To see the other types of publications on this topic, follow the link: Encryption techniques.

Dissertations / Theses on the topic 'Encryption techniques'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Encryption techniques.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Wang, Yongsheng. "Advanced video encryption techniques." Thesis, Queen's University Belfast, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.602966.

Full text
Abstract:
Protecting video streams while incurring minimal impact on the compression performance is very important for practical video distribution. Selective encryption is one of the most promising techniques that can offer the required security while maintaining format compliance after encryption with no or little impact on the compression performance. Also, selective encryption techniques can be employed in video surveillance systems to alleviate concerns over privacy invasion by applying the encryption to specific regions of interest. This thesis presents advanced selective encryption techniques for
APA, Harvard, Vancouver, ISO, and other styles
2

Dutta, Saurabh. "Approach towards development of efficient encryption techniques." Thesis, University of North Bengal, 2004. http://hdl.handle.net/123456789/26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kasarabada, Yasaswy V. "Efficient Logic Encryption Techniques for Sequential Circuits." University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1613752483402656.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Talhah, Saad. "Advanced Encryption Techniques using New Mersenne Number Transforms." Thesis, University of Leeds, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.515408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Hang. "Optical Encryption Techniques for Color Image and Hyperspectral Data." Thesis, Université de Lorraine, 2017. http://www.theses.fr/2017LORR0374.

Full text
Abstract:
La sécurité est un problème important dans la transmission et le stockage de l'image, tandis que le cryptage est un moyen d'assurer la sécurité qui est requise dans de nombreuses applications (télévision par câble, la communication d'images militaires, systèmes d'imagerie confidentielle, etc.). Toutefois, à l'instar du message texte, les données images présentent des caractéristiques spéciales telles que la haute capacité, la redondance et la haute corrélation entre les pixels, et nécessite souvent une transmission et des traitements temps réel pour certaines applications. Construire un systèm
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Hang. "Optical Encryption Techniques for Color Image and Hyperspectral Data." Electronic Thesis or Diss., Université de Lorraine, 2017. http://www.theses.fr/2017LORR0374.

Full text
Abstract:
La sécurité est un problème important dans la transmission et le stockage de l'image, tandis que le cryptage est un moyen d'assurer la sécurité qui est requise dans de nombreuses applications (télévision par câble, la communication d'images militaires, systèmes d'imagerie confidentielle, etc.). Toutefois, à l'instar du message texte, les données images présentent des caractéristiques spéciales telles que la haute capacité, la redondance et la haute corrélation entre les pixels, et nécessite souvent une transmission et des traitements temps réel pour certaines applications. Construire un systèm
APA, Harvard, Vancouver, ISO, and other styles
7

Jha, Pawan Kumar. "AN APPROACH TOWARDS DESIGN AND IMPLEMENTATION OF SYMMETRIC ENCRYPTION TECHNIQUES." Thesis, University of North Bengal, 2006. http://hdl.handle.net/123456789/11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wong, Hon Wah. "Image watermarking and data hiding techniques /." View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202003%20WONGH.

Full text
Abstract:
Thesis (Ph. D.)--Hong Kong University of Science and Technology, 2003.<br>Includes bibliographical references (leaves 163-178). Also available in electronic version. Access restricted to campus users.
APA, Harvard, Vancouver, ISO, and other styles
9

Brisbane, Gareth Charles Beattie. "On information hiding techniques for digital images." Access electronically, 2004. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20050221.122028/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Guruswamy, Aarumugam Bhupathi Rajan. "Independent Domain of Symmetric Encryption using Least SignificantBit : Computer Vision, Steganography and Cryptography Techniques." Thesis, Högskolan Dalarna, Datateknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:du-10063.

Full text
Abstract:
The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it is may be easier to modify and misuse the valuable information through hacking. So, in order to transfer the data securely to the destination without any modifications, there are many approaches like cryptography and steganography. This paper deals with the image steganography as well as with the different security issues, general overview of cryptography, steganogr
APA, Harvard, Vancouver, ISO, and other styles
11

Zhao, Weiliang, University of Western Sydney, of Science Technology and Environment College, and School of Computing and Information Technology. "Security techniques for electronic commerce applications." THESIS_CSTE_CIT_Zhao_W.xml, 2003. http://handle.uws.edu.au:8081/1959.7/127.

Full text
Abstract:
Electronic commerce and the internet provide greater opportunities for companies and individual person to be involved in commercial activities; the involved parties may not know or trust each other or may even be mutually suspicious of each other. The issue of fairness becomes more critical and must be well addressed. The aim of this thesis is to investigate security solutions with fairness for on-line transactions. A fair trading protocol with credit payment is proposed. The proof of equivalence of discrete logarithm to discrete loglogarithm is employed as the main tool to construct the proto
APA, Harvard, Vancouver, ISO, and other styles
12

Zabransky, Douglas Milton. "Incorporating Obfuscation Techniques in Privacy Preserving Database-Driven Dynamic Spectrum Access Systems." Thesis, Virginia Tech, 2018. http://hdl.handle.net/10919/85001.

Full text
Abstract:
Modern innovation is a driving force behind increased spectrum crowding. Several studies performed by the National Telecommunications and Information Administration (NTIA), Federal Communications Commission (FCC), and other groups have proposed Dynamic Spectrum Access (DSA) as a promising solution to alleviate spectrum crowding. The spectrum assignment decisions in DSA will be made by a centralized entity referred to as as spectrum access system (SAS); however, maintaining spectrum utilization information in SAS presents privacy risks, as sensitive Incumbent User (IU) operation parameters are
APA, Harvard, Vancouver, ISO, and other styles
13

Shin, Dong Il. "Improving trust and securing data accessibility for e-health decision making by using data encryption techniques." Thesis, Queensland University of Technology, 2012. https://eprints.qut.edu.au/50636/1/Dong_Il_Shin_Thesis.pdf.

Full text
Abstract:
In the medical and healthcare arena, patients‟ data is not just their own personal history but also a valuable large dataset for finding solutions for diseases. While electronic medical records are becoming popular and are used in healthcare work places like hospitals, as well as insurance companies, and by major stakeholders such as physicians and their patients, the accessibility of such information should be dealt with in a way that preserves privacy and security. Thus, finding the best way to keep the data secure has become an important issue in the area of database security. Sensitive med
APA, Harvard, Vancouver, ISO, and other styles
14

Raghuraman, Shashank. "Efficiency of Logic Minimization Techniques for Cryptographic Hardware Implementation." Thesis, Virginia Tech, 2019. http://hdl.handle.net/10919/91462.

Full text
Abstract:
With significant research effort being directed towards designing lightweight cryptographic primitives, logical metrics such as gate count are extensively used in estimating their hardware quality. Specialized logic minimization tools have been built to make use of gate count as the primary optimization cost function. The first part of this thesis aims to investigate the effectiveness of such logical metrics in predicting hardware efficiency of corresponding circuits. Mapping a logical representation onto hardware depends on the standard cell technology used, and is driven by trade-offs betwee
APA, Harvard, Vancouver, ISO, and other styles
15

Bian, Song. "Realizing Homomorphic Secure Protocols through Cross-Layer Design Techniques." Kyoto University, 2019. http://hdl.handle.net/2433/242926.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Zhang, Bo. "XOR based optical encryption with noise performance modeling and application to image transmission over wireless IP lan." Thesis, Peninsula Technikon, 2004. http://hdl.handle.net/20.500.11838/1376.

Full text
Abstract:
Thesis (MTech (Information Technology))--Peninsula Technikon, 2004<br>Encryption was used whenever someone wanted to send a secret message to someone. The quality of the algorithm and key combination were the factors that ensured the strength of the system. However, until there were some automation one could not use complex methods for encryption because it simply took too long to encrypt and decrypt messages (even worse for images), manually. Optical technologies have recently been employed in encryption. Compared with traditional computer and electrical systems, optical technologies of
APA, Harvard, Vancouver, ISO, and other styles
17

Kandi, Jayavardhan R. "Embedded Cryptography: An Analysis and Evaluation of Performance and Code Optimization Techniques for Encryption and Decryption in Embedded Systems." [Tampa, Fla.] : University of South Florida, 2003. http://purl.fcla.edu/fcla/etd/SFE0000151.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Zhao, Weiliang. "Security techniques for electronic commerce applications." Thesis, View thesis View thesis, 2003. http://handle.uws.edu.au:8081/1959.7/127.

Full text
Abstract:
Electronic commerce and the internet provide greater opportunities for companies and individual person to be involved in commercial activities; the involved parties may not know or trust each other or may even be mutually suspicious of each other. The issue of fairness becomes more critical and must be well addressed. The aim of this thesis is to investigate security solutions with fairness for on-line transactions. A fair trading protocol with credit payment is proposed. The proof of equivalence of discrete logarithm to discrete loglogarithm is employed as the main tool to construct the proto
APA, Harvard, Vancouver, ISO, and other styles
19

Bozdemir, Beyza. "Privacy-preserving machine learning techniques." Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS323.

Full text
Abstract:
L'apprentissage automatique en tant que service (MLaaS) fait référence à un service qui permet aux entreprises de déléguer leurs tâches d'apprentissage automatique à un ou plusieurs serveurs puissants, à savoir des serveurs cloud. Néanmoins, les entreprises sont confrontées à des défis importants pour garantir la confidentialité des données et le respect des réglementations en matière de protection des données. L'exécution de tâches d'apprentissage automatique sur des données sensibles nécessite la conception de nouveaux protocoles garantissant la confidentialité des données pour les technique
APA, Harvard, Vancouver, ISO, and other styles
20

Rangasamy, Jothi Ramalingam. "Cryptographic techniques for managing computational effort." Thesis, Queensland University of Technology, 2012. https://eprints.qut.edu.au/61007/1/Jothi_Rangasamy_Thesis.pdf.

Full text
Abstract:
Availability has become a primary goal of information security and is as significant as other goals, in particular, confidentiality and integrity. Maintaining availability of essential services on the public Internet is an increasingly difficult task in the presence of sophisticated attackers. Attackers may abuse limited computational resources of a service provider and thus managing computational costs is a key strategy for achieving the goal of availability. In this thesis we focus on cryptographic approaches for managing computational costs, in particular computational effort. We focus on t
APA, Harvard, Vancouver, ISO, and other styles
21

Cherrueau, Ronan-Alexandre. "Un langage de composition des techniques de sécurité pour préserver la vie privée dans le nuage." Thesis, Nantes, Ecole des Mines, 2016. http://www.theses.fr/2016EMNA0233/document.

Full text
Abstract:
Un service du nuage peut employer des techniques de sécurités pour assurer la sécurité de l’information. Ces techniques protègent une donnée personnelle en la rendant inintelligible pour toutes personnes autres que l’utilisateur du service. En contrepartie, certaines fonctionnalités ne peuvent plus être implémentées. Par exemple, la technique du chiffrement symétrique rend les données inintelligibles, mais empêche le calcul sur ces données.Cette thèse avance qu’un service du nuage doit composer les techniques pour assurer la sécurité de l’information sans perdre de fonctionnalités. Elle se bas
APA, Harvard, Vancouver, ISO, and other styles
22

Fernandez, Irma Becerra. "Encryption-based security for public networks : technique and application." FIU Digital Commons, 1994. http://digitalcommons.fiu.edu/etd/3296.

Full text
Abstract:
This dissertation describes the development of a new system whereby the Public Switch Telephone Network (PSTN), which is not secure, can perform like a private network. Integrated Services Digital Network (ISDN) forms a technical platform for other communication technologies, such as frame relay and Switched Megabit Data Service (SMDS). This is an original and innovative hardware and software design which can be embedded into the ISDN Customer Premises Equipment (CPE) to privatize the public ISDN without the need to upgrade the existing switching equipment. This research incorporates original
APA, Harvard, Vancouver, ISO, and other styles
23

Lowenrud, Richard, and Jacob Kimblad. "Implementation and Evaluation of Espresso Stream Cipher in 65nm CMOS." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-204620.

Full text
Abstract:
With the upcoming 5G networks and expected growth of the Internet of Things (IoT), the demand for fast and reliable encryption algorithms will increase. As many systems might be time critical and run on internal power sources, the algorithms must be small, fast, energy efficient and have low latency. A new stream cipher called Espresso has been proposed to answer these demands, optimizing for several parameters unlike other stream ciphers such as Trivium and Grain. Espresso has previously been compared to the industry standard, Advanced Encryption Standard (AES), in a FPGA implementation and h
APA, Harvard, Vancouver, ISO, and other styles
24

Madhavarapu, Venkata Praveen Kumar. "A Novel Three Phase Symmetric Cipher Technique." OpenSIUC, 2016. https://opensiuc.lib.siu.edu/theses/2031.

Full text
Abstract:
Confusion and Diffusion are two properties of a secure cipher, identified by Claude Shannon. Confusion refers to making the relationship between the ciphertext and the symmetric key as complex and involved as possible. We try to achieve more confusion by creating a ciphertext of different length for a given plaintext when key is changed. As per our knowledge, all the existing symmetric encryption techniques will generate cipher text of same length for a given plaintext with different keys. The technique we are implementing here, will create ciphertext with different length for a given plaintex
APA, Harvard, Vancouver, ISO, and other styles
25

Кучма, Олександр Русланович, та Oleksandr Kuchma. "Розроблення модуля забезпечення приховування даних на основі стеганографічного методу найменш значущого біту". Master's thesis, ТНТУ, 2021. http://elartu.tntu.edu.ua/handle/lib/36794.

Full text
Abstract:
Розроблення модуля забезпечення приховування даних на основі стеганографічного методу найменш значущого біту // Дипломна робота ОР «Магістр» // Кучма Олександр Русланович // Тернопільський національний технічний університет імені Івана Пулюя, факультет комп’ютерно- інформаційних систем і програмної інженерії, кафедра кібербезпеки, група СБм-61 // Тернопіль, 2019 // С. 93, рис. – 34 , табл. – 26 , додат. – 5.<br>Пояснювальна записка містить результати розроблення модуля «Вбудовування інформації в зображенні методом найменш значущого біту». Проведено аналіз предметної області, розроблені
APA, Harvard, Vancouver, ISO, and other styles
26

Lampe, Rodolphe. "Preuves de sécurité en cryptographie symétrique à l'aide de la technique du coupling." Thesis, Versailles-St Quentin en Yvelines, 2014. http://www.theses.fr/2014VERS0026/document.

Full text
Abstract:
Dans cette thèse, on s'intéresse à des schémas de chiffrement par blocs, c'est-à-dire que le chiffrement (et le déchiffrement) envoie un bloc de n bits sur un bloc de n bits. Il y a essentiellement deux grandes structures utilisées pour un schéma de chiffrement par blocs : la structure de Feistel (utilisée pour le DES) et la structure SPN (utilisée pour l'AES). L'étude de la sécurité de ces différents structures et schémas a permis de nombreuses avancées autant pratiques que théoriques. Nous présentons dans cette thèse des preuves de sécurité pour le schéma d'Even-Mansour itéré, le schéma para
APA, Harvard, Vancouver, ISO, and other styles
27

Rawat, Sachin. "Implementation of a Forward Error Correction Technique using Convolutional Encoding with Viterbi Decoding." Ohio University / OhioLINK, 2004. http://www.ohiolink.edu/etd/view.cgi?ohiou1088439298.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Arasteh, Davoud. "Computational Intelligence and Complexity Measures for Chaotic Information Processing." ScholarWorks@UNO, 2008. http://scholarworks.uno.edu/td/834.

Full text
Abstract:
This dissertation investigates the application of computational intelligence methods in the analysis of nonlinear chaotic systems in the framework of many known and newly designed complex systems. Parallel comparisons are made between these methods. This provides insight into the difficult challenges facing nonlinear systems characterization and aids in developing a generalized algorithm in computing algorithmic complexity measures, Lyapunov exponents, information dimension and topological entropy. These metrics are implemented to characterize the dynamic patterns of discrete and continuous sy
APA, Harvard, Vancouver, ISO, and other styles
29

Lewko, Allison Bishop. "Functional encryption : new proof techniques and advancing capabilities." Thesis, 2012. http://hdl.handle.net/2152/ETD-UT-2012-05-5374.

Full text
Abstract:
We develop the dual system encryption methodology to provide fully secure functional encryption systems. We introduce new proof techniques and explore their applications, resulting in systems that advance the state of the art in terms of functionality, security, and efficiency. Our approach constructs versatile tools for adapting the dual system encryption methodology to new functionalities and efficiency goals. As particular demonstrations of our techniques, we obtain fully secure ciphertext-policy attribute-based encryption systems in the single authority and decentralized settings. Our work
APA, Harvard, Vancouver, ISO, and other styles
30

YE, WEN-XIN, and 葉文心. "The application of encryption techniques on disk software protection." Thesis, 1988. http://ndltd.ncl.edu.tw/handle/09830498195289733161.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Tsai, Chao-Jen, and 蔡釗仁. "Some Techniques for Enhancing Joint Compression and Encryption Schemes." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/bzb2tq.

Full text
Abstract:
碩士<br>國立臺灣大學<br>資訊工程學研究所<br>105<br>Three techniques for enhancing joint compression and encryption (JCAE) schemes are proposed. They respectively improve the execution time, compression performance and estimation accuracy of three different JCAE schemes. The first uses auxiliary data structures to significantly accelerate currently existing chaos-based join compression and encryption scheme. The second one solves the problem of huge multidimensional lookup table overheads by selecting a small number of important sub tables. The third increases the accuracy of frequency distribution estimations
APA, Harvard, Vancouver, ISO, and other styles
32

Yang, Zi-Wei, and 楊孜薇. "Blockchain Security Enhancement Based On Biometric Encryption and Computer Vision Techniques." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/48frya.

Full text
Abstract:
碩士<br>國立交通大學<br>資訊管理研究所<br>105<br>With the rise of financial technology, also known as FinTech, the researches and applications based on blockchain have become increasingly popular in recent years. Blockchain is a distributed storage and verification technology, which originates from the well-known digital currency, Bitcoin. It records all transaction information with a distributed ledger framework and uses cryptography to ensure the security by authentication and non-repudiation. In addition, transparency and decentralization are also the major characteristics of blockchain system. In traditi
APA, Harvard, Vancouver, ISO, and other styles
33

Hsu, Chih-Chung, and 許志仲. "Studies of Improving Coding Performance and Encryption in Various Image Compression Techniques." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/65461867732062157625.

Full text
Abstract:
碩士<br>國立雲林科技大學<br>電機工程系碩士班<br>95<br>This thesis consists of four topics: (1) Fractal image coding; (2) JPEG image compression standard; (3) Vector quantization; (4) Motion object detection technique. On the topic of fractal image coding (FIC), we propose two schemes to improve the coding performance of FIC. First, the proposed method combines iteration-free FIC technique with fractal mating coding technique to improve the coding performance. Second, the multi-resolution sampling scheme is used in domain pool performance construction such that the coding performance can be improved. Finally, th
APA, Harvard, Vancouver, ISO, and other styles
34

Nishchal, Naveen Kumar. "Investigation on optical image encryption using fourier and fractional fourier domain techniques." Thesis, 2004. http://localhost:8080/iit/handle/2074/4226.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Verma, Gaurav. "Development of optoelectronic techniques for recognition and encryption in biometric based security systems." Thesis, 2017. http://localhost:8080/iit/handle/2074/7285.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

(5930405), Jongho Won. "Security techniques for drones." Thesis, 2019.

Find full text
Abstract:
<div>Unmanned Aerial Vehicles (UAVs), commonly known as drones, are aircrafts without a human pilot aboard. The flight of drones can be controlled with a remote control by an operator located at the ground station, or fully autonomously by onboard computers. Drones are mostly found in the military. However, over the recent years, they have attracted the interest of industry and civilian sectors. <br></div><div>With the recent advance of sensor and embedded device technologies, various sensors will be embedded in city infrastructure to monitor various city-related information. In this context,
APA, Harvard, Vancouver, ISO, and other styles
37

Tawalbeh, Lo'ai. "Radix-4 ASIC design of a scalable Montgomery modular multiplier using encoding techniques." Thesis, 2002. http://hdl.handle.net/1957/32149.

Full text
Abstract:
Modular arithmetic operations (i.e., inversion, multiplication and exponentiation) are used in several cryptography applications, such as decipherment operation of RSA algorithm, Diffie-Hellman key exchange algorithm, elliptic curve cryptography, and the Digital Signature Standard including the Elliptic Curve Digital Signature Algorithm. The most important of these arithmetic operations is the modular multiplication operation since it is the core operation in many cryptographic functions. Given the increasing demands on secure communications, cryptographic algorithms will be embedded in almost
APA, Harvard, Vancouver, ISO, and other styles
38

(6565679), Fang-Yu Rao. "Privacy-Enhancing Techniques for Data Analytics." Thesis, 2019.

Find full text
Abstract:
<div> <div> <div> <p>Organizations today collect and aggregate huge amounts of data from individuals under various scenarios and for different purposes. Such aggregation of individuals’ data when combined with techniques of data analytics allows organizations to make informed decisions and predictions. But in many situations, different portions of the data associated with individuals are collected and curated by different organizations. To derive more accurate conclusions and predictions, those organization may want to conduct the analysis based on their joint data, which cannot be simply acco
APA, Harvard, Vancouver, ISO, and other styles
39

"Investigations on encryption techniques for colored and gray scale images in fourier- and fractional fourier domains." Thesis, 2009. http://localhost:8080/xmlui/handle/12345678/4551.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Sharma, Vikram. "Informatic techniques for continuous varible quantum key distribution." Phd thesis, 2007. http://hdl.handle.net/1885/150269.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Owuor, Dennis Luke. "Chaos-based secure communication and systems design." 2012. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1000513.

Full text
Abstract:
M. Tech. Electrical Engineering.<br>This dissertation presents encryption and decryption of digital message signal and image data based on Qi hyper chaos system. The field of telecommunication has grown rapidly especially with the introduction of mobile phone and internet networks. Associated with this growth, there is a vital need to have a secure communication of information.
APA, Harvard, Vancouver, ISO, and other styles
42

Sachan, Apurva. "Implementation of homomorphic encryption technique." Thesis, 2014. http://ethesis.nitrkl.ac.in/6436/1/E-71.pdf.

Full text
Abstract:
Fully homomorphic encryption has long been viewed as cryptography’s prized ”holy grail” amazingly helpful yet rather subtle. Starting from the breakthrough invention of FHE in 2009 by Craig Gentry, numerous schemes are presented then by various authors following the Gentry’s blueprint. We discuss the basic homomorphic encryption given by the DGHV over the integers. It is modification of the Gentry’s scheme which is based on the ideal lattices. The main idea of the DGHV scheme is its simplicity for the arithmetic operations. Our plan is to reduce the size of the public key which ultimately redu
APA, Harvard, Vancouver, ISO, and other styles
43

Tseng, Der-Chang, and 曾德樟. "Speech Encryption Systems Based on OFDM Technique." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/87022474937383275401.

Full text
Abstract:
博士<br>國立臺灣科技大學<br>電子工程系<br>96<br>Speech encryption techniques have been widely used in the corporate and military sectors for some time now. In general, a speech encryption system retains any considerable residual intelligibility such as talk spurts and the original intonation in the encrypted speech. This makes it easy for eavesdroppers to deduce the information contents from the encrypted speech. In this thesis, we proposed two types of speech encryption systems: the analog and digital encryption systems. Both speech encryption systems, based on an orthogonal frequency division multiplexing
APA, Harvard, Vancouver, ISO, and other styles
44

Chen, Ji-Tian, and 陳吉田. "Fast Image Encryption Technique for H.261 Video System." Thesis, 1996. http://ndltd.ncl.edu.tw/handle/57512107312564452704.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Chen, Jyi-Tyan, and 陳吉田. "Fast Image Encryption Technique for H.261 Video System." Thesis, 1996. http://ndltd.ncl.edu.tw/handle/97623494837361984539.

Full text
Abstract:
碩士<br>高雄工學院<br>電機電力研究所<br>85<br>H.261乃國際電話電報諮詢委員會(CCITT)於1990年所制定的國際標準, 主要目的在因應雙向視訊傳輸服務之需求趨勢,提供頻寬P64k bit/s ( P=1,2..., 30)之影像編/解碼技術規範,而在目前的影像電話(Video Phone)、視訊會議(Video Conferencing)等系統之開發上,廣獲產業 界的支持與採用。然而,值得注意的是:於H.261規範中,並無任何通訊 保密的措施!此一疏漏,將導致用戶間的通訊過程,在遭受有心人士非法 入侵、竊取時,無所防範。該問題,在大眾通信網路日益發達、資訊安全 日益受重視的今日,將更形重要。 在本論文中,我們將發展H.261的影像快速加密技術,以解決上述問題。 在加密過程中,將採用兩支密匙(key),以移位暫存器(Shift Regis) 或混沌時序(Chaotic Time Sequence)方式產生兩組人造雜訊(Pseudo No
APA, Harvard, Vancouver, ISO, and other styles
46

Lee, Ping-Yi, and 李秉奕. "Vectors Using Sparse Approximation Algorithm for Data Transmission Encryption Technique." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/63277976834531500274.

Full text
Abstract:
碩士<br>國立宜蘭大學<br>資訊工程學系碩士班<br>103<br>In the process of information transmission, probably because of a power failure or collision or the like, resulting in incomplete data in transmission, and then in such a situation occurs like information transmission loss. On the other hand, the modern software of community and dating develop quickly. In the web and mobile application, the case in image for example, image usually be compressed in the process of transmission, it can be regarded as one kind of information transmission loss. Another situation is that disturbed during transmission, it lead to t
APA, Harvard, Vancouver, ISO, and other styles
47

Ma, Yun-Chi, and 馬雲麒. "The Research on Digital Holographic 3-D Object Encryption and Decryption Technique." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/95239705927600267631.

Full text
Abstract:
碩士<br>世新大學<br>平面傳播科技學系<br>92<br>Due to the Internet rapid development and digital information dissemination efficiency increased in recent years, many illegal cases happened, such as stealing copyrights of digital information and significant digital information (such as national secret or commercial secret and so on). To solve this problem effectively, the Government and information related department of various countries in the world all spend considerable resources and devote to the research of digital information security technology. Therefore, in the future Internet world, digital informat
APA, Harvard, Vancouver, ISO, and other styles
48

ZHUANG, YONG-CHOU, and 莊永圳. "Applying signature and encryption technique to electronic mails and its VLSI implementation." Thesis, 1989. http://ndltd.ncl.edu.tw/handle/07644680198754296396.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

陳宜妙. "A video encryption and decryption technique using variable length coding and randomized bit-insertion." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/02682408071006153021.

Full text
Abstract:
碩士<br>國立交通大學<br>電子工程系<br>91<br>In this paper, we propose a new video encryption algorithm, which is based on the encryption scheme proposed by Huang and Wang in 2001. In Huang’s approach, the encryption operation is fulfilled via the modification of VLC tables. Based on this encryption scheme, we made a few modifications to greatly enhance its security level. The modifications include the use of randomized bit-insertion and bit-flipping to complicate the statistics of ciphertexts and the use of RLC (run-length coding) disarrangement to increase the difficulty in cryptanalysis. This algorithm c
APA, Harvard, Vancouver, ISO, and other styles
50

Wu, Wen-Ho, and 吳文和. "The Study of Microoptic Elements and Moiré Technique Applying in Optical Encryption and Stereoscopic Image." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/6n52cz.

Full text
Abstract:
博士<br>國防大學理工學院<br>國防科學研究所<br>100<br>The purpose of this thesis has three folds, which are 1) printing Micro-lens Array (MLA) with optical imaging characteristics using screen printing technology; 2) using the Moiré technology for optics encryption and decryption. MLA and LLA are used in this research as the decoding tools, and the anti-counterfeiting scrambled image method is achieved; 3) applying Moiré techniques to 3D imaging and using MATLAB to calculate the best relation between the Moiré 3D imaging and the LLA. The double-sided 3D imaging technique is achieved. Screen printing is simpl
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!