Results 11 to 20 of about 493,090 (289)

A Probabilistic Chaotic Image Encryption Scheme [PDF]

open access: goldMathematics, 2022
This paper proposes a probabilistic image encryption scheme that improves on existing deterministic schemes by using a chaining mode of chaotic maps in a permutation-masking process.
Ali Kanso   +2 more
doaj   +4 more sources

Method of information protection based on the integration of probabilistic encryption and noise immune coding

open access: goldРадіоелектронні і комп'ютерні системи, 2023
The subject matter of this article is the processes of increasing information security in communication systems to solve applied problems that are critical in the transmission of confidential data.
Volodymyr Korchynskyi   +5 more
doaj   +4 more sources

Probabilistic encryption

open access: bronzeJournal of Computer and System Sciences, 1984
A new probabilistic model of data encryption is introduced. For this model, under suitable complexity assumptions, it is proved that extracting any information about the cleartext from the cyphertext is hard on the average for an adversary with polynomially bounded computational resources.
Shafi Goldwasser, Silvio Micali
semanticscholar   +4 more sources

A chaos-based probabilistic block cipher for image encryption

open access: goldJournal of King Saud University: Computer and Information Sciences, 2022
Traditional encryption is based on secrecy provided by secret-key. But this leads to generation of same cipher text when the encryption scheme is applied to same plaintext with same key.
Sakshi Dhall   +2 more
doaj   +4 more sources

Probabilistic Selective Encryption of Convolutional Neural Networks for Hierarchical Services [PDF]

open access: green2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2021
Model protection is vital when deploying Convolutional Neural Networks (CNNs) for commercial services, due to the massive costs of training them. In this work, we propose a selective encryption (SE) algorithm to protect CNN models from unauthorized access, with a unique feature of providing hierarchical services to users.
Jinyu Tian, Jiantao Zhou, Jia Duan
semanticscholar   +9 more sources

SMSH: Secure Surveillance Mechanism on Smart Healthcare IoT System With Probabilistic Image Encryption [PDF]

open access: goldIEEE Access, 2020
The Internet of Things is made of diverse networked things (i.e., smart, intelligent devices) that are consistently interconnected, producing meaningful data across the network without human interaction.
Jalaluddin Khan   +6 more
doaj   +3 more sources

An Optimized Encryption Technique using an Arbitrary Matrix with Probabilistic Encryption

open access: goldProcedia Computer Science, 2015
AbstractThis paper presents a simple Encryption/Decryption technique which enables all kinds of file for encryption and decryption. The method of encryption is not only simple, but also secured enough for transmission. The technique uses simple key generation using an arbitrary matrix. The final encryption is performed through a set of operations using
Paresh Ratha   +3 more
semanticscholar   +4 more sources

Secure Surveillance Framework for IoT Systems Using Probabilistic Image Encryption [PDF]

open access: greenIEEE Transactions on Industrial Informatics, 2018
[EN] This paper proposes a secure surveillance framework for Internet of things (IoT) systems by intelligent integration of video summarization and image encryption. First, an efficient video summarization method is used to extract the informative frames using the processing capabilities of visual sensors.
Khan Muhammad   +5 more
semanticscholar   +5 more sources

A probabilistic public key encryption switching scheme for secure cloud storage [PDF]

open access: hybridInternational journal of information technology, 2022
The high demand for user-centric applications such as secure cloud storage laid the foundation for the development of user-centric security schemes with multiple security features in recent years.
Radhakrishna Bhat   +2 more
openalex   +2 more sources

Synchronization of Delayed Fuzzy Neural Networks with Probabilistic Communication Delay and Its Application to Image Encryption [PDF]

open access: hybridIEEE transactions on fuzzy systems, 2022
In this article, we study the design of fuzzy synchronization controller of Takagi–Sugeno (T–S) fuzzy neural networks with distributed time-varying delay and probabilistic network communication delay.
Shen Yan   +3 more
openalex   +2 more sources

Home - About - Disclaimer - Privacy