Results 41 to 50 of about 459,845 (362)
Serial encryption using the functions of real variable
Context. Using the functions of a real variable in cryptosystems as keys allow increasing their cryptographic strength since it is more difficult to select such keys. Therefore, the development of such systems is relevant. Objective.
Viktor Avramenko, Volodymyr Demianenko
doaj +1 more source
Encryption and Hiding Watermarking Using A Chaotic Modified Wavelet Transform [PDF]
In this letter, a new digital watermarking algorithm is proposed to hide binary image watermark inside gray image to increase authentication and robustness, DWT are used in embedding because it has many features in image processing.
Shaimaa Mohammad
doaj +1 more source
The rise of the Internet has transformed communication and information access, but it also raises serious privacy concerns, especially regarding personal image sharing.
Chia-Chen Lin +3 more
doaj +1 more source
This article presents non-invasive sensing-based diagnoses of pneumonia disease, exploiting a deep learning model to make the technique non-invasive coupled with security preservation.
Mujeeb Ur Rehman +9 more
doaj +1 more source
Searchable Encryption to Reduce Encryption Degradation in Adjustably Encrypted Databases
Processing queries on encrypted data protects sensitive data stored in cloud databases. CryptDB has introduced the approach of adjustable encryption for such processing. A database column is adjusted to the necessary level of encryption, e.g. order-preserving, for the set of executed queries, but never reversed.
Florian Kerschbaum, Martin Härterich
openaire +3 more sources
The Myth of Superiority of American Encryption Products [PDF]
Encryption software and hardware use sophisticated mathematical algorithms to encipher a message so that only the intended recipient may read it. Fearing that criminals and terrorists will use encryption to evade authorities, the United States now ...
Henry B. Wolfe
core
Cryptanalysis of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables [PDF]
This paper studies the security of a recently-proposed MPEG-video encryption scheme based on secret Huffman tables. Our cryptanalysis shows that: 1) the key space of the encryption scheme is not sufficiently large against divide-and-conquer (DAC) attack ...
A. Uhl +10 more
core +3 more sources
Insights into PI3K/AKT signaling in B cell development and chronic lymphocytic leukemia
This Review explores how the phosphoinositide 3‐kinase and protein kinase B pathway shapes B cell development and drives chronic lymphocytic leukemia, a common blood cancer. It examines how signaling levels affect disease progression, addresses treatment challenges, and introduces novel experimental strategies to improve therapies and patient outcomes.
Maike Buchner
wiley +1 more source
Implementation and Performance of Lightweight Authentication Encryption ASCON on IoT Devices
The Internet of Things (IoT) is growing rapidly, enabling interconnected devices to communicate and share data seamlessly. While this expansion drives significant advancements across industries, it also introduces critical challenges in ensuring secure ...
Gabriela Cagua +2 more
doaj +1 more source
Dual-Domain Image Encryption in Unsecure Medium—A Secure Communication Perspective
With the growing demand for digitalization, multimedia data transmission through wireless networks has become more prominent. These multimedia data include text, images, audio, and video.
Hemalatha Mahalingam +4 more
doaj +1 more source

