Academic literature on the topic 'Encryption techniques'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Encryption techniques.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Encryption techniques"

1

Et. al., Jaichandran R,. "A Hybrid Encryption Model with Attribute Based Encryption and Advanced Encryption Standard Techniques." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 334–36. http://dx.doi.org/10.17762/turcomat.v12i2.720.

Full text
Abstract:
The emergence of cloud computing has completely changed the information technology sector, storage of information’s and access control. The main challenge in the migration of enterprises is the security to gain data owners confidence. In existing approach, many digital signatures based methodologies are used. In the existing approach, encryption time, security, encryption complexity are the parameters which need more focus. To overcome the existing issue, in this paper we proposed an hybrid architecture invoking attribute based encryption (ABE) for encrypting the key and advanced encryption st
APA, Harvard, Vancouver, ISO, and other styles
2

Ramanathan, Thirumalaimuthu, Md Jakir Hossen, Md Shohel Sayeed, and Joseph Emerson Raja. "Survey on computational intelligence based image encryption techniques." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 3 (2020): 1428. http://dx.doi.org/10.11591/ijeecs.v19.i3.pp1428-1435.

Full text
Abstract:
Image encryption is an important area in visual cryptography that helps in protecting images when shared through internet. There is lot of cryptography algorithms applied for many years in encrypting images. In the recent years, artificial intelligence techniques are combined with cryptography algorithms to support image encryption. Some of the benefits that artificial intelligence techniques can provide are prediction of possible attacks on cryptosystem using machine learning algorithms, generation of cryptographic keys using optimization algorithms, etc. Computational intelligence algorithms
APA, Harvard, Vancouver, ISO, and other styles
3

Thirumalaimuthu, T. Ramanathan, Hossen J., Sayeed S., and Emerson Raja J. "Survey on computational intelligence based image encryption techniques." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 3 (2020): 1428–35. https://doi.org/10.11591/ijeecs.v19.i3.pp1428-1435.

Full text
Abstract:
Image encryption is an important area in visual cryptography that helps in protecting images when shared through internet. There is lot of cryptography algorithms applied for many years in encrypting images. In the recent years, artificial intelligence techniques are combined with cryptography algorithms to support image encryption. Some of the benefits that artificial intelligence techniques can provide are prediction of possible attacks on cryptosystem using machine learning algorithms, generation of cryptographic keys using optimization algorithms, etc. Computational intelligence algorithms
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Zongwei. "Data Privacy Protection Utilizing Homomorphic Encryption Techniques." Applied and Computational Engineering 135, no. 1 (2025): 1–9. https://doi.org/10.54254/2755-2721/2025.21090.

Full text
Abstract:
In the current era with the rapid development of the Internet, although a variety of technologies have offered convenience to people's lives, numerous problems have arisen regarding the security of individual and collective data, Problems such as data privacy leakage occur continuously. The content of this review is data privacy protection based on homomorphic encryption. Firstly, the basic principle and formula of homomorphic encryption are briefly introduced. Then, the homomorphic encryption-based data privacy protection approach is developed in response to the importance of safeguarding dat
APA, Harvard, Vancouver, ISO, and other styles
5

Ansari, Tasin Habib Ahmad* Dr. J. W. Bakal. "ENHANCING PRIVACY USING COLLABORATIVE ATTRIBUTE ENCRYPTION TECHNIQUES." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 11 (2016): 83–91. https://doi.org/10.5281/zenodo.164906.

Full text
Abstract:
In the era where computers dominate the other facilities, it becomes even more productive once connected to the world with the help of internet. Although it possesses certain challenges to connect oneself to the world. The challenges of Authenticity, confidentiality, and anonymity and all of the notions of security with the concern aspects. Depending on the application the encryption techniques differs the most recent assortment that is the attribute based encryption, unlike traditional encryption technique this technique doesn’t reveals its identity Security tends to be the most important asp
APA, Harvard, Vancouver, ISO, and other styles
6

Parenreng‬, Jumadi Mabe, Sahraeni Maulida Mustari, and Abdul Wahid. "E-mail Security System Using El-Gamal Hybrid Algorithm and AES (Advanced Encryption Standard) Algorithm." Internet of Things and Artificial Intelligence Journal 2, no. 1 (2022): 1–9. http://dx.doi.org/10.31763/iota.v2i1.510.

Full text
Abstract:
E-mail is a medium of long-distance communication via the internet, which is currently often used for message exchange needs. But the use of e-mail has security problems, especially regarding data leakage when sending messages via e-mail. One of the efforts to improve the security of data and information is the application of cryptographic techniques and methods, namely end-to-end encryption. Cryptography is the science of reducing the risk of security threats by encrypting and decrypting data and information. In the implementation of the e-mail system, at least 2 (two) suitable encryption tec
APA, Harvard, Vancouver, ISO, and other styles
7

Sharma, Ramandeep, Richa Sharma, and Harmanjit Singh. "Classical Encryption Techniques." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 1 (2012): 84–90. http://dx.doi.org/10.24297/ijct.v3i1b.2745.

Full text
Abstract:
This paper reviews some of the classical encryption and modern techniques which are widely used to solve the problem in open networked systems, where information is being received and misused by adversaries by means of facilitating attacks at various levels in the communication. In this paper the proposition of building the basics of classical encryption and modern techniques and the comparison has been done between each of them.
APA, Harvard, Vancouver, ISO, and other styles
8

Vaishnavi Agrawal. "Enhancing Privacy on Online Social Networs: A comparative study of encryption techniques." Journal of Advances and Scholarly Researches in Allied Education 21, no. 5 (2024): 25–32. http://dx.doi.org/10.29070/cqryaz86.

Full text
Abstract:
The ability to connect with people all over the world and share private information has made online social networks (OSNs) indispensable to contemporary communication. Because of the serious privacy and security concerns that come with their fast growth, protecting user data is of the utmost importance. In order to improve OSN privacy, this study examines several encryption techniques. It discusses symmetric encryption (ECC and RSA) and synthetic encryption (AES) as well as hybrid methods that combine the two types of encryption. Using examples from well-known sites such as LinkedIn, Facebook,
APA, Harvard, Vancouver, ISO, and other styles
9

Yeow, Sin-Qian, and Kok-Why Ng. "Neural Network Based Data Encryption: A Comparison Study among DES, AES, and HE Techniques." JOIV : International Journal on Informatics Visualization 7, no. 3-2 (2023): 2086. http://dx.doi.org/10.30630/joiv.7.3-2.2336.

Full text
Abstract:
With the improvement of technology and the continuous expansion and deepening of neural network technology, its application in computer network security plays an important role. However, the development of neural networks is accompanied by new threats and challenges. This paper proposes to encrypt the weight data using encryption algorithms and embed image encryption algorithms to improve protected data security further. The purpose is to address the feasibility and effectiveness of using modern encryption algorithms for data encryption in machine learning in response to data privacy breaches.
APA, Harvard, Vancouver, ISO, and other styles
10

Li, Bingcheng, Dingkang Li, and Mingyuan Zhu. "Application analysis of data encryption technology." Applied and Computational Engineering 50, no. 1 (2024): 199–205. http://dx.doi.org/10.54254/2755-2721/50/20241502.

Full text
Abstract:
Data encryption technology is a key method to secure sensitive data. The privacy and confidentiality of data is protected by encrypting the data, i.e., transforming the original data into a form that cannot be understood without authorization. However, the security of traditional encryption algorithms is gradually challenged with the increase in computing power. Therefore, studying how to apply more advanced encryption techniques has become a current research hotspot. This study aims to analyze the application of data encryption techniques and explore the advantages and applicability of emergi
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Encryption techniques"

1

Wang, Yongsheng. "Advanced video encryption techniques." Thesis, Queen's University Belfast, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.602966.

Full text
Abstract:
Protecting video streams while incurring minimal impact on the compression performance is very important for practical video distribution. Selective encryption is one of the most promising techniques that can offer the required security while maintaining format compliance after encryption with no or little impact on the compression performance. Also, selective encryption techniques can be employed in video surveillance systems to alleviate concerns over privacy invasion by applying the encryption to specific regions of interest. This thesis presents advanced selective encryption techniques for
APA, Harvard, Vancouver, ISO, and other styles
2

Dutta, Saurabh. "Approach towards development of efficient encryption techniques." Thesis, University of North Bengal, 2004. http://hdl.handle.net/123456789/26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kasarabada, Yasaswy V. "Efficient Logic Encryption Techniques for Sequential Circuits." University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1613752483402656.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Talhah, Saad. "Advanced Encryption Techniques using New Mersenne Number Transforms." Thesis, University of Leeds, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.515408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Hang. "Optical Encryption Techniques for Color Image and Hyperspectral Data." Thesis, Université de Lorraine, 2017. http://www.theses.fr/2017LORR0374.

Full text
Abstract:
La sécurité est un problème important dans la transmission et le stockage de l'image, tandis que le cryptage est un moyen d'assurer la sécurité qui est requise dans de nombreuses applications (télévision par câble, la communication d'images militaires, systèmes d'imagerie confidentielle, etc.). Toutefois, à l'instar du message texte, les données images présentent des caractéristiques spéciales telles que la haute capacité, la redondance et la haute corrélation entre les pixels, et nécessite souvent une transmission et des traitements temps réel pour certaines applications. Construire un systèm
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Hang. "Optical Encryption Techniques for Color Image and Hyperspectral Data." Electronic Thesis or Diss., Université de Lorraine, 2017. http://www.theses.fr/2017LORR0374.

Full text
Abstract:
La sécurité est un problème important dans la transmission et le stockage de l'image, tandis que le cryptage est un moyen d'assurer la sécurité qui est requise dans de nombreuses applications (télévision par câble, la communication d'images militaires, systèmes d'imagerie confidentielle, etc.). Toutefois, à l'instar du message texte, les données images présentent des caractéristiques spéciales telles que la haute capacité, la redondance et la haute corrélation entre les pixels, et nécessite souvent une transmission et des traitements temps réel pour certaines applications. Construire un systèm
APA, Harvard, Vancouver, ISO, and other styles
7

Jha, Pawan Kumar. "AN APPROACH TOWARDS DESIGN AND IMPLEMENTATION OF SYMMETRIC ENCRYPTION TECHNIQUES." Thesis, University of North Bengal, 2006. http://hdl.handle.net/123456789/11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wong, Hon Wah. "Image watermarking and data hiding techniques /." View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202003%20WONGH.

Full text
Abstract:
Thesis (Ph. D.)--Hong Kong University of Science and Technology, 2003.<br>Includes bibliographical references (leaves 163-178). Also available in electronic version. Access restricted to campus users.
APA, Harvard, Vancouver, ISO, and other styles
9

Brisbane, Gareth Charles Beattie. "On information hiding techniques for digital images." Access electronically, 2004. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20050221.122028/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Guruswamy, Aarumugam Bhupathi Rajan. "Independent Domain of Symmetric Encryption using Least SignificantBit : Computer Vision, Steganography and Cryptography Techniques." Thesis, Högskolan Dalarna, Datateknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:du-10063.

Full text
Abstract:
The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it is may be easier to modify and misuse the valuable information through hacking. So, in order to transfer the data securely to the destination without any modifications, there are many approaches like cryptography and steganography. This paper deals with the image steganography as well as with the different security issues, general overview of cryptography, steganogr
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Encryption techniques"

1

Held, Gilbert. Top secret data encryption techniques. Sams Pub., 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lian, Shiguo. Multimedia content encryption: Techniques and applications. Auerbach Publications, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Held, Gilbert. Learn encryption techniques with BASIC and C++. Wordware Pub., 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Borivoje, Furht, and Kirovski Darko, eds. Multimedia encryption and authentication techniques and applications. Auerbach Publications, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Griffiths, James. Investigate, code and compare techniques used in implementing encryption technology. Oxford Brookes University, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Swenson, Christopher. Modern cryptanalysis: Techniques for advanced code breaking. Wiley Pub., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shih, Frank Y. Digital watermarking and steganography: Fundamentals and techniques. Taylor & Francis, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

S, Schmalz Mark, and Society of Photo-optical Instrumentation Engineers., eds. Mathematics of data/image coding, compression, and encryption VII, with applications: 4-5 August, 2004, Denver, Colorado, USA. SPIE, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wold, Geoffrey H. Computer crime: Techniques, prevention. Bankers Pub. Co., 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

EUROCRYPT, '00 (2000 Bruges Belgium). Advances in cryptology: EUROCRYPT 2000 ; International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000 ; proceedings. Springer, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Encryption techniques"

1

Yi, Xun, Xuechao Yang, Xiaoning Liu, et al. "Homomorphic Encryption." In Privacy Enhancing Techniques. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-95140-4_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Albrecht, Martin, and Carlos Cid. "Algebraic Techniques in Differential Cryptanalysis." In Fast Software Encryption. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03317-9_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gautam, Tanvi. "Identity—Based Encryption." In Emerging Security Algorithms and Techniques, edited by Aditya Thakkar and Nitish Pathak. Chapman and Hall/CRC, 2019. http://dx.doi.org/10.1201/9781351021708-10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gautam, Tanvi, Aditya Thakkar, and Nitish Pathak. "Attribute-Based Encryption." In Emerging Security Algorithms and Techniques. Chapman and Hall/CRC, 2019. http://dx.doi.org/10.1201/9781351021708-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gouget, Aline, Hervé Sibert, Côme Berbain, Nicolas Courtois, Blandine Debraize, and Chris Mitchell. "Analysis of the Bit-Search Generator and Sequence Compression Techniques." In Fast Software Encryption. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11502760_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Thanki, Rohit M. "Audio Watermarking with Encryption." In Advanced Techniques for Audio Watermarking. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24186-5_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dinur, Itai, Orr Dunkelman, Nathan Keller, and Adi Shamir. "Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64." In Fast Software Encryption. Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-46706-0_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lu, Rongxing. "Homomorphic Public Key Encryption Techniques." In Wireless Networks. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-32899-7_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rajendiran, M., B. Syed Ibrahim, R. Pratheesh, and C. Nelson Kennnedy Babu. "Multilanguage Based SMS Encryption Techniques." In Advances in Intelligent Systems and Computing. Springer India, 2013. http://dx.doi.org/10.1007/978-81-322-0740-5_55.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mishra, Prasanna Raghaw, Indivar Gupta, and Navneet Gaba. "Cryptanalysis of Multilanguage Encryption Techniques." In Mathematics and Computing 2013. Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-1952-1_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Encryption techniques"

1

Abughali, Heba A. M., and Utku Kose. "Image Encryption Techniques: A Survey." In 2024 International Jordanian Cybersecurity Conference (IJCC). IEEE, 2024. https://doi.org/10.1109/ijcc64742.2024.10847281.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

K, Megala, Jayadevi J, Keerthika K, Manikandan G, Vijay Sai R, and Srinivasan B. "Secure Medical Image Encryption Using Homomorphic Techniques." In 2024 Second International Conference on Advances in Information Technology (ICAIT). IEEE, 2024. http://dx.doi.org/10.1109/icait61638.2024.10690754.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Khare, Shanu, Navjot Singh Talwandi, Payal Thakur, Rakesh Thakur, Bhavana Bansal, and Kalpana Singh. "Brain-Inspired Encryption Techniques for Medical Imaging." In 2024 IEEE Silchar Subsection Conference (SILCON). IEEE, 2024. https://doi.org/10.1109/silcon63976.2024.10910555.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chidambaranathan, Senthilnathan, M. Santhanaraj, E. Ajitha, Syed Fiaz A. S, Suchithra B, and T. Kathirvel. "Automated Detection of Encryption Algorithms Using AI Techniques." In 2024 International Conference on IoT Based Control Networks and Intelligent Systems (ICICNIS). IEEE, 2024. https://doi.org/10.1109/icicnis64247.2024.10823274.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gupta, Ambika, Suyel Namasudra, and Prabhat Kumar. "Securing the Cloud “Advanced Techniques in Data Encryption”." In 2024 IEEE 11th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON). IEEE, 2024. https://doi.org/10.1109/upcon62832.2024.10983278.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Patel, Advait, Hariharan Ragothaman, Milavkumar Shah, et al. "AI-Powered Data Encryption Techniques: Safeguarding Cloud Infrastructure." In 2025 IEEE Conference on Artificial Intelligence (CAI). IEEE, 2025. https://doi.org/10.1109/cai64502.2025.00153.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mageshwaran, M. K., and P. Sri Ramya. "Data Protection in the Era of Big Data Advanced Encryption Standard VS Data Encryption Standard." In 2024 Second International Conference Computational and Characterization Techniques in Engineering & Sciences (IC3TES). IEEE, 2024. https://doi.org/10.1109/ic3tes62412.2024.10877503.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ghosh, Shithan, Sanjukta Mondal, Arnab Laha, Bishakha Mondal, Atri Bandyopadhyay, and Prasun Chakraborty. "Enhancing E-commerce Recommendation Systems Through Advanced Encryption Techniques." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10724864.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tahami, Syed Zoubaid, Maria Ashraf, Anila Saghir, and Madiha Abbasi. "Performance Analysis of Popular Encryption Techniques for Mobile Applications." In 2024 Global Conference on Wireless and Optical Technologies (GCWOT). IEEE, 2024. https://doi.org/10.1109/gcwot63882.2024.10805643.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Shang, Jun, Hanwen Zhang, Weixiong Rao, and Yiguang Hong. "Linear Encryption Techniques for Counteracting Information-based Stealthy Attacks." In 2024 18th International Conference on Control, Automation, Robotics and Vision (ICARCV). IEEE, 2024. https://doi.org/10.1109/icarcv63323.2024.10821578.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Encryption techniques"

1

Pasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.

Full text
Abstract:
Abstract: The rapid adoption of artificial intelligence (AI) in cloud and edge computing environments has transformed industries by enabling large-scale automation, real-time analytics, and intelligent decision-making. However, the increasing reliance on AI-powered infrastructures introduces significant cybersecurity challenges, including adversarial attacks, data privacy risks, and vulnerabilities in AI model supply chains. This research explores advanced cybersecurity frameworks tailored to protect AI-driven cloud and edge computing environments. It investigates AI-specific security threats,
APA, Harvard, Vancouver, ISO, and other styles
2

Rannenberg, Kai, Sebastian Pape, Frédéric Tronnier, and Sascha Löbner. Study on the Technical Evaluation of De-Identification Procedures for Personal Data in the Automotive Sector. Universitätsbibliothek Johann Christian Senckenberg, 2021. http://dx.doi.org/10.21248/gups.63413.

Full text
Abstract:
The aim of this study was to identify and evaluate different de-identification techniques that may be used in several mobility-related use cases. To do so, four use cases have been defined in accordance with a project partner that focused on the legal aspects of this project, as well as with the VDA/FAT working group. Each use case aims to create different legal and technical issues with regards to the data and information that are to be gathered, used and transferred in the specific scenario. Use cases should therefore differ in the type and frequency of data that is gathered as well as the l
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!