Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Encryption techniques.

Zeitschriftenartikel zum Thema „Encryption techniques“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Encryption techniques" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Et. al., Jaichandran R,. „A Hybrid Encryption Model with Attribute Based Encryption and Advanced Encryption Standard Techniques“. Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, Nr. 2 (11.04.2021): 334–36. http://dx.doi.org/10.17762/turcomat.v12i2.720.

Der volle Inhalt der Quelle
Annotation:
The emergence of cloud computing has completely changed the information technology sector, storage of information’s and access control. The main challenge in the migration of enterprises is the security to gain data owners confidence. In existing approach, many digital signatures based methodologies are used. In the existing approach, encryption time, security, encryption complexity are the parameters which need more focus. To overcome the existing issue, in this paper we proposed an hybrid architecture invoking attribute based encryption (ABE) for encrypting the key and advanced encryption standard (AES) for file encryption. Thus the proposed methodology provides security, confidentiality and optimizing storage and encryption cost
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Ramanathan, Thirumalaimuthu, Md Jakir Hossen, Md Shohel Sayeed und Joseph Emerson Raja. „Survey on computational intelligence based image encryption techniques“. Indonesian Journal of Electrical Engineering and Computer Science 19, Nr. 3 (01.09.2020): 1428. http://dx.doi.org/10.11591/ijeecs.v19.i3.pp1428-1435.

Der volle Inhalt der Quelle
Annotation:
Image encryption is an important area in visual cryptography that helps in protecting images when shared through internet. There is lot of cryptography algorithms applied for many years in encrypting images. In the recent years, artificial intelligence techniques are combined with cryptography algorithms to support image encryption. Some of the benefits that artificial intelligence techniques can provide are prediction of possible attacks on cryptosystem using machine learning algorithms, generation of cryptographic keys using optimization algorithms, etc. Computational intelligence algorithms are popular in enhancing security for image encryption. The main computational intelligence algorithms used in image encryption are neural network, fuzzy logic and genetic algorithm. In this paper, a review is done on computational intelligence-based image encryption methods that have been proposed in the recent years and the comparison is made on those methods based on their performance on image encryption.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Parenreng‬, Jumadi Mabe, Sahraeni Maulida Mustari und Abdul Wahid. „E-mail Security System Using El-Gamal Hybrid Algorithm and AES (Advanced Encryption Standard) Algorithm“. Internet of Things and Artificial Intelligence Journal 2, Nr. 1 (16.02.2022): 1–9. http://dx.doi.org/10.31763/iota.v2i1.510.

Der volle Inhalt der Quelle
Annotation:
E-mail is a medium of long-distance communication via the internet, which is currently often used for message exchange needs. But the use of e-mail has security problems, especially regarding data leakage when sending messages via e-mail. One of the efforts to improve the security of data and information is the application of cryptographic techniques and methods, namely end-to-end encryption. Cryptography is the science of reducing the risk of security threats by encrypting and decrypting data and information. In the implementation of the e-mail system, at least 2 (two) suitable encryption techniques are needed, namely symmetric encryption techniques to encrypt messages and data to be sent via e-mail effectively and efficiently, and asymmetric encryption techniques used to distribute keys used by symmetric encryption. Therefore, in this study, we use the El-Gamal encryption model to distribute the symmetric key, and the AES encryption model is a fairly secure algorithm to protect message data or confidential information.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Sharma, Ramandeep, Richa Sharma und Harmanjit Singh. „Classical Encryption Techniques“. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, Nr. 1 (01.08.2012): 84–90. http://dx.doi.org/10.24297/ijct.v3i1b.2745.

Der volle Inhalt der Quelle
Annotation:
This paper reviews some of the classical encryption and modern techniques which are widely used to solve the problem in open networked systems, where information is being received and misused by adversaries by means of facilitating attacks at various levels in the communication. In this paper the proposition of building the basics of classical encryption and modern techniques and the comparison has been done between each of them.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Yeow, Sin-Qian, und Kok-Why Ng. „Neural Network Based Data Encryption: A Comparison Study among DES, AES, and HE Techniques“. JOIV : International Journal on Informatics Visualization 7, Nr. 3-2 (30.11.2023): 2086. http://dx.doi.org/10.30630/joiv.7.3-2.2336.

Der volle Inhalt der Quelle
Annotation:
With the improvement of technology and the continuous expansion and deepening of neural network technology, its application in computer network security plays an important role. However, the development of neural networks is accompanied by new threats and challenges. This paper proposes to encrypt the weight data using encryption algorithms and embed image encryption algorithms to improve protected data security further. The purpose is to address the feasibility and effectiveness of using modern encryption algorithms for data encryption in machine learning in response to data privacy breaches. The approach consists of training a neural network to simulate a model of machine learning and then encrypting it using Data Encryption Standard (DES), Advanced Encryption Standard (AES), and Homomorphic Encryption (HE) techniques, respectively. Its performance is evaluated based on the encryption/decryption accuracy and computational efficiency. The results indicate that combining DES with Blowfish offers moderate encryption and decryption speeds but is less secure than AES and HE. AES provides a practical solution, balancing security and performance, offering a relatively swift encryption and decryption process while maintaining high security. However, Fernet and HE present a viable alternative if data privacy is a top priority. Encryption and decryption times increase with file size and require sufficient computational resources. Future research should explore image encryption techniques to balance security and accurate image retrieval during decryption. Advanced privacy-preserving approaches, such as differential privacy and secure multi-party computation, may enhance security and confidentiality in digital encryption and decryption processes.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Li, Bingcheng, Dingkang Li und Mingyuan Zhu. „Application analysis of data encryption technology“. Applied and Computational Engineering 50, Nr. 1 (25.03.2024): 199–205. http://dx.doi.org/10.54254/2755-2721/50/20241502.

Der volle Inhalt der Quelle
Annotation:
Data encryption technology is a key method to secure sensitive data. The privacy and confidentiality of data is protected by encrypting the data, i.e., transforming the original data into a form that cannot be understood without authorization. However, the security of traditional encryption algorithms is gradually challenged with the increase in computing power. Therefore, studying how to apply more advanced encryption techniques has become a current research hotspot. This study aims to analyze the application of data encryption techniques and explore the advantages and applicability of emerging encryption algorithms. This paper presents a variety of methods for preventing users' privacy breaches, with a primary focus on the principles of homomorphic encryption and how data can be accessed by users without decryption. Additionally, the working principles of secure multiparty computation are discussed, allowing multiple users to perform calculations on shared data while preserving data privacy. Furthermore, the paper explores data encryption techniques that employ specific algorithms to convert plaintext into ciphertext, ensuring both data consistency and privacy. Finally, a summary and future prospects are provided.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Thabit, Zainab Hasan, Sadiq A. Mehdi und Bashar M. Nema. „Enhancing Color Image Security: Encryption with Dynamic Chaotic Three-Dimensional System and Robust Security Analysis“. Al-Mustansiriyah Journal of Science 34, Nr. 4 (30.12.2023): 87–95. http://dx.doi.org/10.23851/mjs.v34i4.1411.

Der volle Inhalt der Quelle
Annotation:
The rapid tech growth and widespread internet usage caused a surge in sharing multimedia (text, images, videos, audio) across public networks. Protecting this data is vital, demanding encryption to prevent unauthorized access. Image encryption distorts images for security. This paper highlights encryption's vital role in safeguarding multimedia, especially amid rising internet use and media exchange. It introduces a novel solution: a chaotic three-dimensional system for color image encryption. The study scrutinizes system traits using math software. It employs a new chaotic system to generate a crucial key sequence for pixel scrambling. Utilizing stream cipher encryption enhances security. Extensive security analysis tests its resilience against attacks like histogram and correlation techniques. Results are promising: a fairly uniform histogram, minimal correlation among pixels nearing zero, and entropy close to the ideal. Metrics like NPCR and UACI almost match ideal values, ensuring high security. Experiments confirm its effectiveness in encrypting diverse color images. The approach guarantees a uniform histogram, minimal pixel correlation nearing zero, entropy near the ideal value (8), and NPCR/UACI values close to ideals (99.61191% and 33.41068% respectively).
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Yang, Ming, Monica Trifas, Guillermo Francia III und Lei Chen. „Cryptographic and Steganographic Approaches to Ensure Multimedia Information Security and Privacy“. International Journal of Information Security and Privacy 3, Nr. 3 (Juli 2009): 37–54. http://dx.doi.org/10.4018/jisp.2009100703.

Der volle Inhalt der Quelle
Annotation:
Information security and privacy have traditionally been ensured with data encryption techniques. Generic data encryption standards, such as DES, RSA, AES, are not very efficient in the encryption of multimedia contents due to the large volume. In order to address this issue, different image/video encryption methodologies have been developed. These methodologies encrypt only the key parameters of image/video data instead of encrypting it as a bitstream. Joint compression-encryption is a very promising direction for image/video encryption. Nowadays, researchers start to utilize information hiding techniques to enhance the security level of data encryption methodologies. Information hiding conceals not only the content of the secret message, but also its very existence. In terms of the amount of data to be embedded, information hiding methodologies can be classified into low bitrate and high bitrate algorithms. In terms of the domain for embedding, they can be classified into spatial domain and transform domain algorithms. Different categories of information hiding methodologies, as well as data embedding and watermarking strategies for digital video contents, will be reviewed. A joint cryptograph-steganography methodology, which combines both encryption and information hiding techniques to ensure patient information security and privacy in medical images, is also presented.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Alslman, Yasmeen, Eman Alnagi, Ashraf Ahmad, Yousef AbuHour, Remah Younisse und Qasem Abu Al-haija. „Hybrid Encryption Scheme for Medical Imaging Using AutoEncoder and Advanced Encryption Standard“. Electronics 11, Nr. 23 (30.11.2022): 3967. http://dx.doi.org/10.3390/electronics11233967.

Der volle Inhalt der Quelle
Annotation:
Recently, medical image encryption has gained special attention due to the nature and sensitivity of medical data and the lack of effective image encryption using innovative encryption techniques. Several encryption schemes have been recommended and developed in an attempt to improve medical image encryption. The majority of these studies rely on conventional encryption techniques. However, such improvements have come with increased computational complexity and slower processing for encryption and decryption processes. Alternatively, the engagement of intelligent models such as deep learning along with encryption schemes exhibited more effective outcomes, especially when used with digital images. This paper aims to reduce and change the transferred data between interested parties and overcome the problem of building negative conclusions from encrypted medical images. In order to do so, the target was to transfer from the domain of encrypting an image to encrypting features of an image, which are extracted as float number values. Therefore, we propose a deep learning-based image encryption scheme using the autoencoder (AE) technique and the advanced encryption standard (AES). Specifically, the proposed encryption scheme is supposed to encrypt the digest of the medical image prepared by the encoder from the autoencoder model on the encryption side. On the decryption side, the analogous decoder from the auto-decoder is used after decrypting the carried data. The autoencoder was used to enhance the quality of corrupted medical images with different types of noise. In addition, we investigated the scores of structure similarity (SSIM) and mean square error (MSE) for the proposed model by applying four different types of noise: salt and pepper, speckle, Poisson, and Gaussian. It has been noticed that for all types of noise added, the decoder reduced this noise in the resulting images. Finally, the performance evaluation demonstrated that our proposed system improved the encryption/decryption overhead by 50–75% over other existing models.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Mohammed, Zahraa A., Hadeel Qasem Gheni, Zahraa Jabbar Hussein und Ali Kadhum M. Al-Qurabat. „Advancing Cloud Image Security via AES Algorithm Enhancement Techniques“. Engineering, Technology & Applied Science Research 14, Nr. 1 (08.02.2024): 12694–701. http://dx.doi.org/10.48084/etasr.6601.

Der volle Inhalt der Quelle
Annotation:
Communication system and internet dominance in our society, has made image security a matter of paramount concern. Cryptography involves encrypting data to protect information exchange between senders and receivers, establishing a foundation for secure communication. The Advanced Encryption Standard (AES) is an exceptional algorithm that plays a pivotal role in this area because of its ability to consistently transform plain data into cipher data using the same encryption key. This algorithm engages intricate encryption techniques, harnessing a variety of algorithms and transformations to ensure robust data security. This study introduces an image encryption technique to comprehensively address security requirements. The proposed method uses the AES algorithm to provide high reliability and unparalleled safety, effectively protecting precious images against any form of malicious attack. The sender's image is intelligently fragmented into multiple pieces to maximize data confidentiality, employing a sophisticated algorithm. Upon decryption by the intended recipient, these fragments seamlessly merge to reconstruct the original image. The suggested technique allows users to securely store their data in the cloud, mitigating concerns related to potential data leakage, damage, or corruption. Thus, by integrating a cloud-based storage system, and utilizing digital signatures through OpenSSL, this method guarantees airtight security and reliability for sensitive data.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Zhu, Bingxin, Puwen Wei und Mingqiang Wang. „Adaptive Security of Broadcast Encryption, Revisited“. Security and Communication Networks 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/1404279.

Der volle Inhalt der Quelle
Annotation:
We provide a strong security notion for broadcast encryption, called adaptive security in the multichallenge setting (MA-security), where the adversary can adaptively have access to the key generation oracle and the encryption oracle many times (multichallenge). The adversary specially can query for the challenge ciphertexts on different target user sets adaptively, which generalizes the attacks against broadcast encryptions in the real world setting. Our general result shows that the reduction of the adaptive secure broadcast encryption will lose a factor of q in the MA setting, where q is the maximum number of encryption queries. In order to construct tighter MA-secure broadcast encryptions, we investigate Gentry and Water’s transformation and show that their transformation can preserve MA-security at the price of reduction loss on the advantage of the underlying symmetric key encryption. Furthermore, we remove the q-type assumption in Gentry and Water’s semistatically secure broadcast encryption by using Hofheinz-Koch-Striecks techniques. The resulting scheme instantiated in a composite order group is MA-secure with constant-size ciphertext header.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Wedad Abdul Khuder Naser, Amal Abbas Kadhim und Safana Hyder Abbas. „Subject review: Image encryption techniques“. Global Journal of Engineering and Technology Advances 15, Nr. 3 (30.06.2023): 029–31. http://dx.doi.org/10.30574/gjeta.2023.15.3.0098.

Der volle Inhalt der Quelle
Annotation:
Security is one of the core areas of study in recent days. Encryption of the image is widely known as an effective method for its secure transmission. The objective of any image encryption method is to obtain a top quality hidden image in order to keep information secret. This paper is a study of research authors in the field of image encryption with a research review to see how the field of image encryption has progressed and the best algorithms in their performance.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

El-Yahyaoui, Ahmed, und Mohamed Daifr Ech-Cherif El Kettani. „About Fully Homomorphic Encryption Improvement Techniques“. International Journal of Embedded and Real-Time Communication Systems 10, Nr. 3 (Juli 2019): 1–20. http://dx.doi.org/10.4018/ijertcs.2019070101.

Der volle Inhalt der Quelle
Annotation:
Fully homomorphic encryption schemes (FHE) are a type of encryption algorithm dedicated to data security in cloud computing. It allows for performing computations over ciphertext. In addition to this characteristic, a verifiable FHE scheme has the capacity to allow an end user to verify the correctness of the computations done by a cloud server on his encrypted data. Since FHE schemes are known to be greedy in term of processing consumption and slow in terms of runtime execution, it is very useful to look for improvement techniques and tools to improve FHE performance. Parallelizing computations is among the best tools one can use for FHE improvement. Batching is a kind of parallelization of computations when applied to an FHE scheme, it gives it the capacity of encrypting and homomorphically processing a vector of plaintexts as a single ciphertext. This is used in the context of cloud computing to perform a known function on several ciphertexts for multiple clients at the same time. The advantage here is in optimizing resources on the cloud side and improving the quality of services provided by the cloud computing. In this article, the authors will present a detailed survey of different FHE improvement techniques in the literature and apply the batching technique to a promising verifiable FHE (VFHE) recently presented by the authors at the WINCOM17 conference.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Pushpendra, Tiwari. „A study and comparison of the various cryptography technique standards within fifteen factors“. i-manager's Journal on Digital Forensics & Cyber Security 1, Nr. 1 (2023): 21. http://dx.doi.org/10.26634/jdf.1.1.19134.

Der volle Inhalt der Quelle
Annotation:
This paper focuses on analyzing the performance of various encryption algorithms, namely RSA, ECC, and DSA, in terms of encrypting and decrypting sensitive data. Encryption is crucial for ensuring the security of data, and there are two types of encryption algorithms: Symmetric key and Asymmetric-key encryption. RSA is highly secure but has high computation time, whereas ECC provides equivalent security with lower computing power and battery usage. The study compares the implementation and analysis of DES, 3DES, AES, RSA, ECC, and DSA, highlighting their strengths and weaknesses. The paper aims to provide a comprehensive comparison of these cryptographic techniques, including their performances, to assist in selecting the most appropriate algorithm for specific applications.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Joshi, Bineet, Bansidhar Joshi, Anupama Mishra, Varsha Arya, Avadhesh Kumar Gupta und Dragan Peraković. „A Comparative Study of Privacy-Preserving Homomorphic Encryption Techniques in Cloud Computing“. International Journal of Cloud Applications and Computing 12, Nr. 1 (01.01.2022): 1–11. http://dx.doi.org/10.4018/ijcac.309936.

Der volle Inhalt der Quelle
Annotation:
In cloud computing, a third party hosts a client's data, which raises privacy and security concerns. To maintain privacy, data should be encrypted by cryptographic techniques. However, encrypting the data makes it unsuitable for indexing and fast processing, as data needs to be decrypted to plain text before it can be further processed. Homomorphic encryption helps to overcome this shortcoming by allowing users to perform operations on encrypted data without decryption. Many academics have attempted to address the issue of data security, but none have addressed the issue of data privacy in cloud computing as thoroughly as this study has. This paper discusses the challenges involved in maintaining the privacy of cloud-based data and the techniques used to address these challenges. It was identified that homomorphic encryption is the best solution of all. This work also identified and compared the various homomorphic encryption schemes which are capable of ensuring the privacy of data in cloud storage and ways to implement them through libraries.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Kumar, Brijesh, und Amrita Saraswat. „Security on Cloud using High Level Encryption Techniques“. International Journal of Trend in Scientific Research and Development Volume-1, Issue-6 (31.10.2017): 915–18. http://dx.doi.org/10.31142/ijtsrd4712.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Kaur, Mandeep, Surender Singh und Manjit Kaur. „Computational Image Encryption Techniques: A Comprehensive Review“. Mathematical Problems in Engineering 2021 (19.07.2021): 1–17. http://dx.doi.org/10.1155/2021/5012496.

Der volle Inhalt der Quelle
Annotation:
Images contain very sensitive and confidential information. Because images play a significant role in many applications such as military communication, remote-sensing, and medical-imaging, therefore, it is necessary to protect sensitive and confidential information from unauthorized use and modification. To achieve this objective, encryption is one of the best methods among the information hiding methods. In recent years, many image encryption approaches are designed by the researchers. They use different concepts for image encryption to increase security. The main aim of this paper is to present a comprehensive review of the existing image encryption approaches. These approaches are categorized based on different concepts such as chaotic maps, DNA, compressive sensing, and optical image encryption. Comparisons are made among the existing approaches to access the various security parameters. Key performance metrics are also presented. The future scope of image encryption is also presented to encourage the research community.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Mahna, Shivanku, und Sravan Ch. „Data Encryption Techniques for USB“. International Journal of Computer Applications 104, Nr. 7 (18.10.2014): 14–17. http://dx.doi.org/10.5120/18213-9162.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

SIROMONEY, RANI, K. G. SUBRAMANIAN und P. J. ABISHA. „ENCRYPTION-DECRYPTION TECHNIQUES FOR PICTURES“. International Journal of Pattern Recognition and Artificial Intelligence 03, Nr. 03n04 (Dezember 1989): 497–503. http://dx.doi.org/10.1142/s0218001489000371.

Der volle Inhalt der Quelle
Annotation:
Language theoretic public key cryptosystems for strings and pictures are discussed. Two methods of constructing public key cryptosystems for the safe transmission or storage of chain code pictures are presented; the first one encrypts a chain code picture as a string and the second one as a two-dimensional array.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Vasim Ahamad, Mohd, Misbah Urrahman Siddiqui, Maria Masroor und Urooj Fatima. „An Improved Playfair Encryption Technique Using Fibonacci Series Generated Secret Key“. International Journal of Engineering & Technology 7, Nr. 4.5 (22.09.2018): 347. http://dx.doi.org/10.14419/ijet.v7i4.5.20104.

Der volle Inhalt der Quelle
Annotation:
With the technology advancements and easy availability of internet, every day millions of users share information electronically through emails, file sharing, e-commerce, etc. As, internet is highly vulnerable to various attacks, sending sensitive information over the Internet may be dangerous. One of the ways to protect the sensitive Information is using the cryptographic techniques. So, while sharing sensitive information over the Internet, it should be sent in encrypted form to prevent the access by unauthorized person. Encryption can be defined as the process of transforming information in such a manner that only authorized person can understand the shared information. In this paper, we have taken Playfair encryption algorithm for encryption and modified it by using Fibonacci series. Fibonacci series is used to generate a random key, which is used for encrypting the message in Playfair encryption algorithm. Using Fibonacci numbers and generating random keys provide significant security to shared information.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Ranjan, Kumar H. S., Safeeriya S. P. Fathimath, Ganesh Aithal und Surendra Shetty. „A Survey on Key(s) and Keyless Image Encryption Techniques“. Cybernetics and Information Technologies 17, Nr. 4 (27.11.2017): 134–64. http://dx.doi.org/10.1515/cait-2017-0046.

Der volle Inhalt der Quelle
Annotation:
AbstractAs in recent years digital data transmission and image application have been increasing, maintaining secure transmission of image is of high importance. Image Encryption is implemented to achieve security on image applications. This paper exhibits a survey on various existing image encryption techniques. The paper mainly focuses on two types: Image encryption with Key(s) and Image Encryption without Key(s). In addition it also describes several properties of a good image encryption technique. The paper presents a survey of most popular algorithms and research papers that are related with different image encryption techniques.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Dr.R.Premkumar., Dr.C.Priya., S.Vengatesh Kumar.,, Dr M. Vidhyalakshmi &. Dr S. Saranya;. „Investigation on Image Encryption Using Chaos Based Techniques“. International Journal for Modern Trends in Science and Technology 7, Nr. 05 (27.05.2021): 147–53. http://dx.doi.org/10.46501/ijmtst0705025.

Der volle Inhalt der Quelle
Annotation:
As the trading of information over the open systems and internet is quickly developing, security of the information turns into a major concern. One conceivable answer for this issue is to encode the information. Chaos has been generally utilized for image encryption for its diverse elements. There are numerous chaotic based encryption procedures for information concealing like validation, hashing, cryptography have been created and are in practice nowadays. This paper moreover investigates the properties of various mapping techniques that stretches out to the execution parameters utilized as a part of encryption forms. Every one of the strategies checked on appeared inside the most recent years and are observed to be valuable for the present day encryption applications. Every system is one of a kind in its own specific manner, which may be reasonable for various applications. Over the long haul, new encryption strategies are advancing. Hence, quick and secure traditional encryption systems will be required in applications requiring high rate of security.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Parthasarathy, Rajamohan, Seow Soon Loong und Preethy Ayyappan. „An Efficient Encryption Implementation Using AES Algorithm Techniques“. Journal of Engineering & Technological Advances 3, Nr. 1 (2018): 61–70. http://dx.doi.org/10.35934/segi.v3i1.61.

Der volle Inhalt der Quelle
Annotation:
The AES algorithm is a symmetric block cipher that can encrypt, (encipher), and decrypt, (decipher), information. Encryption converts data to an unintelligible form called cipher-text. Decryption of the cipher-text converts the data back into its original form, which is called plaintext. The AES algorithm is capable of using cryptographic keys of 128, 192, and 256 bits to encrypt and decrypt data in blocks of 128 bits. The National Institute of Standards and Technology, (NIST), solicited proposals for the Advanced Encryption Standard, (AES). The AES is a Federal Information Processing Standard, (FIPS), which is a cryptographic algorithm that is used to protect electronic data. Advanced Encryption Standard (AES), specifying an Advanced Encryption Algorithm to replace the Data Encryption standard (DES) the Expired in 1998. NIST has solicited candidate algorithms for inclusion in AES, resulting in fifteen official candidate algorithms of which Rijndael was chosen as the Advanced Encryption Standard. Some of these implementations are optimized for speed, some for area, some for configurability, and some for low-power applications. This is carried out in the Cadence Tool with NC simvision software.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Jameel, Enas Ali, und Sameera Abbas Fadhel. „Digital Image Encryption Techniques: Article Review“. Technium: Romanian Journal of Applied Sciences and Technology 4, Nr. 2 (27.02.2022): 24–35. http://dx.doi.org/10.47577/technium.v4i2.6026.

Der volle Inhalt der Quelle
Annotation:
In this age of the multi-media, images have an important impact on communication. When users upload images over an insecure communication network, total security is a difficult problem to address in order to maintain image confidentiality. Also, encryption is a technique for keeping images secret. This study gives a basic introduction to cryptography, as well as a concise overview regarding the many image encryption algorithms' elemental security criteria. This paper includes an overview of several image encryption approaches as well as a comparison of discrete image encoding techniques, before coming to a conclusion and recommending future research.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Simkin, Mark G. „Using Spreadsheets to Teach Data Encryption Techniques“. AIS Educator Journal 1, Nr. 1 (01.12.2006): 27–37. http://dx.doi.org/10.3194/aise.2006.1.1.27.

Der volle Inhalt der Quelle
Annotation:
There are a variety of reasons why understanding encryption technology is likely to become increasingly important in the future, and therefore why accounting courses are likely to include encryption materials in future curricula. This paper discusses five encryption techniques: transposition ciphers, cyclic substitution ciphers, Vigenere ciphers, exclusive OR ciphers, and permutation ciphers. Accompanying these discussions are explanations of how instructors can demonstrate these techniques with spreadsheet models. The author's experiences with such models in classroom use have been uniformly positive.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

M, Sreekala, und Varghese Paul. „A Novel Hybrid Encryption Method for Multimedia Encryption Using Elliptic Curve Cryptography and TDMRC“. International Journal of Emerging Research in Management and Technology 6, Nr. 7 (29.06.2018): 1. http://dx.doi.org/10.23956/ijermt.v6i7.178.

Der volle Inhalt der Quelle
Annotation:
We are in the era of digital revolution and the benefits are remarkable. People are much dependent on digital technology and can’t survive without it. With the advancement of Internet and its applications, we share a wide range of data including texts, images, audios and videos in a more extensive space and time scope that we never had before. This increases the need for security day by day. Cryptography is an art of Science that uses complex logic in order to design powerful encryption techniques. Both symmetric and asymmetric key encryptions have their own advantages. Time Dependant Multiple Random Cipher(TDMRC) code is one of the best symmetric encryption schemes. Elliptic curve cryptography(ECC) is widely used because of its less key size and faster key generation. This paper proposes a new method of hybrid encryption method using ECC and TDMRC.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Al-Fayoumi, Mustafa A., Ammar Odeh, Ismail Keshta und Ashraf Ahmad. „Techniques of medical image encryption taxonomy“. Bulletin of Electrical Engineering and Informatics 11, Nr. 4 (01.08.2022): 1990–97. http://dx.doi.org/10.11591/eei.v11i4.3850.

Der volle Inhalt der Quelle
Annotation:
Medical images are one of the most significant and sensitive data types in computer systems. Sending medical images over the internet necessitates using a robust encryption scheme that is resistant to cryptographic attacks. Confidentiality is the most critical part of the three security objectives for information systems security, namely confidentiality, integrity, and availability. Confidentiality is the most critical aspect for the secure storage and transfer of medical images. In this study, we attempt to classify various encryption methods in order to assist researchers in selecting the optimal strategy for protecting sensitive patient information while transferring medical images without alteration and outline the measures that should be adopted to address challenges and concerns relevant to techniques of medical image encryption.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Prashant, MD Sohail Haque, Amrinder Kaur und Pankaj Yadav. „Comparative Analysis of AES and RSA with Other Encryption Techniques for Secure Communication“. International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, Nr. 2 (19.04.2024): 565–74. http://dx.doi.org/10.32628/cseit2410263.

Der volle Inhalt der Quelle
Annotation:
In today’s digitized era, where the whole world is interconnected and every information about individuals are collected, it is important to process and store the data such that it is safe from unauthorized access. Encryption is used to turn the plain text into cipher text which makes the data unreadable, thus maintaining its confidentiality and integrity. Among the several encryption methods available, Advanced Encryption Standard (AES) and Rivest Shamir Adleman (RSA) are popularly used due to their effectiveness and efficiency. However, alternative encryption techniques exist, each offers different level of security and performance. This study presents a thorough comparative analysis of AES and RSA alongside other encryption methods to assess their suitability for secure communication. Factors such as encryption strength, computational complexity, key management, scalability, and versatility are examined to provide a comprehensive understanding of each technique's strengths and weaknesses. By scrutinizing these aspects, this research aims to offer insights for decision-makers in selecting the most suitable encryption method tailored to specific requirements and constraints.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Abu Zitar, Raed, und Muhammed J. Al-Muhammed. „Hybrid encryption technique: Integrating the neural network with distortion techniques“. PLOS ONE 17, Nr. 9 (28.09.2022): e0274947. http://dx.doi.org/10.1371/journal.pone.0274947.

Der volle Inhalt der Quelle
Annotation:
This paper proposes a hybrid technique for data security. The computational model of the technique is grounded on both the non-linearity of neural network manipulations and the effective distortion operations. To accomplish this, a two-layer feedforward neural network is trained for each plaintext block. The first layer encodes the symbols of the input block, making the resulting ciphertext highly uncorrelated with the input block. The second layer reverses the impact of the first layer by generating weights that are used to restore the original plaintext block from the ciphered one. The distortion stage imposes further confusion on the ciphertext by applying a set of distortion and substitution operations whose functionality is fully controlled by random numbers generated by a key-based random number generator. This hybridization between these two stages (neural network stage and distortion stage) yields a very elusive technique that produces ciphertext with the maximum confusion. Furthermore, the proposed technique goes a step further by embedding a recurrent neural network that works in parallel with the first layer of the neural network to generate a digital signature for each input block. This signature is used to maintain the integrity of the block. The proposed method, therefore, not only ensures the confidentiality of the information but also equally maintains its integrity. The effectiveness of the proposed technique is proven through a set of rigorous randomness testing.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Gosavi, Mr Abhijeet, Mr Sakib Shaikh, Mr Adnan Sayyed, Mr Somesh Sapa, Mr Ayan Shaikh und Prof A. A. Pund. „Enabling Encrypted Cloud Emails with Data Encryption using Advanced Encryption Techniques“. International Journal for Research in Applied Science and Engineering Technology 11, Nr. 6 (30.06.2023): 864–69. http://dx.doi.org/10.22214/ijraset.2023.53709.

Der volle Inhalt der Quelle
Annotation:
Abstract: Cloud computing offers a flexible and convenient means of exchanging data, with several advantages for both society and individuals. With the widespread usage of cloud emails and frequent reports of large-scale email leakage occurrences, the security property known as forward secrecy has become desirable and necessary for both users and cloud email service providers to increase the security of cloud email systems. Typical techniques of attaining forward secrecy, such as Diffie-Hellman key exchange and forward-secure public-key encryption, have not been extensively authorized and used because they fail to meet the security and practicality requirements of email systems at the same time. We introduce a new cryptographic primitive called forward-secure puncturable identity-based encryption (fs-PIBE) in this paper to capture forward secrecy of encrypted cloud email systems without sacrificing practicability. It allows an email user to perform fine-grained decryption capacity revocation. In the standard model, we design a framework for encrypted cloud email systems and instantiate it with a concrete fs-PIBE structure that has constant ciphertext size and proved security. We enhance the proposed fs-PIBE scheme to provide end-to-end encryption and outsourced decryption, respectively, to improve the security and efficiency of the presented framework.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Geetha, S., P. Punithavathi, A. Magnus Infanteena und S. Siva Sivatha Sindhu. „A Literature Review on Image Encryption Techniques“. International Journal of Information Security and Privacy 12, Nr. 3 (Juli 2018): 42–83. http://dx.doi.org/10.4018/ijisp.2018070104.

Der volle Inhalt der Quelle
Annotation:
Encryption is one of the techniques that ensure the security of images used in various domains like military intelligence, secure medical imaging services, intranet and internet communication, e-banking, social networking image communication like Facebook, WhatsApp, Twitter etc. All these images travel in a free and open network either during storage or communication; hence their security turns out to be a crucial necessity in the grounds of personal privacy and confidentiality. This article reviews and summarizes various image encryption techniques so as to promote development of advanced image encryption methods that facilitate increased versatility and security.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Mark Espalmado, John, und Edwin Arboleda. „DARE Algorithm: A New Security Protocol by Integration of Different Cryptographic Techniques“. International Journal of Electrical and Computer Engineering (IJECE) 7, Nr. 2 (01.04.2017): 1032. http://dx.doi.org/10.11591/ijece.v7i2.pp1032-1041.

Der volle Inhalt der Quelle
Annotation:
Exchange of information between computer networks requires a secure communications channel to prevent and monitor unauthorized access, modification and denial of the computer network. To address this growing problem, security experts sought ways to advance the integrity of data transmission. Security Attacks compromises the security and hence hybrid cryptographic algorithms have been proposed to achieve safe service in the proper manner, such as user authentication and data confidentiality. Data security and authenticity are achieved using these algorithms. Moreover, to improve the strength and cover each algorithm’s weaknesses, a new security algorithm can be designed using the combination of different cryptographic techniques. This design uses Digital Signature Algorithm (DSA) for authentic key generation, Data Encryption Standard (DES) for key scheduling, and Advanced Encryption Standard (AES) and Rivest–Schamir–Adleman Algorithm (RSA) in encrypting data. This new security algorithm has been proposed for improved security and integrity by integration of these cryptographic techniques.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Chowdhary, Chiranji Lal, Pushpam Virenbhai Patel, Krupal Jaysukhbhai Kathrotia, Muhammad Attique, Kumaresan Perumal und Muhammad Fazal Ijaz. „Analytical Study of Hybrid Techniques for Image Encryption and Decryption“. Sensors 20, Nr. 18 (10.09.2020): 5162. http://dx.doi.org/10.3390/s20185162.

Der volle Inhalt der Quelle
Annotation:
The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption and decryption. This paper propose an analysis for performing image encryption and decryption by hybridization of Elliptic Curve Cryptography (ECC) with Hill Cipher (HC), ECC with Advanced Encryption Standard (AES) and ElGamal with Double Playfair Cipher (DPC). This analysis is based on the following parameters: (i) Encryption and decryption time, (ii) entropy of encrypted image, (iii) loss in intensity of the decrypted image, (iv) Peak Signal to Noise Ratio (PSNR), (v) Number of Pixels Change Rate (NPCR), and (vi) Unified Average Changing Intensity (UACI). The hybrid process involves the speed and ease of implementation from symmetric algorithms, as well as improved security from asymmetric algorithms. ECC and ElGamal cryptosystems provide asymmetric key cryptography, while HC, AES, and DPC are symmetric key algorithms. ECC with AES are perfect for remote or private communications with smaller image sizes based on the amount of time needed for encryption and decryption. The metric measurement with test cases finds that ECC and HC have a good overall solution for image encryption.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

Sridhar, B. „Performance Evaluation of Different Encryption Techniques“. Research Journal of Engineering and Technology 9, Nr. 3 (2018): 227. http://dx.doi.org/10.5958/2321-581x.2018.00031.4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

Dhiman, Reema. „IMAGE ENCRYPTION TECHNIQUES: A LITERATURE REVIEW“. International Journal of Advanced Research in Computer Science 8, Nr. 7 (20.08.2017): 239–44. http://dx.doi.org/10.26483/ijarcs.v8i7.4209.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Soofi, Aized Amin, M. Irfan Khan und Fazal-e. Amin. „Encryption Techniques for Cloud Data Confidentiality“. International Journal of Grid and Distributed Computing 7, Nr. 4 (31.08.2014): 11–20. http://dx.doi.org/10.14257/ijgdc.2014.7.4.02.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

M. Abdullah, Rozin, und Araz Rajab Abrahim. „Review of Image Encryption using Different Techniques“. Academic Journal of Nawroz University 11, Nr. 3 (30.06.2022): 170–77. http://dx.doi.org/10.25007/ajnu.v11n3a1301.

Der volle Inhalt der Quelle
Annotation:
Encryption is one of the measures that ensure the security of images used in various fields such as military understanding, secure clinical imaging offices, Internet and intranet media, electronic banking, and individual association images such as Facebook, WhatsApp, Twitter, etc. On this huge number of images that are sent in a free and open link either during selection or messaging; Then their security ends up being a central need in individual insurance organizations and the arrangement. This article audits and summarizes various image encryption systems to further develop advanced image encryption strategies that operate with expanded flexibility and security.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Viresh, Kasheenath Babaleshwar, Karade Sinchana, N. Sakshi und Naidu Anush. „Audio encryption and decryption using AES algorithm technique“. i-manager’s Journal on Electronics Engineering 14, Nr. 2 (2024): 8. http://dx.doi.org/10.26634/jele.14.2.20486.

Der volle Inhalt der Quelle
Annotation:
Audio cryptography is the practice of encrypting audio data to prevent illegal access to and listening to it. This paper presents an innovative technique of audio cryptography based on the Python computer language. To ensure secrecy and integrity, the suggested system encrypts and decrypts audio signals using advanced cryptographic techniques. A crucial component of AES, the cryptographic key is dynamically created to improve security. Python's broad library support and ease of use make it an ideal platform for implementing the AES algorithm, which ensures dependable and effective audio data encryption. The system utilizes Python's cryptography library for seamless integration and ease of implementation. Simulation results demonstrate the efficacy of the AES algorithm in securely encrypting and decrypting audio data with reduced noise compared to traditional methods.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

Azhari, Rama, und Agita Nisa Salsabila. „Analyzing the Impact of Quantum Computing on Current Encryption Techniques“. IAIC Transactions on Sustainable Digital Innovation (ITSDI) 5, Nr. 2 (22.02.2024): 148–57. http://dx.doi.org/10.34306/itsdi.v5i2.662.

Der volle Inhalt der Quelle
Annotation:
As the field of quantum computing progresses, the disruption to traditional encryption methods, which secure vast amounts of sensitive data, becomes an imminent threat, and conventional encryption techniques, primarily based on mathematical complexity, may no longer suffice in the era of quantum supremacy. This research systematically analyzes the vulnerabilities of current encryption standards in the face of advanced quantum computing capabilities, focusing specifically on widely-used cryptographic protocols such as RSA and AES, which are foundational to modern cybersecurity. Employing the SmartPLS method, the study models the interaction between quantum computing power and the robustness of existing encryption techniques, involving simulating quantum attacks on sample cryptographic algorithms to evaluate their quantum resistance. The findings reveal that quantum computing possesses the capacity to significantly compromise traditional encryption methods within the next few decades, with RSA encryption showing substantial vulnerabilities while AES requires considerably larger key sizes to maintain security. This study underscores the urgency for the development of quantum-resistant encryption techniques, critical to safeguarding future digital communication and data integrity, and advocates for a paradigm shift in cryptographic research and practice, emphasizing the need for 'quantum-proof' algorithms. It also contributes to the strategic planning for cybersecurity in the quantum age and provides a methodological framework using SmartPLS for further exploration into the impact of emerging technologies on existing security protocols.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

Gaurav Agarwal, Mohammed Shakeel, Akash Sanghi, YDS Arya,. „A Novel Security Model for Password Encryption Using Aadhaar and Amicable Number“. Tuijin Jishu/Journal of Propulsion Technology 44, Nr. 4 (16.10.2023): 1096–107. http://dx.doi.org/10.52783/tjjpt.v44.i4.981.

Der volle Inhalt der Quelle
Annotation:
In this day and age, data hacking has become a major source of fear. In order to avoid any further theft of data, we must stop this criminal hacking. Backups, encryption, access control, and other techniques are just a few that may be used to ensure data integrity. We did not combine the existing approaches when we announced our encryption process. The secret to encrypting user passwords is to utilize a mathematical calculation equation that is well-defined and a number conversion mechanism. Users must provide their password and Aadhaar number in order to register. Encrypted password has been recorded in the database. Every industry uses encryption to secure data, and there are many potential applications for it in the future.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Dr. Gaurav Aggarwal, Mr. Hirdesh Sharma. „Comparative Analysis of Multi-Level Algorithm with Different Encryption and Decryption Security Algorithms“. Tuijin Jishu/Journal of Propulsion Technology 44, Nr. 3 (05.10.2023): 1640–48. http://dx.doi.org/10.52783/tjjpt.v44.i3.555.

Der volle Inhalt der Quelle
Annotation:
This research explores network data encryption and decryption strategies used in communication networks. The majority of network communication systems revolve around information sharing on mobile phones, networked PCs, and other internet-connected electronic devices. As information travels through several networks and is subject to numerous types of assaults, unsecure data can be read, altered, or faked by anybody with access to it. To defend against this form of assault, data encryption / decryption techniques are utilized. To illustrate the effects and evaluate the efficacy of each decoding and encryption method used in network technologies, Visual Basic simulation studies that encrypted and decrypt data were created, developed, and tested. Further study was for comparative analysis of Multi-Level Algorithm with different Security Algorithms for encrypting data approach.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Wadho, Shuaib Ahmed, Areej Fatemah Meghji, Aun Yichiet, Roshan Kumar und Farhan Bashir Shaikh. „Encryption Techniques and Algorithms to Combat Cybersecurity Attacks: A Review“. VAWKUM Transactions on Computer Sciences 11, Nr. 1 (30.06.2023): 295–305. http://dx.doi.org/10.21015/vtcs.v11i1.1521.

Der volle Inhalt der Quelle
Annotation:
The danger of cyber-attacks is constant in the current digital environment. The necessity for effective security actions are more crucial than ever before due to the increasingly complex nature of cybersecurity attacks. Using encryption approaches and algorithms is one of the best ways to secure more sensitive data from cyber-attacks. In order to effectively defend against cybersecurity assaults, this research study attempts to give an analysis of the function that encryption methods and approaches serve. We investigate various encryption algorithms and techniques, their advantages and disadvantages, and their applications. In addition, we investigate the difficulties of encryption and the potential solutions to these difficulties.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Irwanto, Dola. „File Encryption and Decryption Using Algorithm Aes-128 Bit Based Website“. MALCOM: Indonesian Journal of Machine Learning and Computer Science 4, Nr. 2 (01.04.2024): 670–77. http://dx.doi.org/10.57152/malcom.v4i2.1305.

Der volle Inhalt der Quelle
Annotation:
Digital data security has become very important in the current information era. One way to maintain data security is to use encryption and decryption techniques. The Advanced Encryption Standard (AES) algorithm has been proven effective in protecting data with a high level of security. This research aims to implement the AES-128 bit algorithm for online file encryption and decryption via a website. The method used in this research includes developing a website that provides a user interface for uploading and encrypting files, as well as for decrypting files that have been previously encrypted. The AES-128 bit algorithm is used to carry out the file encryption and decryption process. Users can choose their own encryption key or use a random key generated by the system. The result of this research is a website that can be used to efficiently secure sensitive files using the AES-128 bit algorithm. By using this website, users can easily encrypt the files they want to protect and also decrypt files that have been encrypted previously. The security of user data is guaranteed through the use of strong encryption algorithms and well-managed keys.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Kannan, Rajesh, und Dr R. Mala. „Analysis of Encryption Techniques to Enhance Secure Data Transmission“. International Journal of Engineering and Computer Science 7, Nr. 09 (09.09.2018): 24311–18. http://dx.doi.org/10.18535/ijecs/v7i9.04.

Der volle Inhalt der Quelle
Annotation:
with the rapid increase of technology, the data stored and transmitted among the client and server has been increased tremendously. In order to provide high security for the confidential data, there is a need for proper encryption techniques that are to be followed by the concerns. This paper presents an analysis of the various encryption algorithms and their performance on handling the private data with authentication, access control, secure configuration and data encryption. Document oriented databases such as MongoDB, Cassandra, CouchDB, Redis and Hypertable are compared on the basis of their security aspects since they manipulate the huge amount of unstructured data in their databases. It is proposed that each database has its own security breaches and emphasises the need for proper encryption methods to secure the data stored in them.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Garg, Monika, Karanvir Kaur und Simerpreet Kaur. „Using 3GPP- A Secure IDS for MANETs“. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, Nr. 2 (30.10.2005): 518–21. http://dx.doi.org/10.24297/ijct.v4i2b2.3312.

Der volle Inhalt der Quelle
Annotation:
Mobile Ad hoc NETwork (MANET) is one of the important and unique applications. MANET does not require a fixednetwork infrastructure, every single node works as both a transmitter and a receiver. Nodes communicate directly witheach other when they are both within the same communication range else they can propagate message to neighbor nodesto pass the message. A new intrusion detection system named Enhanced Adaptive Acknowledgement (EAACK) speciallydesigned for MANETs. By the adoption of MRA scheme, EAACK is capable of detecting malicious nodes despite theexistence of false misbehavior report. The results will demonstrate positive performances against Watchdog, TWOACKand AACK in the cases of receiver collision, limited transmission power and false misbehavior report. EAACKdemonstrates higher malicious behavior detection rates in certain circumstances while does not greatly affect the networkperformances. EAACK is designed based on the Digital signature Algorithm (DSA) and RSA. Those techniques havedrawback due to network overhead. We need techniques for security like encryptions, hybrid encryption or sign encryptionto protect our message.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Ibrahim, Dina, Kareem Ahmed, Mohamed Abdallah und AbdElmgeid A. Ali. „A New Chaotic-Based RGB Image Encryption Technique Using a Nonlinear Rotational 16 × 16 DNA Playfair Matrix“. Cryptography 6, Nr. 2 (08.06.2022): 28. http://dx.doi.org/10.3390/cryptography6020028.

Der volle Inhalt der Quelle
Annotation:
Due to great interest in the secure storage and transmission of color images, the necessity for an efficient and robust RGB image encryption technique has grown. RGB image encryption ensures the confidentiality of color images during storage and transmission. In the literature, a large number of chaotic-based image encryption techniques have been proposed, but there is still a need for a robust, efficient and secure technique against different kinds of attacks. In this paper, a novel RGB image encryption technique is proposed for encrypting individual pixels of RGB images using chaotic systems and 16 rounds of DNA encoding, transpositions and substitutions. First, round keys are generated randomly using a logistic chaotic function. Then, these keys are used across different rounds to alter individual pixels using a nonlinear randomly generated 16×16 DNA Playfair matrix. Experimental results show the robustness of the proposed technique against most attacks while reducing the consumed time for encryption and decryption. The quantitative metrics show the ability of the proposed technique to maintain reference evaluation values while resisting statistical and differential attacks. The obtained horizontal, vertical and diagonal correlation is less than 0.01, and the NPCR and UACI are larger than 0.99 and 0.33, respectively. Finally, NIST analysis is presented to evaluate the randomness of the proposed technique.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Shah, Jalpa, und JS Dhobi. „REVIEW OF IMAGE ENCRYPTION AND DECRYPTION TECHNIQUES FOR 2D IMAGES“. International Journal of Engineering Technologies and Management Research 5, Nr. 1 (07.02.2020): 81–84. http://dx.doi.org/10.29121/ijetmr.v5.i1.2018.49.

Der volle Inhalt der Quelle
Annotation:
In the emerging era of Internet, multimedia software and application security of images is of major concern. To offer security to these images encryption is the way for robust security. With Image Encryption it becomes difficult to analyze the image that is communicated over untrusted network. Also it provides security for any unauthorized access. The paper provides an introduction to cryptography and various image encryption techniques are reviewed for 2D images.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Rabie, A., Kh El Shafie, A. Hammuoda und M. Rohiem. „Data ecryption based on multi-order FrFT, and FPGA implementation of DES algorith“. International Journal of Reconfigurable and Embedded Systems (IJRES) 9, Nr. 2 (01.07.2020): 141. http://dx.doi.org/10.11591/ijres.v9.i2.pp141-152.

Der volle Inhalt der Quelle
Annotation:
<span>Cryptography techniques need some algorithms for encryption of data. Most of available encryption techniques are used for textual data; a few of encryption methods are used for multimedia data; However, This Algorithms that are used for textual data may not be inefficient for multimedia, because it is size is greater than the text. Therefore, Cryptosystems need to find and develop a new encryption schemes for such data. The most popular symmetric key algorithms are Data Encryption Standard (DES). However, DES is may be not suitable for multimedia because it consumes times. Encryption and decryption of these data require different methods. In this paper a method for encryption/decryption data by using the nature of FrFT in signals analysis, based on multi-order Fractional Fourier Transform has been introduced. The security of the method used in the encryption work was taken into account to identify the different indicators to measure the security of the encryption Techniques. These indicators are: sensitivity proposed Techniques for the key, the complexity of the processes, and statistical analysis. The key is formed by combination of order of Fractional Fourier Transform. The encrypted data is obtained by the summation of different orders. Numerical simulation results are given to demonstrate this proposed method.</span>
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Et. al., K. S. Mohanasathiya,. „Security And Privacy Using Two Fold Encryption Protocol Techniques In Edge Computing“. Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, Nr. 10 (28.04.2021): 6025–34. http://dx.doi.org/10.17762/turcomat.v12i10.5427.

Der volle Inhalt der Quelle
Annotation:
With deployments of IoT devices and the arrival of 5G fast wireless, placing compute and analytics close to where data is created is making the case for edge computing. Edge computing is transforming the way data is being handled, processed, and delivered from millions of devices around the world. The explosive growth of internet-connected devices – the IoT – along with new applications that require real-time computing power, continues to drive edge-computing systems. Due to several advantages like low latency, Real-Time Availability. Real-time Data Transmission, brings Company and customer together, Edge Computing is used. To overcome several problems regarding security and privacy concerns, this paper provides solution by introducing Secured Two Fold Encryption Protocol in Edge Computing (STFC) based on two encryption schemes namely proxy re-encryption and searchable encryption. This paper particularly focus on securing the data from attackers by providing double encryption scheme. In this paper, Resource Manager is introduced in order to reduce the computational overhead in the encryption process.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Fadhel, Sabah, Mohd Shafry und Omar Farook. „Chaos Image Encryption Methods: A Survey Study“. Bulletin of Electrical Engineering and Informatics 6, Nr. 1 (01.03.2017): 99–104. http://dx.doi.org/10.11591/eei.v6i1.599.

Der volle Inhalt der Quelle
Annotation:
With increasing dependence on communications over internet and networks, secure data transmission is coming under threat. One of the best solutions to ensure secure data transmissions is encryption. Multiple forms of data, such as text, audio, image, and video can be digitally transmitted, nowadays images being the most popular and old encryption techniques such as: AES,DES,RSA etc., show low security level when used for image encryption. This problem was resolved by using of chaos encryption which is an acceptable form of encryption for image data. The sensitivity to initial conditions and control parameters make chaos encryption suitable for image applications. This study discusses various chaos encryption techniques.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie