes the time and the memory consumption. The encryption process and the decryption process are simi
APA, Harvard, Vancouver, ISO, and other styles
15

Susanto, Arief, Tutik Khotimah, Muhammad Taufik Sumadi, Joko Warsito, and Rihartanto . "Image encryption using vigenere cipher with bit circular shift." International Journal of Engineering & Technology 7, no. 2.2 (2018): 62. http://dx.doi.org/10.14419/ijet.v7i2.2.12734.

Full text
Abstract:
Cryptography is a method of securing text data, images and sound in order to secure its confidentiality and to minimize data stealing, attack, etc. The purpose of this study is to improve classic Vigenere cipher using bit circular shift on image encryption. This experiment uses both RGB and grayscale images as samples and shows that Vigenere cipher with bit circular shift has better performance when encrypting an image both visually and its randomness. It is obtained the MAE values of images of final encryption process are 81.702637 of RGB and 73.678756 of grayscale, and the final decryption p
APA, Harvard, Vancouver, ISO, and other styles
16

Ali Pitchay, Sakinah, Wail Abdo Ali Alhiagem, Farida Ridzuan, and Sundresan Perumal. "Mobile Application Design for Protecting the Data in Cloud Using Enhanced Technique of Encryption." International Journal of Engineering & Technology 7, no. 4.15 (2018): 98. http://dx.doi.org/10.14419/ijet.v7i4.15.21427.

Full text
Abstract:
This paper provides an enhanced technique for improving the security and protecting the privacy of the cloud computing users by encrypting the data before it reached to server’s storage. Encrypting means the process of converting information or data into unreadable language to prevent unauthorized access. This paper will propose a mobile application design, which will allow the user to encrypt and decrypt the data hence maintaining security and privacy. In the proposed system design, the AES Algorithm will handle the encryption of the data using a keyword which will be defined by the user duri
APA, Harvard, Vancouver, ISO, and other styles
17

Al-khafaji, Baydaa-Jaffer. "An approach for encrypting images using a four-dimensional logistic map." Wasit Journal for Pure sciences 3, no. 2 (2024): 140–45. http://dx.doi.org/10.31185/wjps.343.

Full text
Abstract:
Encrypting image transmission has been one of the most complex challenges with communication technology ever. Millions of people utilize and share photographs via the internet for personal and professional purposes. One approach to secure picture transfer over the network is to use encryption techniques to transform the original picture into an unreadable or garbled version. Several novel and encouraging possibilities for creating secure Image data encryption techniques are presented by cryptographic algorithms grounded in chaotic logistic theory. Developing a foolproof method for encrypting b
APA, Harvard, Vancouver, ISO, and other styles
18

Irzayzah, Mr Samyrah M. Abu. "A New Application for Encryption and Decryption Using the TAS Algorithm." International Journal for Research in Applied Science and Engineering Technology 11, no. 11 (2023): 2428–44. http://dx.doi.org/10.22214/ijraset.2023.56928.

Full text
Abstract:
Abstract: Encryption is based on precise algorithms and specific mathematical operations it is indispensable for the security and safety of information and files that are of great importance in our lives. This paper discusses a new encryption and decryption technique, we used very powerful and complex encryption and decryption algorithms. Our study relies on encrypting the blocks according to the code writing style by making the encryption process for each individual block individually and does not depend on all the blocks that precede it in the message. We focus on sending several messages wi
APA, Harvard, Vancouver, ISO, and other styles
19

Namdeo, Thorat Nilesh, Amit Singla, and Tanaji Dhaigude. "VISUAL CRYPTOGRAPHY WITH COLOR IMAGE ENCRYPTION VIA IMPROVED ELLIPTIC CURVE CRYPTOGRAPHY (ECC) AND OTP GENERATION: SELF-IMPROVED GOLD RUSH OPTIMIZATION ALGORITHM FOR OPTIMAL KEY GENERATION." International Journal of Innovations & Research Analysis 04, no. 03(I) (2024): 52–58. http://dx.doi.org/10.62823/ijira/4.3(i).6808.

Full text
Abstract:
Visual Cryptography is a cryptographic technique that involves encrypting images in such a way that decryption can be performed visually without the need for complex computations. This technique holds significant importance in secure image sharing, as it ensures that sensitive visual information remains confidential during transmission. Recognizing this significance, a novel approach named Self-Improved Gold Rush Optimization (SIGRO)-based Visual Cryptography has been proposed in this research. This approach encompasses two main phases: Embedding and Extraction. It involves encrypting three or
APA, Harvard, Vancouver, ISO, and other styles
20

Phyu, Phyu Thwe. "Prevention of Man-In-The-Middle Attack in Diffie-Hellman Key Exchange Algorithm using Proposed Hash Function." International Journal of Advances in Scientific Research and Engineering (ijasre) 5, no. 10 (2019): 192–203. https://doi.org/10.31695/IJASRE.2019.33560.

Full text
Abstract:
<em>The key exchange process is a very important feature for many parts in cryptography. In data encryption, symmetric encryption techniques need to share the same secret key securely between two parties before encryption and this is a challenging task for secure data transmission.</em> <em>Most symmetric key encryptions and key management systems widely use Diffie-Hellman Key Exchange (DHKE) algorithm for the purpose of key distribution because it has simple computation and supports forward security. However, there is no key authentication and Man-In-The-Middle (MITM) attack has occurred duri
APA, Harvard, Vancouver, ISO, and other styles
21

Jamil, Abeer Salim, Nidaa Flaih Hassan, and Raghad Abdulaali Azeez. "Face Encryption based on Feature Extraction Supported by Canny Edge Detector." Webology 19, no. 1 (2022): 1716–30. http://dx.doi.org/10.14704/web/v19i1/web19115.

Full text
Abstract:
Individual privacy protection is regarding a subject in surveillance and security areas. Protection of people's faces in image in linking with complex info, abused cases, involvement, and others on public broadcasting media and social networks are very important. Partial encryption human face is selected to reduce the computational requirements for huge volumes of image data and reducing the computational processing time required to conduct the entire image. In this paper, a new fast algorithm is proposed to encrypt partially human face, at first human face is detected using vole and jones alg
APA, Harvard, Vancouver, ISO, and other styles
22

Saeed, Muhammad, Hafiz Inam Ul Haq, Mubashir Ali, and Mudassira Mustafa. "Innovative Soft Cryptosystem for Encrypting and Decrypting Messages with IDEA." Sustainable Machine Intelligence Journal 9 (October 1, 2024): 89–101. http://dx.doi.org/10.61356/smij.2024.9385.

Full text
Abstract:
This paper introduces an advanced cryptosystem for message encryption and decryption, integrating the International Data Encryption Algorithm (IDEA) with soft set and soft matrix principles. Soft sets, conceptualized by Molodtsov, are adept at managing uncertainty, making them ideal for cryptographic frameworks. Our approach utilizes inverse and characteristic products of soft sets and matrices, combined with the robust IDEA algorithm, to significantly enhance security. The IDEA algorithm operates on 64 -bit data blocks with a 128 -bit key, ensuring strong encryption. Additionally, we incorpor
APA, Harvard, Vancouver, ISO, and other styles
23

Ramadhani, Argia Putri, Nanda Putri Tami, Asih Lestari, and Moh Erkamim. "Layered security model through integration of Vigenere and Hill Cipher in digital message encryption." Journal of Information System and Application Development 2, no. 2 (2024): 144–56. http://dx.doi.org/10.26905/jisad.v2i2.14005.

Full text
Abstract:
The rapid development of digitalization has a significant impact on data and information protection. One approach to protecting data and information is through the use of cryptography. The research aims to combine the use of Vigenere and Hill Cipher algorithms in modeling to maintain the security and confidentiality of digital messages. The focus of this research is on the process of encrypting digital text messages. The layered security in this study takes advantage of the advantages of each algorithm. The combination of the two is designed to increase the complexity of encryption and reduce
APA, Harvard, Vancouver, ISO, and other styles
24

Wang, Pengfei, Yixu Wang, Jiafu Xiang, and Xiaoling Xiao. "Fast Image Encryption Algorithm for Logistics-Sine-Cosine Mapping." Sensors 22, no. 24 (2022): 9929. http://dx.doi.org/10.3390/s22249929.

Full text
Abstract:
Because images are vulnerable to external attacks in the process of network transmission and traditional image encryption algorithms have limitations such as long encryption time, insufficient entropy or poor diffusion of cipher image information when encrypting color images, a fast image encryption algorithm based on logistics-sine-cosine mapping is proposed. The algorithm first generates five sets of encrypted sequences from the logistics-sine-cosine mapping, then uses the order of the encryption sequence to scramble the image pixels and designs a new pixel diffusion network to further impro
APA, Harvard, Vancouver, ISO, and other styles
25

Yeow, Sin-Qian, and Kok-Why Ng. "Neural Network Based Data Encryption: A Comparison Study among DES, AES, and HE Techniques." JOIV : International Journal on Informatics Visualization 7, no. 3-2 (2023): 2086. http://dx.doi.org/10.30630/joiv.7.3-2.2336.

Full text
Abstract:
With the improvement of technology and the continuous expansion and deepening of neural network technology, its application in computer network security plays an important role. However, the development of neural networks is accompanied by new threats and challenges. This paper proposes to encrypt the weight data using encryption algorithms and embed image encryption algorithms to improve protected data security further. The purpose is to address the feasibility and effectiveness of using modern encryption algorithms for data encryption in machine learning in response to data privacy breaches.
APA, Harvard, Vancouver, ISO, and other styles
26

Patil, Vedika, Sakshi Jain, and Yogita Shah. "Secure Cryptography by Using Hash Application." Journal of Cyber Security in Computer System 1, no. 1 (2022): 18–24. http://dx.doi.org/10.46610/jcscs.2022.v01i01.002.

Full text
Abstract:
This project is basically design for ensuring security to all kinds of data format file such as pdf, text, images, audio, videos etc. This is carried out using various keys and hashing algorithm. This project basically helps the end user to protect his/her personal files from the unauthorized user and can also restrict its access to the limited people. This complete process is carried out in two methods that are encryption and decryption. Encryption process required varchar key while encryption the data file which convert the original file in to incomprehensible format. Further in decryption p
APA, Harvard, Vancouver, ISO, and other styles
27

Sharma, Gaurav, Mandeep Chaudhary, Hariom Kumar, and Dr Ajay Sahu. "Machine Learning and Secure Image Transmission for Disease Forecasting." International Research Journal of Computer Science 11, no. 11 (2024): 652–58. https://doi.org/10.26562/irjcs.2024.v1111.04.

Full text
Abstract:
In today’s era of information technology, the rapid expansion of the Internet, especially in the realm of electronic healthcare, has become both feasible and widespread. Internet-enabled electronic healthcare systems allow patients to consult with specialist doctors remotely for diagnoses. Medical images are frequently stored, processed, and transmitted online, and during this process, sensitive data may be involved, requiring strict privacy measures. Given the importance of protecting patient information, encrypting this data is crucial to ensure that only authorized individuals can access it
APA, Harvard, Vancouver, ISO, and other styles
28

Sari, Festy Winda, and Ummi Aisha Ibrahim. "IMAGE ENCRYPTION USING COMBINATION OF CHAOTIC SYSTEM." JOURNAL OF APPLIED MULTIMEDIA AND NETWORKING 8, no. 1 (2024): 1–8. http://dx.doi.org/10.30871/jamn.v8i1.7940.

Full text
Abstract:
These days, image encryption relies on chaos-based theory. Encrypting and decrypting images using random sequences is becoming increasingly popular. Accordingly, this study proposes a method of image encryption based on the Logistic Map and Lorenz System. The encryption and decryption process involves permutation and substitution steps. A permutation is performed using the Logistic Map, which is used for leading randomness of pixels through confusion, while the diffusion process is finished using the Lorenz System. Afterwards, the substitution is performed by bitwise-XORing the value. Througho
APA, Harvard, Vancouver, ISO, and other styles
29

Bozduman, Hanife Çağıl, and Erkan Afacan. "Simulation of a Homomorphic Encryption System." Applied Mathematics and Nonlinear Sciences 5, no. 1 (2020): 479–84. http://dx.doi.org/10.2478/amns.2020.1.00046.

Full text
Abstract:
AbstractCryptology is defined as the science of making communication incomprehensible to third parties who have no right to read and understand the data or messages. Cryptology consists of two parts, namely, cryptography and cryptanalysis. Cryptography analyzes methods of encrypting messages, and cryptanalysis analyzes methods of decrypting encrypted messages. Encryption is the process of translating plaintext data into something that appears to be random and meaningless. Decryption is the process of converting this random text into plaintext. Cloud computing is the legal transfer of computing
APA, Harvard, Vancouver, ISO, and other styles
30

Qin, Ying, and Bob Zhang. "Privacy-Preserving Biometrics Image Encryption and Digital Signature Technique Using Arnold and ElGamal." Applied Sciences 13, no. 14 (2023): 8117. http://dx.doi.org/10.3390/app13148117.

Full text
Abstract:
The scientific study of privacy-preserving biometrics, represented by the palmprint, face, and iris, has grown tremendously. That being said, there has not been much attention paid to the proper preservation, transmission, and authentication of biometric images used in everyday applications. In this paper, we propose a new complete model for encrypting and decrypting biometric images, including their signing and authentication, using a nested algorithm of 3D Arnold Transform. In addition, the ElGamal Encryption Algorithm for the encryption part and the ElGamal Digital Signature for the signatu
APA, Harvard, Vancouver, ISO, and other styles
31

Ma, Haiyun, and Zhonglin Zhang. "A New Private Information Encryption Method in Internet of Things under Cloud Computing Environment." Wireless Communications and Mobile Computing 2020 (September 15, 2020): 1–9. http://dx.doi.org/10.1155/2020/8810987.

Full text
Abstract:
The existence of Internet of Things (IoT) facilitates the collection and transmission of urban data information. However, it can leak users’ personal privacy information in smart cities. Therefore, we propose a new private information encryption method in IoT under cloud computing environment. Under IoT, according to the properties and acquisition time, privacy information can be divided into many subspaces. Then, we analyze the private information encryption with different levels. Based on the stream cipher mechanism, we design an encryption system model of information collection. In the subs
APA, Harvard, Vancouver, ISO, and other styles
32

Huang, Yongzhong, Xueguang Bi, Yucheng Liu, and Yuxia Li. "Development of a Novel Hyperchaos-Based Image Encryption Algorithm Consisting of Two Scrambling-Diffusion Operations." Complexity 2022 (October 4, 2022): 1–15. http://dx.doi.org/10.1155/2022/8765268.

Full text
Abstract:
This paper proposes a hyperchaos-based image encryption algorithm, which consists of two scrambling-diffusion operations and one scrambling operation. In the proposed algorithm, the initial conditions of a hyperchaotic Chen system are first generated using the Message Digest 5 (MD5) value of digital images and given initial values, and then the images will be encrypted using the keystream created by the system. Since the initial values of hyperchaotic Chen systems are related to plaintext and the encryption process is related to the images, this algorithm is able to effectively protect images
APA, Harvard, Vancouver, ISO, and other styles
33

Gulfraz Naqvi, Muhammad Burhan Umar, and Saqib Ali. "Quantum Computing: Principles of Breaking Encryption." JOURNAL OF NANOSCOPE (JN) 4, no. 2 (2023): 83–96. http://dx.doi.org/10.52700/jn.v4i2.95.

Full text
Abstract:
The basis of modern security relies on encryption methods that are practically impossible, but theoretically possible, to break. Quantum computing is a process by which a computer takes advantage of quantum mechanics to solve complex problems. IBM has been working on and has made quantum computers available for almost a decade now. These machines can be used for cryptography related problems like decrypting complex encryptions much faster than the classical computers we have today. So much faster in fact, that a quantum computer can factor a 300-digit number in the same amount of time that a n
APA, Harvard, Vancouver, ISO, and other styles
34

A. Rashid, Abdullah, and Khalid A. Hussein. "Image encryption algorithm based on the density and 6D logistic map." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (2023): 1903. http://dx.doi.org/10.11591/ijece.v13i2.pp1903-1913.

Full text
Abstract:
One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypt
APA, Harvard, Vancouver, ISO, and other styles
35

Abdullah, A. Rashid, and Ali Hussein Khalid. "Image encryption algorithm based on the density and 6D logistic map." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (2023): 1903–13. https://doi.org/10.11591/ijece.v13i2.pp1903-1913.

Full text
Abstract:
One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypt
APA, Harvard, Vancouver, ISO, and other styles
36

Abu-Faraj, Mua’ad, Abeer Al-Hyari, and Ziad Alqadi. "A DUAL APPROACH TO DIGITAL AUDIO SIGNAL CRYPTOGRAPHY." Journal of Southwest Jiaotong University 57, no. 1 (2022): 24–33. http://dx.doi.org/10.35741/issn.0258-2724.57.1.3.

Full text
Abstract:
Nowadays, the digital audio file is considered one of the most important digital data that requires good protection because it may be confidential or of a special nature. This research paper will present an easy-to-implement method to apply the protection process to a very high degree. We will implement this method to prove its efficiency by reducing the encryption and decryption time and thus increasing the throughput of the encryption process. We will calculate the quality parameters to ensure that the quality of the speech is achieved during the encryption and decryption phases passed on th
APA, Harvard, Vancouver, ISO, and other styles
37

Yongjun, Kong, Zhang Minqing, Wang Zexi, Ke Yan, and Huang Siyuan. "Reversible Data Hiding in Encrypted Domain Based on the Error-Correction Redundancy of Encryption Process." Security and Communication Networks 2022 (May 12, 2022): 1–17. http://dx.doi.org/10.1155/2022/6299469.

Full text
Abstract:
The existing reversible data hiding methods in encrypted domain separate image encryption from information embedding and do not make full use of the redundant space in the process of image encryption. In order to improve the performance of reversible data hiding by using the technical characteristics of image encryption, a reversible data hiding method based on McEliece error correction is proposed. Firstly, the segmentation position of bit plane is determined according to the embedding requirement and texture characteristic, and the image is divided into high and low significant bits. Secondl
APA, Harvard, Vancouver, ISO, and other styles
38

Chen, Jie, Xin Zhou, Xing Bai, Cong Li, Zhao Xu, and Yang Ni. "Equivalence analysis of highly scattering process and double random phase encryption process." Acta Physica Sinica 70, no. 13 (2021): 134201. http://dx.doi.org/10.7498/aps.70.20201903.

Full text
Abstract:
The scattering system through a highly scattering thin layer only affects the amplitude and phase distribution of incident light wave, but does not lead the total energy to be attenuated. This process can be regarded as a process that light wave is encoded by the scattering medium, which is similar to a double random phase encryption system. In this paper, firstly, it is proved that the distribution characteristics of speckle generated by the light wave carrying the target information through a strongly scattering thin layer are highly similar to the distribution characteristics of cyphertext
APA, Harvard, Vancouver, ISO, and other styles
39

Sastya Hendri Wibowo and Diana Diana. "Analisis Dan Implementasi Algoritma Rivest Code-5 Pada Keamanan Data." Jurnal Penelitian Teknologi Informasi dan Sains 1, no. 1 (2023): 09–21. http://dx.doi.org/10.54066/jptis-itb.v1i1.187.

Full text
Abstract:
The RC-5 algorithm is an algorithm with the encryption method using the symmetric method and processing in the form of a cipher block, the same keywords are used for the encryption and decryption processes. The testing and analysis phase consists of a). Testing the execution time of the key generation process (set up key) b). Testing the success of the encryption and decryption process on the client-server integration method c). Testing the success of the encryption and decryption process using the file operation method d). Comparison of overhead/file size before and after passing through the
APA, Harvard, Vancouver, ISO, and other styles
40

Wu, Yuan, and Xiao Chun Chen. "File Transparent Encryption System Design Based on Security Directory." Applied Mechanics and Materials 433-435 (October 2013): 1742–46. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1742.

Full text
Abstract:
Using the Minifilter framework and AES group encryption algorithm, the paper develops a filter driver for encrypting the file of particular types under the security directory. The principle of the file system filter driver is discussed here, and makes a special research about the file operation process especially for word format. This paper also makes a deep analysis of transformation mechanism between the plaintext and ciphertext, and the implementation algorithms of encryption and decryption. Finally, the paper describes the method of path filtering in detail.
APA, Harvard, Vancouver, ISO, and other styles
41

Irwanto, Dola. "File Encryption and Decryption Using Algorithm Aes-128 Bit Based Website." MALCOM: Indonesian Journal of Machine Learning and Computer Science 4, no. 2 (2024): 670–77. http://dx.doi.org/10.57152/malcom.v4i2.1305.

Full text
Abstract:
Digital data security has become very important in the current information era. One way to maintain data security is to use encryption and decryption techniques. The Advanced Encryption Standard (AES) algorithm has been proven effective in protecting data with a high level of security. This research aims to implement the AES-128 bit algorithm for online file encryption and decryption via a website. The method used in this research includes developing a website that provides a user interface for uploading and encrypting files, as well as for decrypting files that have been previously encrypted.
APA, Harvard, Vancouver, ISO, and other styles
42

Jaber, Mohanad J., Zahraa Jasim Jaber, and Ahmed J. Obaid. "An efficient hybrid chaotic map-based encryption technique for multiple image security systems." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 5 (2024): 1507–22. http://dx.doi.org/10.47974/jdmsc-1934.

Full text
Abstract:
Researchers are increasingly interested in image encryption in the modern technological era. Their goal is to improve the security of image data from unauthorized sources. Due to its randomness and unpredictable behavior, chaos theory is considered the most suitable method for encrypting images. An image encryption algorithm based on diffusion maps is presented in this paper. An element of nonlinearity is generated by modifying the pixel values with a chaotic map first. Three chaotic maps are used in the proposed image encryption scheme. In an efficient encryption algorithm based on the improv
APA, Harvard, Vancouver, ISO, and other styles
43

Vasim Ahamad, Mohd, Misbah Urrahman Siddiqui, Maria Masroor, and Urooj Fatima. "An Improved Playfair Encryption Technique Using Fibonacci Series Generated Secret Key." International Journal of Engineering & Technology 7, no. 4.5 (2018): 347. http://dx.doi.org/10.14419/ijet.v7i4.5.20104.

Full text
Abstract:
With the technology advancements and easy availability of internet, every day millions of users share information electronically through emails, file sharing, e-commerce, etc. As, internet is highly vulnerable to various attacks, sending sensitive information over the Internet may be dangerous. One of the ways to protect the sensitive Information is using the cryptographic techniques. So, while sharing sensitive information over the Internet, it should be sent in encrypted form to prevent the access by unauthorized person. Encryption can be defined as the process of transforming information in
APA, Harvard, Vancouver, ISO, and other styles
44

Pan, Jingshan, Tongtong Sui, Wen Liu, et al. "Secure Control of Linear Controllers Using Fully Homomorphic Encryption." Applied Sciences 13, no. 24 (2023): 13071. http://dx.doi.org/10.3390/app132413071.

Full text
Abstract:
In actual operation, there are security risks to the data of the network control system, mainly in the form of possible eavesdropping of signals in the transmission channel and parameters in the controller leading to data leakage. In this paper, we propose a scheme for encrypting linear controllers using fully homomorphic encryption, which effectively removes these security risks and substantially improves the security of networked control systems. Meanwhile, this paper uses precomputation to handle data encryption, which eliminates the encryption time and solves the drawback of fully homomorp
APA, Harvard, Vancouver, ISO, and other styles
45

Rohmah, Ahlam Umniyatur, and Djuniadi Djuniadi. "Tiny encryption algorithm (TEA) for analysis and implementation of cryptool2-based text message encryption and decryption processes." Journal of Student Research Exploration 1, no. 1 (2022): 33–40. http://dx.doi.org/10.52465/josre.v1i1.111.

Full text
Abstract:
Data security is one of the main factors in the world of information technology. The human need for information is increasing along with the changing times today. To maintain the authenticity of the information presented, it is necessary to have a high level of security. In this study, a data security simulation will be designed using the TEA (Tiny Encryption Algorithm) algorithm which includes a block cipher encryption algorithm and includes a symmetric key cryptography algorithm with the advantage of being on the Feistel network. The practicum was analyzed based on the process of encrypting
APA, Harvard, Vancouver, ISO, and other styles
46

Gaurav Agarwal, Mohammed Shakeel, Akash Sanghi, YDS Arya,. "A Novel Security Model for Password Encryption Using Aadhaar and Amicable Number." Tuijin Jishu/Journal of Propulsion Technology 44, no. 4 (2023): 1096–107. http://dx.doi.org/10.52783/tjjpt.v44.i4.981.

Full text
Abstract:
In this day and age, data hacking has become a major source of fear. In order to avoid any further theft of data, we must stop this criminal hacking. Backups, encryption, access control, and other techniques are just a few that may be used to ensure data integrity. We did not combine the existing approaches when we announced our encryption process. The secret to encrypting user passwords is to utilize a mathematical calculation equation that is well-defined and a number conversion mechanism. Users must provide their password and Aadhaar number in order to register. Encrypted password has been
APA, Harvard, Vancouver, ISO, and other styles
47

Tomasouw, Berny Pebo, Glevi E. Mado, and Elvinus R. Persulessy. "MATRIKS SCORE DAN APLIKASINYA DALAM PENGAMANAN PESAN RAHASIA." BAREKENG: JURNAL ILMU MATEMATIKA DAN TERAPAN 12, no. 2 (2018): 107–16. http://dx.doi.org/10.30598/vol12iss2pp107-116ar623.

Full text
Abstract:
The exchange of general information or confidential information between two persons through a medium does not guarantee its safety. This makes the sender of information and the recipient of information needs to be vigilant. In this case, the role of data encoding is very important. One of the most commonly used and recognized data encryption is cryptography. Cryptography is a technique for encrypting data through the process of encryption and decryption process by using certain keys so as generate new data that is secret. One of the cryptography is the security of secret messages using the Sco
APA, Harvard, Vancouver, ISO, and other styles
48

WANG, XING-YUAN, and YISONG TAN. "A MULTIPLE-PLAINTEXTS-ORIENTED CHAOTIC CRYPTOSYSTEM." International Journal of Modern Physics B 27, no. 32 (2013): 1350202. http://dx.doi.org/10.1142/s0217979213502020.

Full text
Abstract:
In recent years, a lot of chaotic cryptosystems have been proposed. However, most of these cryptosystems can encrypt only one plaintext in one encryption process. We call these cryptosystems single-plaintext-oriented cryptosystems. In this paper, the authors propose a new chaotic cryptosystem which can encrypt multiple plaintexts in one encryption process. The proposed cryptosystem is dedicated to encrypting multiple plaintexts in the situation of transmitting multiple secret files over public data communication network in one secure transmission. Experiments and theoretic analysis show that t
APA, Harvard, Vancouver, ISO, and other styles
49

Bajaj, Harshita, Parnab Das, and Santanu Mandal. "Chaos Based Novel Video Encryption Scheme to Secure Video/Image Information from Any AI-Generated Attacks." Journal of Advanced Research in Applied Sciences and Engineering Technology 50, no. 1 (2024): 1–20. http://dx.doi.org/10.37934/araset.50.1.120.

Full text
Abstract:
With the rise of data-intensive activities, methods such as video encryption have gained prominence, paving the way for quantum encryption and AI-powered strategies. It ensures content protection, supports compliance, and enables controlled sharing across sectors like security, satellite &amp; medical imaging, and E-commerce. This study introduces a novel efficient and guarded scheme for encrypting videos as well as images using a 4D hidden chaotic system and application in AI-developed real-time video. A chaotic system is used for developing a unique scrambling process and for the diffusion p
APA, Harvard, Vancouver, ISO, and other styles
50

Sri, Wayun Waradani, Sutardi, and Statiswaty. "APLIKASI KEAMANAN SMS MENGGUNAKAN ALGORITMA TRIPLE-DES DAN PENGUJIAN SERANGAN DENGAN METODE SNIFFING." semanTIK 5, no. 1 (2019): 113–20. https://doi.org/10.5281/zenodo.3227231.

Full text
Abstract:
<strong><em>Abstract</em></strong> <em>An i</em><em>ncreasing number of mobile phone users and the number of SMS delivery between users, securities SMS sending an issue that deserves to be noticed. SMS industry into one vulnerable point to attack a security threat. The security hole on SMS communication is a message sent will be stored in the Short Message Service Center (SMSC), so that in case of attack Man In The Middle at the SMSC then sent messages to be read by those who tapped one of them is sniffing activity. So, we need a safeguard against the activity of the exchange of messages via S
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!