Results 21 to 30 of about 482,791 (290)

Image Watermarking Using Least Significant Bit and Canny Edge Detection

open access: yesSensors, 2023
With the advancement in information technology, digital data stealing and duplication have become easier. Over a trillion bytes of data are generated and shared on social media through the internet in a single day, and the authenticity of digital data is
Zaid Bin Faheem   +6 more
doaj   +1 more source

Construction of Substitution Boxes Using Finite Fields

open access: yesVFAST Transactions on Mathematics, 2023
Substitution boxes (S-boxes) play a crucial role in modern cryptographic algorithms, providingnon-linear transformations that enhance the security of data encryption. S-boxes are essentialcomponents of symmetric key ciphers, such as Advanced Encryption Standard (AES) and DataEncryption Standard (DES).
Naveed Ahmed Umrani   +2 more
openaire   +1 more source

Improved Twofish Algorithm: A Digital Image Enciphering Application

open access: yesIEEE Access, 2021
With the growth of networks, the Internet of Things (IoT) and new cyber attacks pose threats to privacy and security, secure communication is therefore becoming one of the most crucial concerns.
Tanveer ul Haq   +5 more
doaj   +1 more source

Construction of S-Boxes Using Different Maps Over Elliptic Curves for Image Encryption

open access: yesIEEE Access, 2021
In this article, we present an encryption technique that can encrypt any digital data. The proposed scheme basically depends on a substitution-permutation network. Two separate bijective maps are used in the proposed algorithm.
Muhammad Ramzan   +4 more
doaj   +1 more source

Generating biometric random cryptographic key based on unique fingerprint features [PDF]

open access: yesهوش محاسباتی در مهندسی برق, 2023
This paper uses the unique biometric features of fingerprints to generate random cryptographic keys. The main aspects of the security of the generated key include the privacy of the fingerprint and the randomness and complexity of the key generation ...
Bahram Rashidi, Ali Goudarzi
doaj   +1 more source

Algebraic Construction of Powerful Substitution Box

open access: yesInternational Journal of Recent Technology and Engineering (IJRTE), 2020
The development of wireless transmission, day by day contacts the new statures of innovation. Cryptography is one of the procedures used to give security to information streaming over the system by encryption and decryption. Substitution box (S-box) is a one of a kind nonlinear activity in Advanced Encryption Standard (AES), this paper proposed a new ...
Eslam wahba afify*   +3 more
openaire   +1 more source

A Novel Construction of Efficient Substitution-Boxes Using Cubic Fractional Transformation

open access: yesEntropy, 2019
A symmetric block cipher employing a substitution–permutation duo is an effective technique for the provision of information security. For substitution, modern block ciphers use one or more substitution boxes (S-Boxes).
Amjad Hussain Zahid   +2 more
doaj   +1 more source

Point Deletion or Insertion in CmeR-Box, A2075G Substitution in 23S rRNA, and Presence of erm(B) Are Key Factors of Erythromycin Resistance in Campylobacter jejuni and Campylobacter coli Isolated From Central China

open access: yesFrontiers in Microbiology, 2020
Campylobacter jejuni and Campylobacter coli are major food-borne pathogens that cause bacterial gastroenteritis in humans, and poultry is considered as their most important reservoir.
Yiluo Cheng   +7 more
doaj   +1 more source

Designing S-Box Using Tent-Sine Chaotic System While Combining the Traits of Tent and Sine Map

open access: yesIEEE Access, 2023
Secure exchange of sensitive information between different entities is a serious challenge in today’s environment. Therefore, various cryptosystems have been created specifically for this purpose. Various operations are used in these cryptosystems.
Annas Wasim Malik   +4 more
doaj   +1 more source

A Novel Image Encryption Scheme Based on Elliptic Curves over Finite Rings

open access: yesEntropy, 2022
Image encryption based on elliptic curves (ECs) is emerging as a new trend in cryptography because it provides high security with a relatively smaller key size when compared with well-known cryptosystems.
Umar Hayat   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy