Results 1 to 10 of about 505,863 (290)

A Probabilistic Chaotic Image Encryption Scheme [PDF]

open access: goldMathematics, 2022
This paper proposes a probabilistic image encryption scheme that improves on existing deterministic schemes by using a chaining mode of chaotic maps in a permutation-masking process.
Ali Kanso   +2 more
doaj   +4 more sources

Method of information protection based on the integration of probabilistic encryption and noise immune coding

open access: goldРадіоелектронні і комп'ютерні системи, 2023
The subject matter of this article is the processes of increasing information security in communication systems to solve applied problems that are critical in the transmission of confidential data.
Volodymyr Korchynskyi   +5 more
doaj   +4 more sources

A chaos-based probabilistic block cipher for image encryption

open access: hybridJournal of King Saud University: Computer and Information Sciences, 2022
Traditional encryption is based on secrecy provided by secret-key. But this leads to generation of same cipher text when the encryption scheme is applied to same plaintext with same key.
Sakshi Dhall   +2 more
doaj   +3 more sources

SMSH: Secure Surveillance Mechanism on Smart Healthcare IoT System With Probabilistic Image Encryption [PDF]

open access: goldIEEE Access, 2020
The Internet of Things is made of diverse networked things (i.e., smart, intelligent devices) that are consistently interconnected, producing meaningful data across the network without human interaction.
Jalaluddin Khan   +6 more
doaj   +3 more sources

An Optimized Encryption Technique using an Arbitrary Matrix with Probabilistic Encryption

open access: diamondProcedia Computer Science, 2015
AbstractThis paper presents a simple Encryption/Decryption technique which enables all kinds of file for encryption and decryption. The method of encryption is not only simple, but also secured enough for transmission. The technique uses simple key generation using an arbitrary matrix. The final encryption is performed through a set of operations using
Paresh Ratha   +3 more
semanticscholar   +3 more sources

Methods and Algorithms for Pseudo-probabilistic Encryption with Shared Key

open access: diamond2017 XX IEEE International Conference on Soft Computing and Measurements (SCM), 2018
The aim of the paper is providing resistance of the deniable encryption protocols to coercive attacks at which coercer has possibility to cause repeated encryption of the same input messages and/or to estimate the duration of the decryption procedure performed for disclosing the secret message.
Alexandr Moldovyan, Nikolay A. Moldovyan
semanticscholar   +4 more sources

Secure Surveillance Framework for IoT Systems Using Probabilistic Image Encryption [PDF]

open access: greenIEEE Transactions on Industrial Informatics, 2018
[EN] This paper proposes a secure surveillance framework for Internet of things (IoT) systems by intelligent integration of video summarization and image encryption. First, an efficient video summarization method is used to extract the informative frames using the processing capabilities of visual sensors.
Khan Muhammad   +5 more
semanticscholar   +5 more sources

A probabilistic public key encryption switching scheme for secure cloud storage [PDF]

open access: hybridInternational journal of information technology, 2022
The high demand for user-centric applications such as secure cloud storage laid the foundation for the development of user-centric security schemes with multiple security features in recent years.
Radhakrishna Bhat   +2 more
openalex   +2 more sources

Probabilistic encryption

open access: yesJournal of Computer and System Sciences, 1984
A new probabilistic model of data encryption is introduced. For this model, under suitable complexity assumptions, it is proved that extracting any information about the cleartext from the cyphertext is hard on the average for an adversary with polynomially bounded computational resources.
Goldwasser, Shafi, Micali, Silvio
openaire   +3 more sources

Synchronization of Delayed Fuzzy Neural Networks with Probabilistic Communication Delay and Its Application to Image Encryption [PDF]

open access: bronzeIEEE transactions on fuzzy systems, 2022
In this article, we study the design of fuzzy synchronization controller of Takagi–Sugeno (T–S) fuzzy neural networks with distributed time-varying delay and probabilistic network communication delay.
Shen Yan   +3 more
openalex   +2 more sources

Home - About - Disclaimer - Privacy