Results 51 to 60 of about 142,210 (279)

Secure and Fast Hashing Algorithm with Multiple Security Levels

open access: yesJournal of Software, 2009
We propose a new secure and fast hashing algorithm with multiple security levels (SFHA-MSL). It is based on the generic 3C (3 compressions) construction and the 3C-X (3C XOR) hash function which is the simplest and efficient variant of the generic 3C hash function and it is the simplest modification to the Merkle-Damgard (M-D) iterated construction ...
Hassan M. Elkamchouchi   +2 more
openaire   +2 more sources

A Perceptual Image Hashing Algorithm for Hybrid Document Security [PDF]

open access: yes2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR), 2017
In order to create an automatic document security system one needs to secure the textual content but also the graphical content of the document. This paper proposes a hashing algorithm capable of securing the graphical parts of paper and digital documents with unprecedented performance and a very small digest.
Sebastien Eskenazi   +3 more
openaire   +2 more sources

On the Gold Standard for Security of Universal Steganography [PDF]

open access: yes, 2018
While symmetric-key steganography is quite well understood both in the information-theoretic and in the computational setting, many fundamental questions about its public-key counterpart resist persistent attempts to solve them.
A Kiayias   +30 more
core   +2 more sources

Data integrity and security of digital signatures on electronic systems using the digital signature algorithm (DSA)

open access: yesInternational Journal of Electronics and Communications System, 2021
The digital signature generation process begins with the creation of a public key and a private key. A public key is generated and published to verify the signature and calculate the hash value of the received document.
Asep Saepulrohman, Agus Ismangil
doaj   +1 more source

A Large-Scale Secure Image Retrieval Method in Cloud Environment

open access: yesIEEE Access, 2019
With the rapid development of cloud computing technology, more and more users choose to outsource image data to clouds. To protect data's confidentiality, images need to be encrypted before being outsourced to clouds, but this brings difficulties to some
Yanyan Xu, Xiao Zhao, Jiaying Gong
doaj   +1 more source

A Hybrid Domain Image Encryption Algorithm Based on Improved Henon Map

open access: yesEntropy, 2022
A hybrid domain image encryption algorithm is developed by integrating with improved Henon map, integer wavelet transform (IWT), bit-plane decomposition, and deoxyribonucleic acid (DNA) sequence operations. First, we improve the classical two-dimensional
Yong Chen, Shucui Xie, Jianzhong Zhang
doaj   +1 more source

A novel subset-based polynomial design for enhancing the security of short message-digest with inflated avalanche and random responses

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
The data breach and the integrity violation of remote data remain significant issues in the domain of information security. A provably-secure hash function aids in providing solutions to integrity-related issues.
P. Karthik   +5 more
doaj  

Secured Medical Image Hashing Based on Frequency Domain with Chaotic Map [PDF]

open access: yesEngineering and Technology Journal, 2021
Recently, online-medicine got increased global interest, particularly during COVID19 pandemic. Data protection is important in the medical field since when promoting telemedicine applications, it is necessary to protect the patient data and personal ...
Amira Jabbar   +2 more
doaj   +1 more source

Guest Editorial: Multi‐view representation learning for computer vision

open access: yes, 2023
IET Computer Vision, EarlyView.
Xin Ning   +5 more
wiley   +1 more source

Fast hash functions and convolution product

open access: yesJournal of Mathematical Cryptology, 2014
We propose a new simple and efficient family of hash functions based on matrix-vector multiplications with a competitive software implementation. The hash design combines a hard mathematical problem based on solving a system of linear equations with ...
Omar Sami, Sabri Houssem
doaj   +1 more source

Home - About - Disclaimer - Privacy