Results 41 to 50 of about 230,329 (221)

CLSM: COUPLE LAYERED SECURITY MODEL A HIGH-CAPACITY DATA HIDING SCHEME USING WITH STEGANOGRAPHY

open access: yesImage Analysis and Stereology, 2017
Cryptography and steganography are the two significant techniques used in secrecy of communications and in safe message transfer. In this study CLSM – Couple Layered Security Model is suggested which has a hybrid structure enhancing information security ...
Cemal Kocak
doaj   +1 more source

A Secure Framework for Authentication and Encryption Using Improved ECC for IoT-Based Medical Sensor Data

open access: yesIEEE Access, 2020
Mobile users are increasing exponentially to adopt ubiquitous services offered by various sectors. This has attracted attention for a secure communication framework to access e-health data on mobile devices.
Mohammad Ayoub Khan   +3 more
doaj   +1 more source

Digital Key Distribution Protected by Recorded Quantum Noise

open access: yesIEEE Access
A new digital key distribution and encryption system for broad use is presented. It offers affordable perfect security for in-transit digital communications and is quantum-resistant.
Geraldo A. A
doaj   +1 more source

On-the-Fly Parallel Processing IP-Core for Image Blur Detection, Compression, and Chaotic Encryption Based on FPGA

open access: yesIEEE Access, 2021
This paper presents a 3 in 1 standalone FPGA system which can perform color image blur detection in parallel with compression and encryption. Both blur detection and compression are based on the 3-level Haar wavelet transform, which is used as a common ...
Ahmed A. Rezk   +3 more
doaj   +1 more source

Revisiting Fully Homomorphic Encryption Schemes [PDF]

open access: yesarXiv, 2023
Homomorphic encryption is a sophisticated encryption technique that allows computations on encrypted data to be done without the requirement for decryption. This trait makes homomorphic encryption appropriate for safe computation in sensitive data scenarios, such as cloud computing, medical data exchange, and financial transactions.
arxiv  

Joint Image Compression and Encryption Using IWT with SPIHT, Kd-Tree and Chaotic Maps

open access: yesApplied Sciences, 2018
Confidentiality and efficient bandwidth utilization require a combination of compression and encryption of digital images. In this paper, a new method for joint image compression and encryption based on set partitioning in hierarchical trees (SPIHT) with
Nasrullah   +5 more
doaj   +1 more source

Enkripsi dan Dekripsi File dengan Algoritma Blowfish pada Perangkat Mobile Berbasis Android

open access: yesJurnal Nasional Teknik Elektro, 2016
Cryptography is one of the ways used to secure data in the form of a file with encrypt files so that others are not entitled to know the file is private and confidential.
Siswo Wardoyo   +2 more
doaj   +1 more source

A New Image Encryption Algorithm for Grey and Color Medical Images

open access: yesIEEE Access, 2021
Recently, diagnosing diseases using medical images became crucial. As these images are transmitted through the network, they need a high level of protection. If the data in these images are liable for unauthorized usage, this may lead to severe problems.
Sara T. Kamal   +4 more
semanticscholar   +1 more source

Secure medical image transmission using deep neural network in e‐health applications

open access: yesHealthcare Technology Letters, 2023
Recently, medical technologies have developed, and the diagnosis of diseases through medical images has become very important. Medical images often pass through the branches of the network from one end to the other. Hence, high‐level security is required.
Ala Abdulsalam Alarood   +4 more
doaj   +1 more source

Design of an Encryption-Decryption Module Oriented for Internet Information Security SOC Design [PDF]

open access: yesInternational Journal of Soft Computing And Software Engineering (JSCSE),Vol.2,No.7, 2012, 2014
In order to protect the security of network data, a high speed chip module for encrypting and decrypting of network data packet is designed. The chip module is oriented for internet information security SOC (System on Chip) design. During the design process, AES (Advanced Encryption Standard) and 3DES (Data Encryption Standard) encryption algorithm are
arxiv   +1 more source

Home - About - Disclaimer - Privacy