Results 51 to 60 of about 404,295 (388)
This paper presents a 3 in 1 standalone FPGA system which can perform color image blur detection in parallel with compression and encryption. Both blur detection and compression are based on the 3-level Haar wavelet transform, which is used as a common ...
Ahmed A. Rezk+3 more
doaj +1 more source
Revisiting Fully Homomorphic Encryption Schemes [PDF]
Homomorphic encryption is a sophisticated encryption technique that allows computations on encrypted data to be done without the requirement for decryption. This trait makes homomorphic encryption appropriate for safe computation in sensitive data scenarios, such as cloud computing, medical data exchange, and financial transactions.
arxiv
Joint Image Compression and Encryption Using IWT with SPIHT, Kd-Tree and Chaotic Maps
Confidentiality and efficient bandwidth utilization require a combination of compression and encryption of digital images. In this paper, a new method for joint image compression and encryption based on set partitioning in hierarchical trees (SPIHT) with
Nasrullah+5 more
doaj +1 more source
Error Function Attack of chaos synchronization based encryption schemes
Different chaos synchronization based encryption schemes are reviewed and compared from the practical point of view. As an efficient cryptanalysis tool for chaos encryption, a proposal based on the Error Function Attack is presented systematically and ...
Hu, Gang+3 more
core +1 more source
Enkripsi dan Dekripsi File dengan Algoritma Blowfish pada Perangkat Mobile Berbasis Android
Cryptography is one of the ways used to secure data in the form of a file with encrypt files so that others are not entitled to know the file is private and confidential.
Siswo Wardoyo+2 more
doaj +1 more source
Revisiting Shared Data Protection Against Key Exposure
This paper puts a new light on secure data storage inside distributed systems. Specifically, it revisits computational secret sharing in a situation where the encryption key is exposed to an attacker.
Bertoni Guido+7 more
core +1 more source
A New Algorithm for Digital Image Encryption Based on Chaos Theory
In recent decades, image encryption, as one of the significant information security fields, has attracted many researchers and scientists. However, several studies have been performed with different methods, and novel and useful algorithms have been ...
Y. Pourasad+2 more
semanticscholar +1 more source
On the Optimality of Quantum Encryption Schemes
It is well known that n bits of entropy are necessary and sufficient to perfectly encrypt n bits (one-time pad). Even if we allow the encryption to be approximate, the amount of entropy needed doesn't asymptotically change.
Daniel Nagaj+2 more
core +1 more source
Secure medical image transmission using deep neural network in e‐health applications
Recently, medical technologies have developed, and the diagnosis of diseases through medical images has become very important. Medical images often pass through the branches of the network from one end to the other. Hence, high‐level security is required.
Ala Abdulsalam Alarood+4 more
doaj +1 more source
Design of an Encryption-Decryption Module Oriented for Internet Information Security SOC Design [PDF]
In order to protect the security of network data, a high speed chip module for encrypting and decrypting of network data packet is designed. The chip module is oriented for internet information security SOC (System on Chip) design. During the design process, AES (Advanced Encryption Standard) and 3DES (Data Encryption Standard) encryption algorithm are
arxiv +1 more source