Results 21 to 30 of about 482,791 (290)
Image Watermarking Using Least Significant Bit and Canny Edge Detection
With the advancement in information technology, digital data stealing and duplication have become easier. Over a trillion bytes of data are generated and shared on social media through the internet in a single day, and the authenticity of digital data is
Zaid Bin Faheem +6 more
doaj +1 more source
Construction of Substitution Boxes Using Finite Fields
Substitution boxes (S-boxes) play a crucial role in modern cryptographic algorithms, providingnon-linear transformations that enhance the security of data encryption. S-boxes are essentialcomponents of symmetric key ciphers, such as Advanced Encryption Standard (AES) and DataEncryption Standard (DES).
Naveed Ahmed Umrani +2 more
openaire +1 more source
Improved Twofish Algorithm: A Digital Image Enciphering Application
With the growth of networks, the Internet of Things (IoT) and new cyber attacks pose threats to privacy and security, secure communication is therefore becoming one of the most crucial concerns.
Tanveer ul Haq +5 more
doaj +1 more source
Construction of S-Boxes Using Different Maps Over Elliptic Curves for Image Encryption
In this article, we present an encryption technique that can encrypt any digital data. The proposed scheme basically depends on a substitution-permutation network. Two separate bijective maps are used in the proposed algorithm.
Muhammad Ramzan +4 more
doaj +1 more source
Generating biometric random cryptographic key based on unique fingerprint features [PDF]
This paper uses the unique biometric features of fingerprints to generate random cryptographic keys. The main aspects of the security of the generated key include the privacy of the fingerprint and the randomness and complexity of the key generation ...
Bahram Rashidi, Ali Goudarzi
doaj +1 more source
Algebraic Construction of Powerful Substitution Box
The development of wireless transmission, day by day contacts the new statures of innovation. Cryptography is one of the procedures used to give security to information streaming over the system by encryption and decryption. Substitution box (S-box) is a one of a kind nonlinear activity in Advanced Encryption Standard (AES), this paper proposed a new ...
Eslam wahba afify* +3 more
openaire +1 more source
A Novel Construction of Efficient Substitution-Boxes Using Cubic Fractional Transformation
A symmetric block cipher employing a substitution–permutation duo is an effective technique for the provision of information security. For substitution, modern block ciphers use one or more substitution boxes (S-Boxes).
Amjad Hussain Zahid +2 more
doaj +1 more source
Campylobacter jejuni and Campylobacter coli are major food-borne pathogens that cause bacterial gastroenteritis in humans, and poultry is considered as their most important reservoir.
Yiluo Cheng +7 more
doaj +1 more source
Designing S-Box Using Tent-Sine Chaotic System While Combining the Traits of Tent and Sine Map
Secure exchange of sensitive information between different entities is a serious challenge in today’s environment. Therefore, various cryptosystems have been created specifically for this purpose. Various operations are used in these cryptosystems.
Annas Wasim Malik +4 more
doaj +1 more source
A Novel Image Encryption Scheme Based on Elliptic Curves over Finite Rings
Image encryption based on elliptic curves (ECs) is emerging as a new trend in cryptography because it provides high security with a relatively smaller key size when compared with well-known cryptosystems.
Umar Hayat +3 more
doaj +1 more source

