Results 311 to 320 of about 133,735 (361)
Some of the next articles are maybe not open access.

An efficient approach for encrypting double color images into a visually meaningful cipher image using 2D compressive sensing

Information Sciences, 2020
An efficient visually meaningful double color image encryption algorithm is proposed by combining 2D compressive sensing (CS) with an embedding technique.
Xiu-li Chai   +5 more
semanticscholar   +1 more source

Shadow: A Lightweight Block Cipher for IoT Nodes

IEEE Internet of Things Journal, 2021
The advancement of the Internet of Things (IoT) has promoted the rapid development of low-power and multifunctional sensors. However, it is seriously significant to ensure the security of data transmission of these nodes. Meanwhile, sensor nodes have the
Ying Guo, Lang Li, Botao Liu
semanticscholar   +1 more source

Hiding cipher-images generated by 2-D compressive sensing with a multi-embedding strategy

Signal Processing, 2020
In terms of 2-D compressive sensing (CS), multi-embedding strategy and chaotic systems, a novel color image encryption scheme to generate visually meaningful cipher image is proposed in this paper.
Xiu-li Chai   +4 more
semanticscholar   +1 more source

Design of image cipher using block-based scrambling and image filtering

Information Sciences, 2017
An image cipher using block-based scrambling and image filtering (IC-BSIF) is introduced;It is the first time that image filtering is used to do encryption;IC-BSIF uses the well-known substitution-permutation network and strictly follows the principles ...
Zhongyun Hua, Yicong Zhou
semanticscholar   +1 more source

Image encryption using block cipher and chaotic sequences

Signal processing. Image communication, 2019
Encryption of data with high correlation, such as images, is a challenge for block ciphers, since patterns of the original image may remain after encryption. This is due to the deterministic mapping performed by the cipher. To overcome this limitation, a
J. Artiles, D. Chaves, C. Pimentel
semanticscholar   +1 more source

An efficient and secure chaotic cipher algorithm for image content preservation

Communications in nonlinear science & numerical simulation, 2018
This paper proposes a new chaotic cipher algorithm for efficient and secure image content preservation, this method is specialized for both standard and medical images, and it consists of two modules which are iteratively performed: chaotic confusion and
Amina Souyah, K. Faraoun
semanticscholar   +1 more source

SFN: A new lightweight block cipher

Microprocessors and microsystems, 2018
During past few years, some lightweight block ciphers have been proposed. These lightweight block ciphers take single encryption method that either uses Substitution-Permutation (SP) network structure or Feistel network structure to encrypt.
Lang Li, Botao Liu, Yimeng Zhou, Yi Zou
semanticscholar   +1 more source

Ciphers

WIREs Computational Statistics, 2011
AbstractThis article surveys three of the most widely used ciphers: the symmetric block cipher, Advanced Encryption Standard (AES), the symmetric stream cipher, RC4, and the asymmetric cipher, RSA. WIREs Comp Stat 2011 3 239–250 DOI: 10.1002/wics.156This article is categorized under: Algorithms and Computational Methods > Algorithms Applications of
openaire   +1 more source

(De)Ciphering Mestizaje:

2023
In Chapter 4, Néstor Medina tackles the experience of mestizaje, historic and complex experiences of mixture (including biological, racial, and cultural). Mestizaje serves as an important locus theologicus for Latino/a theologies. Medina explores the multivalent and complex nature of mestizaje and demonstrates its anthropological value with respect to ...
openaire   +1 more source

Home - About - Disclaimer - Privacy