Academic literature on the topic 'Decryption coding'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Decryption coding.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Decryption coding"
Gençoǧlu, Muharrem Tuncay, and Mehmet Vural. "Image Coding Using Laplace Transform." ITM Web of Conferences 22 (2018): 01010. http://dx.doi.org/10.1051/itmconf/20182201010.
Full textShahare, Kajal G., and Prof Jayant Adhikari. "A Survey Paper Based On Image Encryption and Decryption Technique." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (May 31, 2022): 994–1000. http://dx.doi.org/10.22214/ijraset.2022.42262.
Full textLi, Qi, Xiangfeng Meng, Yongkai Yin, and Huazheng Wu. "A Multi-Image Encryption Based on Sinusoidal Coding Frequency Multiplexing and Deep Learning." Sensors 21, no. 18 (September 15, 2021): 6178. http://dx.doi.org/10.3390/s21186178.
Full textSun, Dechao, Hong Huang, Dongsong Zheng, Haoliang Hu, Chunyue Bi, and Renfang Wang. "Face Security Authentication System Based on Deep Learning and Homomorphic Encryption." Security and Communication Networks 2022 (April 27, 2022): 1–8. http://dx.doi.org/10.1155/2022/7752292.
Full textMahalakshmi, M. "Cryptographic Algorithm Based on Prime Assignment." International Journal for Research in Applied Science and Engineering Technology 10, no. 1 (January 31, 2022): 1744–51. http://dx.doi.org/10.22214/ijraset.2022.40138.
Full textWang, Bin, Yingjie Xie, Shihua Zhou, Xuedong Zheng, and Changjun Zhou. "Correcting Errors in Image Encryption Based on DNA Coding." Molecules 23, no. 8 (July 27, 2018): 1878. http://dx.doi.org/10.3390/molecules23081878.
Full textOhtsubo, Junji, and Ayano Fujimoto. "Practical image encryption and decryption by phase-coding technique for optical security systems." Applied Optics 41, no. 23 (August 10, 2002): 4848. http://dx.doi.org/10.1364/ao.41.004848.
Full textMihaljević, Miodrag J. "A Security Enhanced Encryption Scheme and Evaluation of Its Cryptographic Security." Entropy 21, no. 7 (July 17, 2019): 701. http://dx.doi.org/10.3390/e21070701.
Full textZhao, Min, Yan Xing, Xiao-Wei Li, and Qiong-Hua Wang. "Two-Step Integral Imaging Coding Based Three-Dimensional Information Encryption Approach." Security and Communication Networks 2018 (2018): 1–9. http://dx.doi.org/10.1155/2018/2658318.
Full textAnusha, R., C. Nithya, R. Venketeswara Pai, and V. Ramanathan. "Coding the Encoded:Automatic Decryption of kaTapayAdi and Aryabhata's Systems of Numeration." Current Science 112, no. 03 (February 10, 2017): 588. http://dx.doi.org/10.18520/cs/v112/i03/588-591.
Full textDissertations / Theses on the topic "Decryption coding"
陳宜妙. "A video encryption and decryption technique using variable length coding and randomized bit-insertion." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/02682408071006153021.
Full text國立交通大學
電子工程系
91
In this paper, we propose a new video encryption algorithm, which is based on the encryption scheme proposed by Huang and Wang in 2001. In Huang’s approach, the encryption operation is fulfilled via the modification of VLC tables. Based on this encryption scheme, we made a few modifications to greatly enhance its security level. The modifications include the use of randomized bit-insertion and bit-flipping to complicate the statistics of ciphertexts and the use of RLC (run-length coding) disarrangement to increase the difficulty in cryptanalysis. This algorithm can be easily employed over an MPEG-4 codec to achieve real-time encryption. The security levels of this proposed algorithm against various types of attacks are also discussed. Moreover, the encrypted data have about the same level of noise sensitivity as the original MPEG-4 bit-stream.
Бараннік, Волод Віктор, А. В. Хаханова, and С. Шульгін. "Model Of Syntactic Representation Of Aerophoto Images Segments." Thesis, 2018. http://openarchive.nure.ua/handle/document/5879.
Full textBook chapters on the topic "Decryption coding"
Mu, Yi, Vijay Varadharajan, and Khan Quac Nguyen. "Delegated Decryption." In Cryptography and Coding, 258–69. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-46665-7_30.
Full textArmour, Marcel, and Bertram Poettering. "Subverting Decryption in AEAD." In Cryptography and Coding, 22–41. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-35199-1_2.
Full textBarwell, Guy, Daniel Page, and Martijn Stam. "Rogue Decryption Failures: Reconciling AE Robustness Notions." In Cryptography and Coding, 94–111. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-27239-9_6.
Full textKim, Seungjoo, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, and Yuliang Zheng. "Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation)." In Cryptography and Coding, 114–27. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45325-3_11.
Full text"A difficulty in Rabin decryption is that the correct plaintext must be identified." In Coding Theory and Cryptography, 310. CRC Press, 2000. http://dx.doi.org/10.1201/b16944-143.
Full textHelal Ahmed, Md, Jagmohan Tanti, and Sumant Pushp. "A Public Key Cryptosystem Using Cyclotomic Matrices." In Coding Theory - Recent Advances, New Perspectives and Applications [Working Title]. IntechOpen, 2021. http://dx.doi.org/10.5772/intechopen.101105.
Full textConference papers on the topic "Decryption coding"
Ruchkin, V., G. Soldatov, V. Fulin, B. Kostrov, and E. Ruchkina. "Macros for Coding Information Encryption & Decryption in Trusted Platform Module." In 2020 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon). IEEE, 2020. http://dx.doi.org/10.1109/fareastcon50210.2020.9271523.
Full textRouvroy, G., F. X. Standaert, J. J. Quisquater, and J. D. Legat. "Compact and efficient encryption/decryption module for FPGA implementation of the AES Rijndael very well suited for small embedded applications." In International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004. IEEE, 2004. http://dx.doi.org/10.1109/itcc.2004.1286716.
Full text