Results 71 to 80 of about 2,395 (159)
Image encryption with 6D hyperchaotic system and vision transformer autoencoder. [PDF]
Maity A +4 more
europepmc +1 more source
An image encryption scheme using PRESENT-RC4, chaos and secure key generation. [PDF]
Kumar K, Roy S, Puri D, Kumar R.
europepmc +1 more source
Reversible data hiding in encrypted images using LWE-based secret sharing. [PDF]
Saeidi Z, Mirzakuchaki S.
europepmc +1 more source
Secure authentication using a multidimensional retinal biometric encryption method. [PDF]
Banu Y, Rath BK, Gountia D.
europepmc +1 more source
A novel 1D powered Chebyshev quadratic map-based image encryption using dynamic permutation-diffusion. [PDF]
Sarra B, Sun H, Dua M, Dua S, Dhingra D.
europepmc +1 more source
As we are entering the third generation of mobile technology (3G) the number of services needing security grows larger. To assess if the security provided by 3G is sufficient, we take a closer look at the security mechanisms and their building blocks.
openaire +1 more source
Quantum Shannon Information Theory-Design of Communication, Ciphers, and Sensors. [PDF]
Hirota O.
europepmc +1 more source
Secure image encryption using a 4D chaotic system and Langton's ant cellular automaton. [PDF]
Alshehri H.
europepmc +1 more source

