To see the other types of publications on this topic, follow the link: Encryption techniques.

Journal articles on the topic 'Encryption techniques'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Encryption techniques.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Et. al., Jaichandran R,. "A Hybrid Encryption Model with Attribute Based Encryption and Advanced Encryption Standard Techniques." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 334–36. http://dx.doi.org/10.17762/turcomat.v12i2.720.

Full text
Abstract:
The emergence of cloud computing has completely changed the information technology sector, storage of information’s and access control. The main challenge in the migration of enterprises is the security to gain data owners confidence. In existing approach, many digital signatures based methodologies are used. In the existing approach, encryption time, security, encryption complexity are the parameters which need more focus. To overcome the existing issue, in this paper we proposed an hybrid architecture invoking attribute based encryption (ABE) for encrypting the key and advanced encryption st
APA, Harvard, Vancouver, ISO, and other styles
2

Ramanathan, Thirumalaimuthu, Md Jakir Hossen, Md Shohel Sayeed, and Joseph Emerson Raja. "Survey on computational intelligence based image encryption techniques." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 3 (2020): 1428. http://dx.doi.org/10.11591/ijeecs.v19.i3.pp1428-1435.

Full text
Abstract:
Image encryption is an important area in visual cryptography that helps in protecting images when shared through internet. There is lot of cryptography algorithms applied for many years in encrypting images. In the recent years, artificial intelligence techniques are combined with cryptography algorithms to support image encryption. Some of the benefits that artificial intelligence techniques can provide are prediction of possible attacks on cryptosystem using machine learning algorithms, generation of cryptographic keys using optimization algorithms, etc. Computational intelligence algorithms
APA, Harvard, Vancouver, ISO, and other styles
3

Thirumalaimuthu, T. Ramanathan, Hossen J., Sayeed S., and Emerson Raja J. "Survey on computational intelligence based image encryption techniques." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 3 (2020): 1428–35. https://doi.org/10.11591/ijeecs.v19.i3.pp1428-1435.

Full text
Abstract:
Image encryption is an important area in visual cryptography that helps in protecting images when shared through internet. There is lot of cryptography algorithms applied for many years in encrypting images. In the recent years, artificial intelligence techniques are combined with cryptography algorithms to support image encryption. Some of the benefits that artificial intelligence techniques can provide are prediction of possible attacks on cryptosystem using machine learning algorithms, generation of cryptographic keys using optimization algorithms, etc. Computational intelligence algorithms
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Zongwei. "Data Privacy Protection Utilizing Homomorphic Encryption Techniques." Applied and Computational Engineering 135, no. 1 (2025): 1–9. https://doi.org/10.54254/2755-2721/2025.21090.

Full text
Abstract:
In the current era with the rapid development of the Internet, although a variety of technologies have offered convenience to people's lives, numerous problems have arisen regarding the security of individual and collective data, Problems such as data privacy leakage occur continuously. The content of this review is data privacy protection based on homomorphic encryption. Firstly, the basic principle and formula of homomorphic encryption are briefly introduced. Then, the homomorphic encryption-based data privacy protection approach is developed in response to the importance of safeguarding dat
APA, Harvard, Vancouver, ISO, and other styles
5

Ansari, Tasin Habib Ahmad* Dr. J. W. Bakal. "ENHANCING PRIVACY USING COLLABORATIVE ATTRIBUTE ENCRYPTION TECHNIQUES." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 11 (2016): 83–91. https://doi.org/10.5281/zenodo.164906.

Full text
Abstract:
In the era where computers dominate the other facilities, it becomes even more productive once connected to the world with the help of internet. Although it possesses certain challenges to connect oneself to the world. The challenges of Authenticity, confidentiality, and anonymity and all of the notions of security with the concern aspects. Depending on the application the encryption techniques differs the most recent assortment that is the attribute based encryption, unlike traditional encryption technique this technique doesn’t reveals its identity Security tends to be the most important asp
APA, Harvard, Vancouver, ISO, and other styles
6

Parenreng‬, Jumadi Mabe, Sahraeni Maulida Mustari, and Abdul Wahid. "E-mail Security System Using El-Gamal Hybrid Algorithm and AES (Advanced Encryption Standard) Algorithm." Internet of Things and Artificial Intelligence Journal 2, no. 1 (2022): 1–9. http://dx.doi.org/10.31763/iota.v2i1.510.

Full text
Abstract:
E-mail is a medium of long-distance communication via the internet, which is currently often used for message exchange needs. But the use of e-mail has security problems, especially regarding data leakage when sending messages via e-mail. One of the efforts to improve the security of data and information is the application of cryptographic techniques and methods, namely end-to-end encryption. Cryptography is the science of reducing the risk of security threats by encrypting and decrypting data and information. In the implementation of the e-mail system, at least 2 (two) suitable encryption tec
APA, Harvard, Vancouver, ISO, and other styles
7

Sharma, Ramandeep, Richa Sharma, and Harmanjit Singh. "Classical Encryption Techniques." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 1 (2012): 84–90. http://dx.doi.org/10.24297/ijct.v3i1b.2745.

Full text
Abstract:
This paper reviews some of the classical encryption and modern techniques which are widely used to solve the problem in open networked systems, where information is being received and misused by adversaries by means of facilitating attacks at various levels in the communication. In this paper the proposition of building the basics of classical encryption and modern techniques and the comparison has been done between each of them.
APA, Harvard, Vancouver, ISO, and other styles
8

Vaishnavi Agrawal. "Enhancing Privacy on Online Social Networs: A comparative study of encryption techniques." Journal of Advances and Scholarly Researches in Allied Education 21, no. 5 (2024): 25–32. http://dx.doi.org/10.29070/cqryaz86.

Full text
Abstract:
The ability to connect with people all over the world and share private information has made online social networks (OSNs) indispensable to contemporary communication. Because of the serious privacy and security concerns that come with their fast growth, protecting user data is of the utmost importance. In order to improve OSN privacy, this study examines several encryption techniques. It discusses symmetric encryption (ECC and RSA) and synthetic encryption (AES) as well as hybrid methods that combine the two types of encryption. Using examples from well-known sites such as LinkedIn, Facebook,
APA, Harvard, Vancouver, ISO, and other styles
9

Yeow, Sin-Qian, and Kok-Why Ng. "Neural Network Based Data Encryption: A Comparison Study among DES, AES, and HE Techniques." JOIV : International Journal on Informatics Visualization 7, no. 3-2 (2023): 2086. http://dx.doi.org/10.30630/joiv.7.3-2.2336.

Full text
Abstract:
With the improvement of technology and the continuous expansion and deepening of neural network technology, its application in computer network security plays an important role. However, the development of neural networks is accompanied by new threats and challenges. This paper proposes to encrypt the weight data using encryption algorithms and embed image encryption algorithms to improve protected data security further. The purpose is to address the feasibility and effectiveness of using modern encryption algorithms for data encryption in machine learning in response to data privacy breaches.
APA, Harvard, Vancouver, ISO, and other styles
10

Li, Bingcheng, Dingkang Li, and Mingyuan Zhu. "Application analysis of data encryption technology." Applied and Computational Engineering 50, no. 1 (2024): 199–205. http://dx.doi.org/10.54254/2755-2721/50/20241502.

Full text
Abstract:
Data encryption technology is a key method to secure sensitive data. The privacy and confidentiality of data is protected by encrypting the data, i.e., transforming the original data into a form that cannot be understood without authorization. However, the security of traditional encryption algorithms is gradually challenged with the increase in computing power. Therefore, studying how to apply more advanced encryption techniques has become a current research hotspot. This study aims to analyze the application of data encryption techniques and explore the advantages and applicability of emergi
APA, Harvard, Vancouver, ISO, and other styles
11

Thabit, Zainab Hasan, Sadiq A. Mehdi, and Bashar M. Nema. "Enhancing Color Image Security: Encryption with Dynamic Chaotic Three-Dimensional System and Robust Security Analysis." Al-Mustansiriyah Journal of Science 34, no. 4 (2023): 87–95. http://dx.doi.org/10.23851/mjs.v34i4.1411.

Full text
Abstract:
The rapid tech growth and widespread internet usage caused a surge in sharing multimedia (text, images, videos, audio) across public networks. Protecting this data is vital, demanding encryption to prevent unauthorized access. Image encryption distorts images for security. This paper highlights encryption's vital role in safeguarding multimedia, especially amid rising internet use and media exchange. It introduces a novel solution: a chaotic three-dimensional system for color image encryption. The study scrutinizes system traits using math software. It employs a new chaotic system to generate
APA, Harvard, Vancouver, ISO, and other styles
12

Yang, Ming, Monica Trifas, Guillermo Francia III, and Lei Chen. "Cryptographic and Steganographic Approaches to Ensure Multimedia Information Security and Privacy." International Journal of Information Security and Privacy 3, no. 3 (2009): 37–54. http://dx.doi.org/10.4018/jisp.2009100703.

Full text
Abstract:
Information security and privacy have traditionally been ensured with data encryption techniques. Generic data encryption standards, such as DES, RSA, AES, are not very efficient in the encryption of multimedia contents due to the large volume. In order to address this issue, different image/video encryption methodologies have been developed. These methodologies encrypt only the key parameters of image/video data instead of encrypting it as a bitstream. Joint compression-encryption is a very promising direction for image/video encryption. Nowadays, researchers start to utilize information hidi
APA, Harvard, Vancouver, ISO, and other styles
13

Isidhore, Smitty V. "Modern Cryptosystems for Color Image Encryption: Insights and Future Directions." International Scientific Journal of Engineering and Management 04, no. 04 (2025): 1–7. https://doi.org/10.55041/isjem02918.

Full text
Abstract:
Abstract - In the current digital age, the widespread use of color images in areas like healthcare, surveillance, and multimedia communications has significantly increased concerns about image security. By incorporating a systematic approach following PRISMA guidelines, this paper presents a critical review of recent developments in cryptosystems used for color image encryption. Through a standardized examination of the state-of-the-art techniques, this review assesses techniques that ensure the authenticity, confidentiality, and integrity of color images. We focus on offering insights into cu
APA, Harvard, Vancouver, ISO, and other styles
14

Alslman, Yasmeen, Eman Alnagi, Ashraf Ahmad, Yousef AbuHour, Remah Younisse, and Qasem Abu Al-haija. "Hybrid Encryption Scheme for Medical Imaging Using AutoEncoder and Advanced Encryption Standard." Electronics 11, no. 23 (2022): 3967. http://dx.doi.org/10.3390/electronics11233967.

Full text
Abstract:
Recently, medical image encryption has gained special attention due to the nature and sensitivity of medical data and the lack of effective image encryption using innovative encryption techniques. Several encryption schemes have been recommended and developed in an attempt to improve medical image encryption. The majority of these studies rely on conventional encryption techniques. However, such improvements have come with increased computational complexity and slower processing for encryption and decryption processes. Alternatively, the engagement of intelligent models such as deep learning a
APA, Harvard, Vancouver, ISO, and other styles
15

Mohammed, Zahraa A., Hadeel Qasem Gheni, Zahraa Jabbar Hussein, and Ali Kadhum M. Al-Qurabat. "Advancing Cloud Image Security via AES Algorithm Enhancement Techniques." Engineering, Technology & Applied Science Research 14, no. 1 (2024): 12694–701. http://dx.doi.org/10.48084/etasr.6601.

Full text
Abstract:
Communication system and internet dominance in our society, has made image security a matter of paramount concern. Cryptography involves encrypting data to protect information exchange between senders and receivers, establishing a foundation for secure communication. The Advanced Encryption Standard (AES) is an exceptional algorithm that plays a pivotal role in this area because of its ability to consistently transform plain data into cipher data using the same encryption key. This algorithm engages intricate encryption techniques, harnessing a variety of algorithms and transformations to ensu
APA, Harvard, Vancouver, ISO, and other styles
16

Zhu, Bingxin, Puwen Wei, and Mingqiang Wang. "Adaptive Security of Broadcast Encryption, Revisited." Security and Communication Networks 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/1404279.

Full text
Abstract:
We provide a strong security notion for broadcast encryption, called adaptive security in the multichallenge setting (MA-security), where the adversary can adaptively have access to the key generation oracle and the encryption oracle many times (multichallenge). The adversary specially can query for the challenge ciphertexts on different target user sets adaptively, which generalizes the attacks against broadcast encryptions in the real world setting. Our general result shows that the reduction of the adaptive secure broadcast encryption will lose a factor of q in the MA setting, where q is th
APA, Harvard, Vancouver, ISO, and other styles
17

Wedad Abdul Khuder Naser, Amal Abbas Kadhim, and Safana Hyder Abbas. "Subject review: Image encryption techniques." Global Journal of Engineering and Technology Advances 15, no. 3 (2023): 029–31. http://dx.doi.org/10.30574/gjeta.2023.15.3.0098.

Full text
Abstract:
Security is one of the core areas of study in recent days. Encryption of the image is widely known as an effective method for its secure transmission. The objective of any image encryption method is to obtain a top quality hidden image in order to keep information secret. This paper is a study of research authors in the field of image encryption with a research review to see how the field of image encryption has progressed and the best algorithms in their performance.
APA, Harvard, Vancouver, ISO, and other styles
18

Wedad, Abdul Khuder Naser, Abbas Kadhim Amal, and Hyder Abbas Safana. "Subject review: Image encryption techniques." Global Journal of Engineering and Technology Advances 16, no. 1 (2023): 029–31. https://doi.org/10.5281/zenodo.8275766.

Full text
Abstract:
Security is one of the core areas of study in recent days. Encryption of the image is widely known as an effective method for its secure transmission. The objective of any image encryption method is to obtain a top quality hidden image in order to keep information secret. This paper is a study of research authors in the field of image encryption with a research review to see how the field of image encryption has progressed and the best algorithms in their performance.
APA, Harvard, Vancouver, ISO, and other styles
19

Farhan, Mohammed Mahmoud. "Image Authentication Using Public Key." Al-Salam Journal for Engineering and Technology 4, no. 1 (2024): 78–87. http://dx.doi.org/10.55145/ajest.2025.04.01.007.

Full text
Abstract:
This study talked about importance of data protection during Internet communication and highlights the utilize of image encryption as a specialized method. Image encryptions contain the utilize of unique key values to hide and show messages within images, with algorithms that are difficult to decryption. This work focuses on a modified version of the Rivest-Shamir-Adleman (RSA) encryption system, which is compatible with grayscale and color images and is implemented in C#. Additionally, it combines Advanced Encryption Standard (AES) and cryptography techniques to enhance encryption protection.
APA, Harvard, Vancouver, ISO, and other styles
20

Annadurai, Narmadha, and Agusthiyar Ramu. "Bolstering image encryption techniques with blockchain technology - a systematic review." International Journal of Informatics and Communication Technology (IJ-ICT) 14, no. 2 (2025): 594. https://doi.org/10.11591/ijict.v14i2.pp594-604.

Full text
Abstract:
Multimedia data plays a momentous role in present world. With the advancements in various fields of research like internet of things (IoT), industrial IoT (IIoT), cloud computing, medical image processing, and many more technologies, the digital images have already encroached the multimedia eon. The major challenge lies in providing a tamper proof image with higher level of security and confidentiality while being transmitted through a public network. Image encryption techniques are considered to be the predominant method to anticipate security from any unauthorized user access. This has indee
APA, Harvard, Vancouver, ISO, and other styles
21

Pushpendra, Tiwari. "A study and comparison of the various cryptography technique standards within fifteen factors." i-manager's Journal on Digital Forensics & Cyber Security 1, no. 1 (2023): 21. http://dx.doi.org/10.26634/jdf.1.1.19134.

Full text
Abstract:
This paper focuses on analyzing the performance of various encryption algorithms, namely RSA, ECC, and DSA, in terms of encrypting and decrypting sensitive data. Encryption is crucial for ensuring the security of data, and there are two types of encryption algorithms: Symmetric key and Asymmetric-key encryption. RSA is highly secure but has high computation time, whereas ECC provides equivalent security with lower computing power and battery usage. The study compares the implementation and analysis of DES, 3DES, AES, RSA, ECC, and DSA, highlighting their strengths and weaknesses. The paper aim
APA, Harvard, Vancouver, ISO, and other styles
22

Dr., Khaled Musa. "Evaluating Encryption Algorithm Method Based on Software Encryption Tools for Information Security." International Journal of Current Science Research and Review 06, no. 06 (2023): 3188–94. https://doi.org/10.5281/zenodo.8013027.

Full text
Abstract:
<strong>ABSTRACT:</strong> Information security is the combination of policies, rules and practices to prevent any unauthorized access or attacks that causes corruption to data, information, and computing services. Information security techniques and programs are built around the core objective to secure data and information by adapting encryption algorithms methods. Encryption algorithm methods impeded in the information security programs or encryption software tools enforce more security by encrypting and decrypting data and information. Encryption algorithm methods are based on algorithms t
APA, Harvard, Vancouver, ISO, and other styles
23

El-Yahyaoui, Ahmed, and Mohamed Daifr Ech-Cherif El Kettani. "About Fully Homomorphic Encryption Improvement Techniques." International Journal of Embedded and Real-Time Communication Systems 10, no. 3 (2019): 1–20. http://dx.doi.org/10.4018/ijertcs.2019070101.

Full text
Abstract:
Fully homomorphic encryption schemes (FHE) are a type of encryption algorithm dedicated to data security in cloud computing. It allows for performing computations over ciphertext. In addition to this characteristic, a verifiable FHE scheme has the capacity to allow an end user to verify the correctness of the computations done by a cloud server on his encrypted data. Since FHE schemes are known to be greedy in term of processing consumption and slow in terms of runtime execution, it is very useful to look for improvement techniques and tools to improve FHE performance. Parallelizing computatio
APA, Harvard, Vancouver, ISO, and other styles
24

Joshi, Bineet, Bansidhar Joshi, Anupama Mishra, Varsha Arya, Avadhesh Kumar Gupta, and Dragan Peraković. "A Comparative Study of Privacy-Preserving Homomorphic Encryption Techniques in Cloud Computing." International Journal of Cloud Applications and Computing 12, no. 1 (2022): 1–11. http://dx.doi.org/10.4018/ijcac.309936.

Full text
Abstract:
In cloud computing, a third party hosts a client's data, which raises privacy and security concerns. To maintain privacy, data should be encrypted by cryptographic techniques. However, encrypting the data makes it unsuitable for indexing and fast processing, as data needs to be decrypted to plain text before it can be further processed. Homomorphic encryption helps to overcome this shortcoming by allowing users to perform operations on encrypted data without decryption. Many academics have attempted to address the issue of data security, but none have addressed the issue of data privacy in clo
APA, Harvard, Vancouver, ISO, and other styles
25

Al-khafaji, Baydaa-Jaffer. "An approach for encrypting images using a four-dimensional logistic map." Wasit Journal for Pure sciences 3, no. 2 (2024): 140–45. http://dx.doi.org/10.31185/wjps.343.

Full text
Abstract:
Encrypting image transmission has been one of the most complex challenges with communication technology ever. Millions of people utilize and share photographs via the internet for personal and professional purposes. One approach to secure picture transfer over the network is to use encryption techniques to transform the original picture into an unreadable or garbled version. Several novel and encouraging possibilities for creating secure Image data encryption techniques are presented by cryptographic algorithms grounded in chaotic logistic theory. Developing a foolproof method for encrypting b
APA, Harvard, Vancouver, ISO, and other styles
26

Kaur, Mandeep, Surender Singh, and Manjit Kaur. "Computational Image Encryption Techniques: A Comprehensive Review." Mathematical Problems in Engineering 2021 (July 19, 2021): 1–17. http://dx.doi.org/10.1155/2021/5012496.

Full text
Abstract:
Images contain very sensitive and confidential information. Because images play a significant role in many applications such as military communication, remote-sensing, and medical-imaging, therefore, it is necessary to protect sensitive and confidential information from unauthorized use and modification. To achieve this objective, encryption is one of the best methods among the information hiding methods. In recent years, many image encryption approaches are designed by the researchers. They use different concepts for image encryption to increase security. The main aim of this paper is to pres
APA, Harvard, Vancouver, ISO, and other styles
27

Kumar, Brijesh, and Amrita Saraswat. "Security on Cloud using High Level Encryption Techniques." International Journal of Trend in Scientific Research and Development Volume-1, Issue-6 (2017): 915–18. http://dx.doi.org/10.31142/ijtsrd4712.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Selvi, J. Helen Arokia, and T. Rajendran. "DNA Encoding and Chaos based Image Encryption Technique for Cloud Storage and Communications." Indian Journal Of Science And Technology 18, no. 9 (2025): 734–44. https://doi.org/10.17485/ijst/v18i9.3557.

Full text
Abstract:
Objectives: To suggest an image encryption system that uses DNA encoding and chaotic maps with SHA -512 secret key to provide a secure, efficient, and deterministic mechanism for protecting digital RGB images from unwanted access, manipulation during transmission and cloud storage. Methods: This strategy uses the distinctive features of DNA encoding and chaotic systems to improve image encryption performance. The hybrid technique in the present study uses DNA Encoding with 4 rules and a chaotic mechanism with SHA-512 secret key for image encryption. This technique is compared with Advanced Enc
APA, Harvard, Vancouver, ISO, and other styles
29

Mahna, Shivanku, and Sravan Ch. "Data Encryption Techniques for USB." International Journal of Computer Applications 104, no. 7 (2014): 14–17. http://dx.doi.org/10.5120/18213-9162.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

SIROMONEY, RANI, K. G. SUBRAMANIAN, and P. J. ABISHA. "ENCRYPTION-DECRYPTION TECHNIQUES FOR PICTURES." International Journal of Pattern Recognition and Artificial Intelligence 03, no. 03n04 (1989): 497–503. http://dx.doi.org/10.1142/s0218001489000371.

Full text
Abstract:
Language theoretic public key cryptosystems for strings and pictures are discussed. Two methods of constructing public key cryptosystems for the safe transmission or storage of chain code pictures are presented; the first one encrypts a chain code picture as a string and the second one as a two-dimensional array.
APA, Harvard, Vancouver, ISO, and other styles
31

Vasim Ahamad, Mohd, Misbah Urrahman Siddiqui, Maria Masroor, and Urooj Fatima. "An Improved Playfair Encryption Technique Using Fibonacci Series Generated Secret Key." International Journal of Engineering & Technology 7, no. 4.5 (2018): 347. http://dx.doi.org/10.14419/ijet.v7i4.5.20104.

Full text
Abstract:
With the technology advancements and easy availability of internet, every day millions of users share information electronically through emails, file sharing, e-commerce, etc. As, internet is highly vulnerable to various attacks, sending sensitive information over the Internet may be dangerous. One of the ways to protect the sensitive Information is using the cryptographic techniques. So, while sharing sensitive information over the Internet, it should be sent in encrypted form to prevent the access by unauthorized person. Encryption can be defined as the process of transforming information in
APA, Harvard, Vancouver, ISO, and other styles
32

Ranjan, Kumar H. S., Safeeriya S. P. Fathimath, Ganesh Aithal, and Surendra Shetty. "A Survey on Key(s) and Keyless Image Encryption Techniques." Cybernetics and Information Technologies 17, no. 4 (2017): 134–64. http://dx.doi.org/10.1515/cait-2017-0046.

Full text
Abstract:
AbstractAs in recent years digital data transmission and image application have been increasing, maintaining secure transmission of image is of high importance. Image Encryption is implemented to achieve security on image applications. This paper exhibits a survey on various existing image encryption techniques. The paper mainly focuses on two types: Image encryption with Key(s) and Image Encryption without Key(s). In addition it also describes several properties of a good image encryption technique. The paper presents a survey of most popular algorithms and research papers that are related wi
APA, Harvard, Vancouver, ISO, and other styles
33

Adeyemi Afolayan Adesola, Awele Mary-rose Ilusanmi, and Peter Chimee. "A review of the cryptographic approaches to data security: The impact of quantum computing, evolving challenges and future solutions." World Journal of Advanced Research and Reviews 25, no. 2 (2025): 1916–24. https://doi.org/10.30574/wjarr.2025.25.2.0434.

Full text
Abstract:
Cryptography plays a fundamental role in defending digital data against cyberthreats and emerging quantum computer capabilities. This review discusses core cryptographic techniques such as symmetric encryption, asymmetric encryption and cryptographic hashing, as well as advanced techniques like lattice-based cryptography , code-based cryptography, multi-variate polynomial cryptography and hash-based cryptography that are quantum resistant. The review share insight into the applications of cryptographic techniques in securing communications, encrypting databases, blockchain technology, and heal
APA, Harvard, Vancouver, ISO, and other styles
34

Dr.R.Premkumar., Dr.C.Priya., S.Vengatesh Kumar.,, Dr M. Vidhyalakshmi &. Dr S. Saranya;. "Investigation on Image Encryption Using Chaos Based Techniques." International Journal for Modern Trends in Science and Technology 7, no. 05 (2021): 147–53. http://dx.doi.org/10.46501/ijmtst0705025.

Full text
Abstract:
As the trading of information over the open systems and internet is quickly developing, security of the information turns into a major concern. One conceivable answer for this issue is to encode the information. Chaos has been generally utilized for image encryption for its diverse elements. There are numerous chaotic based encryption procedures for information concealing like validation, hashing, cryptography have been created and are in practice nowadays. This paper moreover investigates the properties of various mapping techniques that stretches out to the execution parameters utilized as a
APA, Harvard, Vancouver, ISO, and other styles
35

S, Murugesan, S. Ashok Kumar, Tamilselvi K, and Thiyagarajan T. "PRIVACY-PRESERVING TECHNIQUES IN BIG DATA AND INFORMATION SECURITY." ICTACT Journal on Communication Technology 15, no. 3 (2024): 3320–24. http://dx.doi.org/10.21917/ijct.2024.0493.

Full text
Abstract:
In the era of big data, ensuring privacy while processing vast amounts of sensitive information poses a significant challenge. Traditional encryption methods often fall short in maintaining both privacy and data utility during computation. This paper introduces Two-Trapdoor Homomorphic Encryption (TTHE), a novel approach designed to enhance privacy-preserving capabilities in big data and information security. TTHE combines the strengths of trapdoor functions with homomorphic encryption to enable secure data processing without compromising privacy. With the exponential growth of data, safeguard
APA, Harvard, Vancouver, ISO, and other styles
36

Alauldeen Al-Bayati, Hajir, Lahieb M. Jawad, and Dalal N. Hamod. "Exploring Visual Cryptography Techniques: A Comprehensive Review." Al-Nahrain Journal of Science 27, no. 3 (2024): 97–108. https://doi.org/10.22401/anjs.27.3.12.

Full text
Abstract:
The backdrop: visual cryptography represents a contemporary encryption technology valued for its ease of implementation and comprehensibility, eliminating the need for a secure channel for key transmission and similar requirements. This paper aims: delve into the diverse methods employed in optical encryption, exploring their advantages and drawbacks, with a particular focus on image encryption techniques and the outcomes documented in various research studies. The objective is to identify the strengths and weaknesses inherent in these methodologies, paving the way for potential solutions in t
APA, Harvard, Vancouver, ISO, and other styles
37

Parthasarathy, Rajamohan, Seow Soon Loong, and Preethy Ayyappan. "An Efficient Encryption Implementation Using AES Algorithm Techniques." Journal of Engineering & Technological Advances 3, no. 1 (2018): 61–70. http://dx.doi.org/10.35934/segi.v3i1.61.

Full text
Abstract:
The AES algorithm is a symmetric block cipher that can encrypt, (encipher), and decrypt, (decipher), information. Encryption converts data to an unintelligible form called cipher-text. Decryption of the cipher-text converts the data back into its original form, which is called plaintext. The AES algorithm is capable of using cryptographic keys of 128, 192, and 256 bits to encrypt and decrypt data in blocks of 128 bits. The National Institute of Standards and Technology, (NIST), solicited proposals for the Advanced Encryption Standard, (AES). The AES is a Federal Information Processing Standard
APA, Harvard, Vancouver, ISO, and other styles
38

Namdeo, Thorat Nilesh, Amit Singla, and Tanaji Dhaigude. "VISUAL CRYPTOGRAPHY WITH COLOR IMAGE ENCRYPTION VIA IMPROVED ELLIPTIC CURVE CRYPTOGRAPHY (ECC) AND OTP GENERATION: SELF-IMPROVED GOLD RUSH OPTIMIZATION ALGORITHM FOR OPTIMAL KEY GENERATION." International Journal of Innovations & Research Analysis 04, no. 03(I) (2024): 52–58. http://dx.doi.org/10.62823/ijira/4.3(i).6808.

Full text
Abstract:
Visual Cryptography is a cryptographic technique that involves encrypting images in such a way that decryption can be performed visually without the need for complex computations. This technique holds significant importance in secure image sharing, as it ensures that sensitive visual information remains confidential during transmission. Recognizing this significance, a novel approach named Self-Improved Gold Rush Optimization (SIGRO)-based Visual Cryptography has been proposed in this research. This approach encompasses two main phases: Embedding and Extraction. It involves encrypting three or
APA, Harvard, Vancouver, ISO, and other styles
39

Abdulbaqi, et. al., Azmi Shawkat. "Exploring the potential of offline cryptography techniques for securing ECG signals in healthcare." Periodicals of Engineering and Natural Sciences (PEN) 11, no. 3 (2023): 148–54. https://doi.org/10.21533/pen.v11.i3.142.

Full text
Abstract:
In the research, a software for ECG signal based on Chaos encryption based on C#-programmed and Kit of Microsoft Visual Studio Development was implemented. A chaos logic map (ChLMp ) and its initial value are utilized to create Level-1 ECG signal based on Chaos encryption bit streams. A ChLMp, an initial value, a ChLMp bifurcation parameter, and two encryption level parameters are utilized to create level-2 ECG signal based on Chaos encryption bit streams. The level-3 ECG signal based on Chaos encryption software utilizes two parameters for the level of encryption, a permutation mechanism, an
APA, Harvard, Vancouver, ISO, and other styles
40

Jameel, Enas Ali, and Sameera Abbas Fadhel. "Digital Image Encryption Techniques: Article Review." Technium: Romanian Journal of Applied Sciences and Technology 4, no. 2 (2022): 24–35. http://dx.doi.org/10.47577/technium.v4i2.6026.

Full text
Abstract:
In this age of the multi-media, images have an important impact on communication. When users upload images over an insecure communication network, total security is a difficult problem to address in order to maintain image confidentiality. Also, encryption is a technique for keeping images secret. This study gives a basic introduction to cryptography, as well as a concise overview regarding the many image encryption algorithms' elemental security criteria. This paper includes an overview of several image encryption approaches as well as a comparison of discrete image encoding techniques, befor
APA, Harvard, Vancouver, ISO, and other styles
41

Simkin, Mark G. "Using Spreadsheets to Teach Data Encryption Techniques." AIS Educator Journal 1, no. 1 (2006): 27–37. http://dx.doi.org/10.3194/aise.2006.1.1.27.

Full text
Abstract:
There are a variety of reasons why understanding encryption technology is likely to become increasingly important in the future, and therefore why accounting courses are likely to include encryption materials in future curricula. This paper discusses five encryption techniques: transposition ciphers, cyclic substitution ciphers, Vigenere ciphers, exclusive OR ciphers, and permutation ciphers. Accompanying these discussions are explanations of how instructors can demonstrate these techniques with spreadsheet models. The author's experiences with such models in classroom use have been uniformly
APA, Harvard, Vancouver, ISO, and other styles
42

Subramanian N., Dr Venkata, and Dr Shankar Sriram V S. "Mitigating DDoS Attacks in Virtual Machine Migration: An In-Depth Security Framework Utilizing Deep Learning and Advanced Encryption Techniques." International Journal of Innovative Technology and Exploring Engineering 14, no. 2 (2025): 12–20. https://doi.org/10.35940/ijitee.b1032.14020125.

Full text
Abstract:
Safeguarding virtual machines (VMs) during migration is essential to avert Service Level Agreement (SLA) violations. This research article presents a robust security framework that utilizes deep learning and advanced encryption methods to reduce the impact of Distributed Denial of Service (DDoS) attacks during virtual machine migration. The study introduces an Improved Sparrow Search Algorithm-based Deep Neural Network (ISSA-DNN) for the classification of DDoS attacks and utilizes Advanced Encryption Standard-Elliptic Curve Cryptography (AES-ECC) to safeguard virtual machine images. The primar
APA, Harvard, Vancouver, ISO, and other styles
43

Dr., Venkata Subramanian N. "Mitigating DDoS Attacks in Virtual Machine Migration: An In-Depth Security Framework Utilizing Deep Learning and Advanced Encryption Techniques." International Journal of Innovative Technology and Exploring Engineering (IJITEE) 14, no. 2 (2025): 12–20. https://doi.org/10.35940/ijitee.B1032.14020125.

Full text
Abstract:
<strong>Abstract: </strong>Safeguarding virtual machines (VMs) during migration is essential to avert Service Level Agreement (SLA) violations. This research article presents a robust security framework that utilizes deep learning and advanced encryption methods to reduce the impact of Distributed Denial of Service (DDoS) attacks during virtual machine migration. The study introduces an Improved Sparrow Search Algorithm-based Deep Neural Network (ISSA-DNN) for the classification of DDoS attacks and utilizes Advanced Encryption Standard-Elliptic Curve Cryptography (AES-ECC) to safeguard virtual
APA, Harvard, Vancouver, ISO, and other styles
44

Omolara Patricia Olaiya, Temitayo Oluwadamilola Adesoga, Azeez Adekunle Adebayo, Fehintola Moyosore Sotomi, Oluwaseun Aaron Adigun, and Paschal M Ezeliora. "Encryption techniques for financial data security in fintech applications." International Journal of Science and Research Archive 12, no. 1 (2024): 2942–49. http://dx.doi.org/10.30574/ijsra.2024.12.1.1210.

Full text
Abstract:
In the dynamic world of financial technology (Fintech), securing financial data is a key priority. Increasing digital connectivity, adoption of cloud-based services requiring complex measures to protect the integrity, privacy and availability of sensitive information. Encryption techniques are emerging as a key tool to achieve these goals about itself by converting plaintext into ciphertext, protected from unauthorized access and probability violations. This review paper examines the various encryption techniques required to secure financial information in fintech applications. The main method
APA, Harvard, Vancouver, ISO, and other styles
45

Abu Zitar, Raed, and Muhammed J. Al-Muhammed. "Hybrid encryption technique: Integrating the neural network with distortion techniques." PLOS ONE 17, no. 9 (2022): e0274947. http://dx.doi.org/10.1371/journal.pone.0274947.

Full text
Abstract:
This paper proposes a hybrid technique for data security. The computational model of the technique is grounded on both the non-linearity of neural network manipulations and the effective distortion operations. To accomplish this, a two-layer feedforward neural network is trained for each plaintext block. The first layer encodes the symbols of the input block, making the resulting ciphertext highly uncorrelated with the input block. The second layer reverses the impact of the first layer by generating weights that are used to restore the original plaintext block from the ciphered one. The disto
APA, Harvard, Vancouver, ISO, and other styles
46

Gosavi, Mr Abhijeet, Mr Sakib Shaikh, Mr Adnan Sayyed, Mr Somesh Sapa, Mr Ayan Shaikh, and Prof A. A. Pund. "Enabling Encrypted Cloud Emails with Data Encryption using Advanced Encryption Techniques." International Journal for Research in Applied Science and Engineering Technology 11, no. 6 (2023): 864–69. http://dx.doi.org/10.22214/ijraset.2023.53709.

Full text
Abstract:
Abstract: Cloud computing offers a flexible and convenient means of exchanging data, with several advantages for both society and individuals. With the widespread usage of cloud emails and frequent reports of large-scale email leakage occurrences, the security property known as forward secrecy has become desirable and necessary for both users and cloud email service providers to increase the security of cloud email systems. Typical techniques of attaining forward secrecy, such as Diffie-Hellman key exchange and forward-secure public-key encryption, have not been extensively authorized and used
APA, Harvard, Vancouver, ISO, and other styles
47

Prashant, MD Sohail Haque, Amrinder Kaur, and Pankaj Yadav. "Comparative Analysis of AES and RSA with Other Encryption Techniques for Secure Communication." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 2 (2024): 565–74. http://dx.doi.org/10.32628/cseit2410263.

Full text
Abstract:
In today’s digitized era, where the whole world is interconnected and every information about individuals are collected, it is important to process and store the data such that it is safe from unauthorized access. Encryption is used to turn the plain text into cipher text which makes the data unreadable, thus maintaining its confidentiality and integrity. Among the several encryption methods available, Advanced Encryption Standard (AES) and Rivest Shamir Adleman (RSA) are popularly used due to their effectiveness and efficiency. However, alternative encryption techniques exist, each offers dif
APA, Harvard, Vancouver, ISO, and other styles
48

Al-Fayoumi, Mustafa A., Ammar Odeh, Ismail Keshta, and Ashraf Ahmad. "Techniques of medical image encryption taxonomy." Bulletin of Electrical Engineering and Informatics 11, no. 4 (2022): 1990–97. http://dx.doi.org/10.11591/eei.v11i4.3850.

Full text
Abstract:
Medical images are one of the most significant and sensitive data types in computer systems. Sending medical images over the internet necessitates using a robust encryption scheme that is resistant to cryptographic attacks. Confidentiality is the most critical part of the three security objectives for information systems security, namely confidentiality, integrity, and availability. Confidentiality is the most critical aspect for the secure storage and transfer of medical images. In this study, we attempt to classify various encryption methods in order to assist researchers in selecting the op
APA, Harvard, Vancouver, ISO, and other styles
49

Mustafa, A. Al-Fayoumi, Odeh Ammar, Keshta Ismail, and Ahmad Ashraf. "Techniques of medical image encryption taxonomy." Bulletin of Electrical Engineering and Informatics 11, no. 4 (2022): 1990~1997. https://doi.org/10.11591/eei.v11i4.3850.

Full text
Abstract:
Medical images are one of the most significant and sensitive data types in computer systems. Sending medical images over the internet necessitates using a robust encryption scheme that is resistant to cryptographic attacks. Confidentiality is the most critical part of the three security objectives for information systems security, namely confidentiality, integrity, and availability. Confidentiality is the most critical aspect for the secure storage and transfer of medical images. In this study, we attempt to classify various encryption methods in order to assist researchers in selecting the op
APA, Harvard, Vancouver, ISO, and other styles
50

M, Sreekala, and Varghese Paul. "A Novel Hybrid Encryption Method for Multimedia Encryption Using Elliptic Curve Cryptography and TDMRC." International Journal of Emerging Research in Management and Technology 6, no. 7 (2018): 1. http://dx.doi.org/10.23956/ijermt.v6i7.178.

Full text
Abstract:
We are in the era of digital revolution and the benefits are remarkable. People are much dependent on digital technology and can’t survive without it. With the advancement of Internet and its applications, we share a wide range of data including texts, images, audios and videos in a more extensive space and time scope that we never had before. This increases the need for security day by day. Cryptography is an art of Science that uses complex logic in order to design powerful encryption techniques. Both symmetric and asymmetric key encryptions have their own advantages. Time Dependant Multiple
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!