Journal articles on the topic 'Decryption coding'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Decryption coding.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Gençoǧlu, Muharrem Tuncay, and Mehmet Vural. "Image Coding Using Laplace Transform." ITM Web of Conferences 22 (2018): 01010. http://dx.doi.org/10.1051/itmconf/20182201010.
Full textShahare, Kajal G., and Prof Jayant Adhikari. "A Survey Paper Based On Image Encryption and Decryption Technique." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (May 31, 2022): 994–1000. http://dx.doi.org/10.22214/ijraset.2022.42262.
Full textLi, Qi, Xiangfeng Meng, Yongkai Yin, and Huazheng Wu. "A Multi-Image Encryption Based on Sinusoidal Coding Frequency Multiplexing and Deep Learning." Sensors 21, no. 18 (September 15, 2021): 6178. http://dx.doi.org/10.3390/s21186178.
Full textSun, Dechao, Hong Huang, Dongsong Zheng, Haoliang Hu, Chunyue Bi, and Renfang Wang. "Face Security Authentication System Based on Deep Learning and Homomorphic Encryption." Security and Communication Networks 2022 (April 27, 2022): 1–8. http://dx.doi.org/10.1155/2022/7752292.
Full textMahalakshmi, M. "Cryptographic Algorithm Based on Prime Assignment." International Journal for Research in Applied Science and Engineering Technology 10, no. 1 (January 31, 2022): 1744–51. http://dx.doi.org/10.22214/ijraset.2022.40138.
Full textWang, Bin, Yingjie Xie, Shihua Zhou, Xuedong Zheng, and Changjun Zhou. "Correcting Errors in Image Encryption Based on DNA Coding." Molecules 23, no. 8 (July 27, 2018): 1878. http://dx.doi.org/10.3390/molecules23081878.
Full textOhtsubo, Junji, and Ayano Fujimoto. "Practical image encryption and decryption by phase-coding technique for optical security systems." Applied Optics 41, no. 23 (August 10, 2002): 4848. http://dx.doi.org/10.1364/ao.41.004848.
Full textMihaljević, Miodrag J. "A Security Enhanced Encryption Scheme and Evaluation of Its Cryptographic Security." Entropy 21, no. 7 (July 17, 2019): 701. http://dx.doi.org/10.3390/e21070701.
Full textZhao, Min, Yan Xing, Xiao-Wei Li, and Qiong-Hua Wang. "Two-Step Integral Imaging Coding Based Three-Dimensional Information Encryption Approach." Security and Communication Networks 2018 (2018): 1–9. http://dx.doi.org/10.1155/2018/2658318.
Full textAnusha, R., C. Nithya, R. Venketeswara Pai, and V. Ramanathan. "Coding the Encoded:Automatic Decryption of kaTapayAdi and Aryabhata's Systems of Numeration." Current Science 112, no. 03 (February 10, 2017): 588. http://dx.doi.org/10.18520/cs/v112/i03/588-591.
Full textYang, Xin, and Hongbo Zhang. "Encryption of 3D Point Cloud Object with Deformed Fringe." Advances in Optical Technologies 2016 (February 15, 2016): 1–9. http://dx.doi.org/10.1155/2016/4601462.
Full textVasantha, R., and R. Satya Prasad. "An identity encryption cloud scheme based on SMTP using advanced blow fish algorithm." International Journal of Engineering & Technology 7, no. 1.5 (December 31, 2017): 191. http://dx.doi.org/10.14419/ijet.v7i1.5.9145.
Full textKumari, U. V. Ratna, Santosh Pokhrel, and Hyndavi Anusha Anche. "Blowfish Algorithm-Securing the Future." Journal of Advance Research in Electrical & Electronics Engineering (ISSN: 2208-2395) 2, no. 4 (April 30, 2015): 01–09. http://dx.doi.org/10.53555/nneee.v2i4.202.
Full textSantoso, Kiswara Agung, Ahmad Kamsyakawuni, and Muhammad Seggaf. "MEDICAL IMAGE ENCRYPTION USING DNA ENCODING AND MODIFIED CIRCULAR SHIFT." BAREKENG: Jurnal Ilmu Matematika dan Terapan 16, no. 1 (March 21, 2022): 235–42. http://dx.doi.org/10.30598/barekengvol16iss1pp233-240.
Full textKöhler, Mirko, Ivica Lukić, and Višnja Križanović Čik. "Protecting Information with Subcodstanography." Security and Communication Networks 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/9130683.
Full textKLOTS, Yurii, and Luda KORETSKA. "METHOD OF DATA TRANSMISSION PROTECTION IN CYBERPHYSICAL SYSTEMS." Herald of Khmelnytskyi National University 303, no. 6 (December 2021): 106–10. http://dx.doi.org/10.31891/2307-5732-2021-303-6-106-110.
Full textZhu, Shuqin, and Congxu Zhu. "Secure Image Encryption Algorithm Based on Hyperchaos and Dynamic DNA Coding." Entropy 22, no. 7 (July 15, 2020): 772. http://dx.doi.org/10.3390/e22070772.
Full textFujita, Hachiro. "Quantum McEliece public-key cryptosystem." Quantum Information and Computation 12, no. 3&4 (March 2012): 181–203. http://dx.doi.org/10.26421/qic12.3-4-1.
Full textDömösi, Pál, Carolin Hannusch, and Géza Horváth. "A Cryptographic System Based on a New Class of Binary Error-Correcting Codes." Tatra Mountains Mathematical Publications 73, no. 1 (August 1, 2019): 83–96. http://dx.doi.org/10.2478/tmmp-2019-0007.
Full textZaz, Youssef, Lhoussain El Fadil, and Mohamed El Kayyali. "Securing EPR Data Using Cryptography and Image Watermarking." International Journal of Mobile Computing and Multimedia Communications 4, no. 2 (April 2012): 76–87. http://dx.doi.org/10.4018/jmcmc.2012040106.
Full textKhan, Ali, Qifu Tyler Sun, Zahid Mahmood, and Ata Ullah Ghafoor. "Energy Efficient Partial Permutation Encryption on Network Coded MANETs." Journal of Electrical and Computer Engineering 2017 (2017): 1–10. http://dx.doi.org/10.1155/2017/4657831.
Full textAl-Khateeb, Zeena N., and Melad Jader. "Encryption and hiding text using DNA coding and hyperchaotic system." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 2 (August 1, 2020): 766. http://dx.doi.org/10.11591/ijeecs.v19.i2.pp766-774.
Full textGünlü, Onur, and Rafael Schaefer. "An Optimality Summary: Secret Key Agreement with Physical Unclonable Functions." Entropy 23, no. 1 (December 24, 2020): 16. http://dx.doi.org/10.3390/e23010016.
Full textXu, Fa-Feng, Zhong-Liang Gong, Yu-Wu Zhong, Jiannian Yao, and Yong Sheng Zhao. "Wavelength-Tunable Single-Mode Microlasers Based on Photoresponsive Pitch Modulation of Liquid Crystals for Information Encryption." Research 2020 (December 2, 2020): 1–9. http://dx.doi.org/10.34133/2020/6539431.
Full textLi, Xiaofeng, Yulong Bai, Weishuan Pan, Di Wang, and Yong-Jie Ma. "Development of a Family of Chaotic Systems with Infinite Equilibria and Its Application for Image Encryption." Complexity 2022 (March 30, 2022): 1–18. http://dx.doi.org/10.1155/2022/1250489.
Full textAdithya B. and Santhi G. "DNA Cryptography Using DNA Fragment Assembly and Fragment Key Expansion for Genomic Data." International Journal of Organizational and Collective Intelligence 12, no. 2 (April 2022): 1–19. http://dx.doi.org/10.4018/ijoci.286173.
Full textFerrari, Silvia, and Maurizio Pesce. "Cell-Based Mechanosensation, Epigenetics, and Non-Coding RNAs in Progression of Cardiac Fibrosis." International Journal of Molecular Sciences 21, no. 1 (December 19, 2019): 28. http://dx.doi.org/10.3390/ijms21010028.
Full textLiu, Jingang, Yongge Wang, Zongxiang Yi, and Zhiqiang Lin. "polarRLCE: A New Code-Based Cryptosystem Using Polar Codes." Security and Communication Networks 2019 (December 26, 2019): 1–10. http://dx.doi.org/10.1155/2019/3086975.
Full textAbu Taha, Mohammed, Wassim Hamidouche, Naty Sidaty, Marko Viitanen, Jarno Vanne, Safwan El Assad, and Olivier Deforges. "Privacy Protection in Real Time HEVC Standard Using Chaotic System." Cryptography 4, no. 2 (June 24, 2020): 18. http://dx.doi.org/10.3390/cryptography4020018.
Full textChang, Yao Tang, and Chung Wei Tsailin. "Enhanced Design for AWG-Based Dynamic Reconfigurable Free-Spectral-Range Group Hopping Coder/Decoders to Protect against Eavesdropping." Applied Mechanics and Materials 764-765 (May 2015): 1240–44. http://dx.doi.org/10.4028/www.scientific.net/amm.764-765.1240.
Full textKhalaf, Rifaat Zaidan, and Alharith Abdulkareem Abdullah. "Novel Quantum Encryption Algorithm Based on Multiqubit Quantum Shift Register and Hill Cipher." Advances in High Energy Physics 2014 (2014): 1–5. http://dx.doi.org/10.1155/2014/104325.
Full textGulen, Utku, Abdelrahman Alkhodary, and Selcuk Baktir. "Implementing RSA for Wireless Sensor Nodes." Sensors 19, no. 13 (June 27, 2019): 2864. http://dx.doi.org/10.3390/s19132864.
Full textWang, Jiabo, and Cong Ling. "How to Construct Polar Codes for Ring-LWE-Based Public Key Encryption." Entropy 23, no. 8 (July 23, 2021): 938. http://dx.doi.org/10.3390/e23080938.
Full textLotfi, Mehdi, Hossein Kheiri, and Azizeh Jabbari. "Provide a New Encryption Algorithm for Medical Images and Evaluate the Proposed Algorithm." Frontiers in Health Informatics 8, no. 1 (January 30, 2019): 2. http://dx.doi.org/10.30699/fhi.v8i1.155.
Full textA. Aljazaery, Ibtisam, Haider Th Salim Alrikabi, and Abdul Hadi M. Alaidi. "Encryption of Color Image Based on DNA Strand and Exponential Factor." International Journal of Online and Biomedical Engineering (iJOE) 18, no. 03 (March 8, 2022): 101–13. http://dx.doi.org/10.3991/ijoe.v18i03.28021.
Full textBarannik, Vladimir, Serhii Sidchenko, Natalia Barannik, and Valeriy Barannik. "Development of the method for encoding service data in cryptocompression image representation systems." Eastern-European Journal of Enterprise Technologies 3, no. 9(111) (June 30, 2021): 103–15. http://dx.doi.org/10.15587/1729-4061.2021.235521.
Full textКрасноруцкий, Андрей Александрович, Сергей Сергеевич Шульгин, Анна Владимировна Хаханова, and Дмитрий Владимирович Баранник. "МЕТОД ОПРЕДЕЛЕНИЯ СИЛЬНО ИНФОРМАТИВНЫХ СЕГМЕНТОВ АЭРОФОТОСНИМКА." RADIOELECTRONIC AND COMPUTER SYSTEMS, no. 1 (February 23, 2018): 15–22. http://dx.doi.org/10.32620/reks.2018.1.02.
Full textJie, Xia, and Rui Jun Jing. "On-Line Decrypting: A Homomorphic Realization for Network Coding." Applied Mechanics and Materials 543-547 (March 2014): 2728–32. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.2728.
Full textBogolubov, Anatoli F. "Bring us deliverance, spy! (interpretations of The Spies’ March by Kipling in time of the Media War and Pandemic)." NSU Vestnik. Series: Linguistics and Intercultural Communication 18, no. 2 (2020): 132–53. http://dx.doi.org/10.25205/1818-7935-2020-18-2-132-153.
Full text"Image Encryption and Decryption using RSA Algorithm with Share Creation Techniques." International Journal of Recent Technology and Engineering 8, no. 4 (December 30, 2019): 2797–800. http://dx.doi.org/10.35940/ijeat.b4021.129219.
Full text"A Unified Framework for Encryption and Decryption of Images Based on Autoencoder (UFED)." International Journal of Advanced Trends in Computer Science and Engineering 10, no. 3 (June 7, 2021): 1813–20. http://dx.doi.org/10.30534/ijatcse/2021/451032021.
Full text"Ciphering and Deciphering Messages by Graph Labeling Techniques Through Multilevel Cryptosystem." International Journal of Recent Technology and Engineering 8, no. 4S5 (February 5, 2020): 33–39. http://dx.doi.org/10.35940/ijrte.d1013.1284s519.
Full textGeorge, Loay E., Enas Kh Hassan, Sajaa G. Mohammed, and Faisel G. Mohammed. "Selective Image Encryption Based on DCT, Hybrid Shift Coding and Randomly Generated Secret Key." Iraqi Journal of Science, April 26, 2020, 920–35. http://dx.doi.org/10.24996/ijs.2020.61.4.25.
Full textVaidya, Gayatri, Mohammad Chand Jamali, Snehlata Katheria, and Juan Carlos Cotrina-Aliaga. "Decryption of DNA and Its Role in Treating Genetic Disorder at Early Stage." Journal of Pharmaceutical Research International, March 23, 2022, 59–69. http://dx.doi.org/10.9734/jpri/2022/v34i26b35984.
Full textDutta, Pinky Saikia, and Sauvik Chakraborty. "Image based Steganography in Cryptography implementing different Encryption-Decryption Algorithm." International Journal of Scientific Research in Computer Science, Engineering and Information Technology, July 10, 2020, 745–48. http://dx.doi.org/10.32628/cseit2063191.
Full textSingh, Khoirom Motilal, Laiphrakpam Dolendro Singh, and Themrichon Tuithung. "Text Encryption based on Huffman Coding and ElGamal Cryptosystem." Recent Patents on Engineering 14 (September 17, 2020). http://dx.doi.org/10.2174/1872212114999200917144000.
Full textSiahaan, Fitri Angelina. "IMPLEMENTASI ALGORITMA UNARY CODING UNTUK MENGKOMPRESI TEKS TERENKRIPSI EL GAMAL." JURNAL MEDIA INFORMATIKA BUDIDARMA 2, no. 1 (January 27, 2018). http://dx.doi.org/10.30865/mib.v2i1.994.
Full text"Advanced Encryption Standard for Data Encryption using EDK Environment in FPGA." International Journal of Recent Technology and Engineering 8, no. 4 (November 30, 2019): 11969–72. http://dx.doi.org/10.35940/ijrte.d9920.118419.
Full text"Scalar Multiplication via Elliptic Net using Generalized Equivalent Sequences." International Journal of Engineering and Advanced Technology 9, no. 1 (October 30, 2019): 7188–92. http://dx.doi.org/10.35940/ijeat.a2007.109119.
Full textLI, XU, FARIS KATEB, and SHAOFEI WU. "ADOPTION OF FRACTIONAL DIFFERENTIAL EQUATIONS UNDER IMPROVED VARIATIONAL ITERATIVE ALGORITHM COMBINED WITH DNA CODING ALGORITHM IN IMAGE ENCRYPTION." Fractals 30, no. 02 (February 14, 2022). http://dx.doi.org/10.1142/s0218348x2240062x.
Full text