Results 51 to 60 of about 478,748 (354)

Encrypted data processing with Homomorphic Re-Encryption

open access: yesInformation Sciences, 2017
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Ding, Wenxiu   +3 more
openaire   +3 more sources

Enhancing IoT Data Security: Using the Blockchain to Boost Data Integrity and Privacy

open access: yesIoT
The Internet of Things (IoT) is a technology that can connect billions of devices or “things” to other devices (machine to machine) or even to people via an existing infrastructure.
Ali Eghmazi   +3 more
doaj   +1 more source

Encryption and Hiding Watermarking Using A Chaotic Modified Wavelet Transform [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2011
In this letter, a new digital watermarking algorithm is proposed to hide binary image watermark inside gray image to increase authentication and robustness, DWT are used in embedding because it has many features in image processing.
Shaimaa Mohammad
doaj   +1 more source

A New Image Encryption Algorithm for Grey and Color Medical Images

open access: yesIEEE Access, 2021
Recently, diagnosing diseases using medical images became crucial. As these images are transmitted through the network, they need a high level of protection. If the data in these images are liable for unauthorized usage, this may lead to severe problems.
Sara T. Kamal   +4 more
semanticscholar   +1 more source

Novel Privacy Preserving Non-Invasive Sensing-Based Diagnoses of Pneumonia Disease Leveraging Deep Network Model

open access: yesSensors, 2022
This article presents non-invasive sensing-based diagnoses of pneumonia disease, exploiting a deep learning model to make the technique non-invasive coupled with security preservation.
Mujeeb Ur Rehman   +9 more
doaj   +1 more source

RADH-A Reversible and Authenticable Data Hiding Scheme in Encrypted Domain Based on Image Interpolation and Substitution

open access: yesApplied Sciences
The rise of the Internet has transformed communication and information access, but it also raises serious privacy concerns, especially regarding personal image sharing.
Chia-Chen Lin   +3 more
doaj   +1 more source

Dual-Domain Image Encryption in Unsecure Medium—A Secure Communication Perspective

open access: yesMathematics, 2023
With the growing demand for digitalization, multimedia data transmission through wireless networks has become more prominent. These multimedia data include text, images, audio, and video.
Hemalatha Mahalingam   +4 more
doaj   +1 more source

The Myth of Superiority of American Encryption Products [PDF]

open access: yes, 1998
Encryption software and hardware use sophisticated mathematical algorithms to encipher a message so that only the intended recipient may read it. Fearing that criminals and terrorists will use encryption to evade authorities, the United States now ...
Henry B. Wolfe
core  

A Novel Latin Square Image Cipher

open access: yes, 2012
In this paper, we introduce a symmetric-key Latin square image cipher (LSIC) for grayscale and color images. Our contributions to the image encryption community include 1) we develop new Latin square image encryption primitives including Latin Square ...
Aaronson   +45 more
core   +1 more source

Mapping the evolution of mitochondrial complex I through structural variation

open access: yesFEBS Letters, EarlyView.
Respiratory complex I (CI) is crucial for bioenergetic metabolism in many prokaryotes and eukaryotes. It is composed of a conserved set of core subunits and additional accessory subunits that vary depending on the organism. Here, we categorize CI subunits from available structures to map the evolution of CI across eukaryotes. Respiratory complex I (CI)
Dong‐Woo Shin   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy