Results 51 to 60 of about 478,748 (354)
Encrypted data processing with Homomorphic Re-Encryption
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Ding, Wenxiu +3 more
openaire +3 more sources
Enhancing IoT Data Security: Using the Blockchain to Boost Data Integrity and Privacy
The Internet of Things (IoT) is a technology that can connect billions of devices or “things” to other devices (machine to machine) or even to people via an existing infrastructure.
Ali Eghmazi +3 more
doaj +1 more source
Encryption and Hiding Watermarking Using A Chaotic Modified Wavelet Transform [PDF]
In this letter, a new digital watermarking algorithm is proposed to hide binary image watermark inside gray image to increase authentication and robustness, DWT are used in embedding because it has many features in image processing.
Shaimaa Mohammad
doaj +1 more source
A New Image Encryption Algorithm for Grey and Color Medical Images
Recently, diagnosing diseases using medical images became crucial. As these images are transmitted through the network, they need a high level of protection. If the data in these images are liable for unauthorized usage, this may lead to severe problems.
Sara T. Kamal +4 more
semanticscholar +1 more source
This article presents non-invasive sensing-based diagnoses of pneumonia disease, exploiting a deep learning model to make the technique non-invasive coupled with security preservation.
Mujeeb Ur Rehman +9 more
doaj +1 more source
The rise of the Internet has transformed communication and information access, but it also raises serious privacy concerns, especially regarding personal image sharing.
Chia-Chen Lin +3 more
doaj +1 more source
Dual-Domain Image Encryption in Unsecure Medium—A Secure Communication Perspective
With the growing demand for digitalization, multimedia data transmission through wireless networks has become more prominent. These multimedia data include text, images, audio, and video.
Hemalatha Mahalingam +4 more
doaj +1 more source
The Myth of Superiority of American Encryption Products [PDF]
Encryption software and hardware use sophisticated mathematical algorithms to encipher a message so that only the intended recipient may read it. Fearing that criminals and terrorists will use encryption to evade authorities, the United States now ...
Henry B. Wolfe
core
A Novel Latin Square Image Cipher
In this paper, we introduce a symmetric-key Latin square image cipher (LSIC) for grayscale and color images. Our contributions to the image encryption community include 1) we develop new Latin square image encryption primitives including Latin Square ...
Aaronson +45 more
core +1 more source
Mapping the evolution of mitochondrial complex I through structural variation
Respiratory complex I (CI) is crucial for bioenergetic metabolism in many prokaryotes and eukaryotes. It is composed of a conserved set of core subunits and additional accessory subunits that vary depending on the organism. Here, we categorize CI subunits from available structures to map the evolution of CI across eukaryotes. Respiratory complex I (CI)
Dong‐Woo Shin +2 more
wiley +1 more source

