Results 31 to 40 of about 286,982 (344)

On-the-Fly Parallel Processing IP-Core for Image Blur Detection, Compression, and Chaotic Encryption Based on FPGA

open access: yesIEEE Access, 2021
This paper presents a 3 in 1 standalone FPGA system which can perform color image blur detection in parallel with compression and encryption. Both blur detection and compression are based on the 3-level Haar wavelet transform, which is used as a common ...
Ahmed A. Rezk   +3 more
doaj   +1 more source

CLSM: COUPLE LAYERED SECURITY MODEL A HIGH-CAPACITY DATA HIDING SCHEME USING WITH STEGANOGRAPHY

open access: yesImage Analysis and Stereology, 2017
Cryptography and steganography are the two significant techniques used in secrecy of communications and in safe message transfer. In this study CLSM – Couple Layered Security Model is suggested which has a hybrid structure enhancing information security ...
Cemal Kocak
doaj   +1 more source

Digital Key Distribution Protected by Recorded Quantum Noise

open access: yesIEEE Access
A new digital key distribution and encryption system for broad use is presented. It offers affordable perfect security for in-transit digital communications and is quantum-resistant.
Geraldo A. A
doaj   +1 more source

Three Techniques for Enhancing Chaos-Based Joint Compression and Encryption Schemes

open access: yesEntropy, 2019
In this work, three techniques for enhancing various chaos-based joint compression and encryption (JCAE) schemes are proposed. They respectively improved the execution time, compression ratio, and estimation accuracy of three different chaos-based JCAE ...
Chao-Jen Tsai   +2 more
doaj   +1 more source

Revisiting Fully Homomorphic Encryption Schemes [PDF]

open access: yesarXiv, 2023
Homomorphic encryption is a sophisticated encryption technique that allows computations on encrypted data to be done without the requirement for decryption. This trait makes homomorphic encryption appropriate for safe computation in sensitive data scenarios, such as cloud computing, medical data exchange, and financial transactions.
arxiv  

Error Function Attack of chaos synchronization based encryption schemes

open access: yes, 2003
Different chaos synchronization based encryption schemes are reviewed and compared from the practical point of view. As an efficient cryptanalysis tool for chaos encryption, a proposal based on the Error Function Attack is presented systematically and ...
Hu, Gang   +3 more
core   +1 more source

Designing Secure Heterogeneous Multicore Systems from Untrusted Components

open access: yesCryptography, 2018
In current systems-on-chip (SoCs) designs, processing elements, i.e., intellectual property (IP) cores, may come from different providers, and executable code may have varying levels of trust, all executing on the same compute platform and sharing ...
Michel A. Kinsy   +3 more
doaj   +1 more source

Cryptanalyzing an Image-Scrambling Encryption Algorithm of Pixel Bits

open access: yes, 2017
Position scrambling (permutation) is widely used in multimedia encryption schemes and some international encryption standards, such as the Data Encryption Standard and the Advanced Encryption Standard.
Li, Chengqing, Lin, Dongdong, Lü, Jinhu
core   +1 more source

On the Optimality of Quantum Encryption Schemes

open access: yes, 2005
It is well known that n bits of entropy are necessary and sufficient to perfectly encrypt n bits (one-time pad). Even if we allow the encryption to be approximate, the amount of entropy needed doesn't asymptotically change.
Daniel Nagaj   +2 more
core   +1 more source

Prevention of Crypto-Ransomware Using a Pre-Encryption Detection Algorithm

open access: yesComputers, 2019
Ransomware is a relatively new type of intrusion attack, and is made with the objective of extorting a ransom from its victim. There are several types of ransomware attacks, but the present paper focuses only upon the crypto-ransomware, because it makes ...
S. H. Kok   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy