Results 51 to 60 of about 142,210 (279)
Secure and Fast Hashing Algorithm with Multiple Security Levels
We propose a new secure and fast hashing algorithm with multiple security levels (SFHA-MSL). It is based on the generic 3C (3 compressions) construction and the 3C-X (3C XOR) hash function which is the simplest and efficient variant of the generic 3C hash function and it is the simplest modification to the Merkle-Damgard (M-D) iterated construction ...
Hassan M. Elkamchouchi+2 more
openaire +2 more sources
A Perceptual Image Hashing Algorithm for Hybrid Document Security [PDF]
In order to create an automatic document security system one needs to secure the textual content but also the graphical content of the document. This paper proposes a hashing algorithm capable of securing the graphical parts of paper and digital documents with unprecedented performance and a very small digest.
Sebastien Eskenazi+3 more
openaire +2 more sources
On the Gold Standard for Security of Universal Steganography [PDF]
While symmetric-key steganography is quite well understood both in the information-theoretic and in the computational setting, many fundamental questions about its public-key counterpart resist persistent attempts to solve them.
A Kiayias+30 more
core +2 more sources
The digital signature generation process begins with the creation of a public key and a private key. A public key is generated and published to verify the signature and calculate the hash value of the received document.
Asep Saepulrohman, Agus Ismangil
doaj +1 more source
A Large-Scale Secure Image Retrieval Method in Cloud Environment
With the rapid development of cloud computing technology, more and more users choose to outsource image data to clouds. To protect data's confidentiality, images need to be encrypted before being outsourced to clouds, but this brings difficulties to some
Yanyan Xu, Xiao Zhao, Jiaying Gong
doaj +1 more source
A Hybrid Domain Image Encryption Algorithm Based on Improved Henon Map
A hybrid domain image encryption algorithm is developed by integrating with improved Henon map, integer wavelet transform (IWT), bit-plane decomposition, and deoxyribonucleic acid (DNA) sequence operations. First, we improve the classical two-dimensional
Yong Chen, Shucui Xie, Jianzhong Zhang
doaj +1 more source
The data breach and the integrity violation of remote data remain significant issues in the domain of information security. A provably-secure hash function aids in providing solutions to integrity-related issues.
P. Karthik+5 more
doaj
Secured Medical Image Hashing Based on Frequency Domain with Chaotic Map [PDF]
Recently, online-medicine got increased global interest, particularly during COVID19 pandemic. Data protection is important in the medical field since when promoting telemedicine applications, it is necessary to protect the patient data and personal ...
Amira Jabbar+2 more
doaj +1 more source
Guest Editorial: Multi‐view representation learning for computer vision
IET Computer Vision, EarlyView.
Xin Ning+5 more
wiley +1 more source
Fast hash functions and convolution product
We propose a new simple and efficient family of hash functions based on matrix-vector multiplications with a competitive software implementation. The hash design combines a hard mathematical problem based on solving a system of linear equations with ...
Omar Sami, Sabri Houssem
doaj +1 more source