Results 101 to 110 of about 58,616 (313)

A Simple, Accurate and Highly Secure Method to Encrypt-Decrypt Digital Images

open access: yesJOIV: International Journal on Informatics Visualization, 2019
The digital image may be important and has a secret character, which requires not understanding it when looking at the naked eye or not understanding the contents. So seeking a method of digital image encryption-decryption is a very important task.
Jamil Al-Azzeh, Ziad Alqadi, Qazem Jaber
doaj   +1 more source

Structurally Colored Physically Unclonable Functions with Ultra‐Rich and Stable Encoding Capacity

open access: yesAdvanced Functional Materials, Volume 35, Issue 12, March 18, 2025.
This study reports a design strategy for generating bright‐field resolvable physically unclonable functions with extremely rich encoding capacity coupled with outstanding thermal and chemical stability. The optical response emerges from thickness‐dependent structural color formation in ZnO features, which are fabricated by physical vapor deposition ...
Abidin Esidir   +8 more
wiley   +1 more source

Wearable Haptic Feedback Interfaces for Augmenting Human Touch

open access: yesAdvanced Functional Materials, EarlyView.
The wearable haptic feedback interfaces enhance user experience in gaming, social media, biomedical instrumentation, and robotics by generating tactile sensations. This review discusses and categorizes current haptic feedback interfaces into force, thermal, and electrotactile stimulation‐based haptic feedback interfaces, elucidating their current ...
Shubham Patel   +3 more
wiley   +1 more source

Photoswitchable Conductive Metal–Organic Frameworks

open access: yesAdvanced Functional Materials, EarlyView.
A conductive material where the conductivity can be modulated remotely by irradiation with light is presented. It is based on films of conductive metal–organic framework type Cu3(HHTP)2 with embedded photochromic molecules such as azobenzene, diarylethene, spiropyran, and hexaarylbiimidazole in the pores.
Yidong Liu   +5 more
wiley   +1 more source

Securing Color Information Based on CEDPM Keys

open access: yesIEEE Access
In this paper, a novel approach to generating keys for securing color information by combining discrete wavelet transform (DWT) in conjunction with chaotic functions is presented.
Gaurav Verma   +3 more
doaj   +1 more source

NanoMOF‐Based Multilevel Anti‐Counterfeiting by a Combination of Visible and Invisible Photoluminescence and Conductivity

open access: yesAdvanced Functional Materials, EarlyView.
This study presents novel anti‐counterfeiting tags with multilevel security features that utilize additional disguise features. They combine luminescent nanosized Ln‐MOFs with conductive polymers to multifunctional mixed‐matrix membranes and powder composites. The materials exhibit visible/NIR emission and matrix‐based conductivity even as black bodies.
Moritz Maxeiner   +9 more
wiley   +1 more source

A Novel Approach for Safeguarding Kurdish Text Files via Modified AES-OTP and Enhanced RSA Cryptosystem on Unreliable Networks

open access: yesEurasian Journal of Science and Engineering
In line with the growth of the e-governate, the Kurdistan Regional Government is actively adopting digital transformation, which underscores the urgent requirement for distinct encryption methods that are practical for the Kurdish alphabet in the fields ...
Newroz Nooralddin Abdulrazaq
doaj   +1 more source

An Approach of Modified IDEA with 1024 Bits Key to Enhance Security and Efficiency of Data Transmission in the Healthcare Sector [PDF]

open access: yesInternational Journal of Mathematical, Engineering and Management Sciences
Securing the information from the attackers is a crucial aspect of modern digital life. Numerous cryptographic algorithms are employed to provide security for data transmission.
Bilas Haldar   +2 more
doaj   +1 more source

Stream cipher based on quasigroup string transformations in $Z_p^*$

open access: yes, 2004
In this paper we design a stream cipher that uses the algebraic structure of the multiplicative group $\bbbz_p^*$ (where p is a big prime number used in ElGamal algorithm), by defining a quasigroup of order $p-1$ and by doing quasigroup string ...
Gligoroski, Danilo
core   +1 more source

Home - About - Disclaimer - Privacy