To see the other types of publications on this topic, follow the link: Encryption.

Journal articles on the topic 'Encryption'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Encryption.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Sun, Chenbo. "Comparative Study of RSA Encryption and Quantum Encryption." Theoretical and Natural Science 2, no. 1 (2023): 121–25. http://dx.doi.org/10.54254/2753-8818/2/20220098.

Full text
Abstract:
Encryption is an important factor during online communication. It is useful to protect users privacy and prevent eavesdroppers listening. RSA encryption and quantum encryption are two mainstream encryption methods applied nowadays. This paper focuses on the evaluation and comparison between these two encryptions. It adopts the basic theory of RSA encryption and quantum encryption and provides an analysis of the benefits and shortcomings of these encryptions. It can be concluded that RSA (a type of mathematical encryption) is more popular than quantum encryption (a kind of physical encryption),
APA, Harvard, Vancouver, ISO, and other styles
2

Pourasad, Yaghoub, Ramin Ranjbarzadeh, and Abbas Mardani. "A New Algorithm for Digital Image Encryption Based on Chaos Theory." Entropy 23, no. 3 (2021): 341. http://dx.doi.org/10.3390/e23030341.

Full text
Abstract:
In recent decades, image encryption, as one of the significant information security fields, has attracted many researchers and scientists. However, several studies have been performed with different methods, and novel and useful algorithms have been suggested to improve secure image encryption schemes. Nowadays, chaotic methods have been found in diverse fields, such as the design of cryptosystems and image encryption. Chaotic methods-based digital image encryptions are a novel image encryption method. This technique uses random chaos sequences for encrypting images, and it is a highly-secured
APA, Harvard, Vancouver, ISO, and other styles
3

Artajaya, Gede Krisna Surya, Agus Muliantara, I. Gusti Ngurah Anom Cahyadi Putra, and I. Ketut Gede Suhartana. "Aplikasi Enkripsi Pesan E-Mail Menggunakan Hybrid Cryptosystem AES dan RSA." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 13, no. 2 (2025): 435. https://doi.org/10.24843/jlk.2024.v13.i02.p21.

Full text
Abstract:
The security of communication via e-mail is increasingly important in today's digital era, where cyber attacks are increasing. These threats require the development of effective solutions to protect the confidentiality and integrity of information in e-mail. This study presents the development of an e-mail messaging application that employs a hybrid cryptosystem combining Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) algorithms. The aim is to improve the security of e-mail communications by utilizing the strengths of both symmetric and asymmetric encryption methods. AES is
APA, Harvard, Vancouver, ISO, and other styles
4

Thabit, Zainab Hasan, Sadiq A. Mehdi, and Bashar M. Nema. "Enhancing Color Image Security: Encryption with Dynamic Chaotic Three-Dimensional System and Robust Security Analysis." Al-Mustansiriyah Journal of Science 34, no. 4 (2023): 87–95. http://dx.doi.org/10.23851/mjs.v34i4.1411.

Full text
Abstract:
The rapid tech growth and widespread internet usage caused a surge in sharing multimedia (text, images, videos, audio) across public networks. Protecting this data is vital, demanding encryption to prevent unauthorized access. Image encryption distorts images for security. This paper highlights encryption's vital role in safeguarding multimedia, especially amid rising internet use and media exchange. It introduces a novel solution: a chaotic three-dimensional system for color image encryption. The study scrutinizes system traits using math software. It employs a new chaotic system to generate
APA, Harvard, Vancouver, ISO, and other styles
5

Et. al., Jaichandran R,. "A Hybrid Encryption Model with Attribute Based Encryption and Advanced Encryption Standard Techniques." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 334–36. http://dx.doi.org/10.17762/turcomat.v12i2.720.

Full text
Abstract:
The emergence of cloud computing has completely changed the information technology sector, storage of information’s and access control. The main challenge in the migration of enterprises is the security to gain data owners confidence. In existing approach, many digital signatures based methodologies are used. In the existing approach, encryption time, security, encryption complexity are the parameters which need more focus. To overcome the existing issue, in this paper we proposed an hybrid architecture invoking attribute based encryption (ABE) for encrypting the key and advanced encryption st
APA, Harvard, Vancouver, ISO, and other styles
6

Alawi, Attaa R., and Nidaa F. Hassan. "A Proposal Video Encryption Using Light Stream Algorithm." Engineering and Technology Journal 39, no. 1B (2021): 184–96. http://dx.doi.org/10.30684/etj.v39i1b.1689.

Full text
Abstract:
Video encrypting is one technique to protect digital videos, it used to avoid unwanted interference and viewing of the transmitted videos. In this paper, a new selective video cryptography algorithm is suggested using light stream algorithm. As it known video size is large in size and it consume time in the encryption process, ChaCha a light encryption algorithm has been used to reduce the encryption time, encryption is done by Xoring frames of video with the key generated from ChaCha algorithm, it produced an acceptable results from robustness point view, but still encryption process consumed
APA, Harvard, Vancouver, ISO, and other styles
7

Huang, Eric. "An Exploration of RSA Encryption." Innovation in Science and Technology 3, no. 6 (2024): 83–86. https://doi.org/10.56397/ist.2024.11.09.

Full text
Abstract:
This project explores digital cryptography through the cryptography security system of RSA encryption. It also explores digital signature encryption with a simple hashing mechanism. This project resulted in a program that encoded and decoded messages using RSA encryption, handled large numbers, and calculated encryptions in a viable amount of time.
APA, Harvard, Vancouver, ISO, and other styles
8

Zhu, Bingxin, Puwen Wei, and Mingqiang Wang. "Adaptive Security of Broadcast Encryption, Revisited." Security and Communication Networks 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/1404279.

Full text
Abstract:
We provide a strong security notion for broadcast encryption, called adaptive security in the multichallenge setting (MA-security), where the adversary can adaptively have access to the key generation oracle and the encryption oracle many times (multichallenge). The adversary specially can query for the challenge ciphertexts on different target user sets adaptively, which generalizes the attacks against broadcast encryptions in the real world setting. Our general result shows that the reduction of the adaptive secure broadcast encryption will lose a factor of q in the MA setting, where q is th
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Jian, and Yutong Zhang. "An Image Encryption Algorithm Based on Balanced Pixel and Chaotic Map." Mathematical Problems in Engineering 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/216048.

Full text
Abstract:
Image encryption technology has been applied in many fields and is becoming the main way of protecting the image information security. There are also many ways of image encryption. However, the existing encryption algorithms, in order to obtain a better effect of encryption, always need encrypting several times. There is not an effective method to decide the number of encryption times, generally determined by the human eyes. The paper proposes an image encryption algorithm based on chaos and simultaneously proposes a balanced pixel algorithm to determine the times of image encryption. Many sim
APA, Harvard, Vancouver, ISO, and other styles
10

Liu, Yibo. "Discussion and Optimization of AES and SM4 Encryption Algorithms." Frontiers in Computing and Intelligent Systems 12, no. 1 (2025): 119–24. https://doi.org/10.54097/cm6eq023.

Full text
Abstract:
This paper creates a new direction for the operation optimization of Simplified Message Block Cipher for 128-bit Data encryption (SM4) national cipher algorithm, which combines with AES algorithm to provide a simpler encryption method for SM4 algorithm. The AES algorithm is for the whole file system-based f encryption scheme, and the implementation concept is to encrypt the file and maintain data security by encrypting files to encrypt and maintain data security. The advantages of this encryption method are that they have few key numbers and are easy to manage. The disadvantage is that when a
APA, Harvard, Vancouver, ISO, and other styles
11

Nori, Ahmed S., and Ansam O. Abdulmajeed. "Design and implementation of Threefish cipher algorithm in PNG file." Sustainable Engineering and Innovation 3, no. 2 (2021): 79–91. http://dx.doi.org/10.37868/sei.v3i2.id131.

Full text
Abstract:
This paper is presenting design and implementation of Threefish block cipher on grayscale images. Despite the fact that Threefish block cipher is one of the best secure algorithms, most studies concerning Threefish have focused on hardware implementation and have not commonly been applied on image encryption due to huge amount of data. The main contribution here was to reduce the time and the amount of data to be encrypted while maintaining encryption performance. This objective was achieved by encrypting just the most significant bits of image pixels. A 256-bit plain text blocks of the Threef
APA, Harvard, Vancouver, ISO, and other styles
12

Dr., Khaled Musa. "Evaluating Encryption Algorithm Method Based on Software Encryption Tools for Information Security." International Journal of Current Science Research and Review 06, no. 06 (2023): 3188–94. https://doi.org/10.5281/zenodo.8013027.

Full text
Abstract:
<strong>ABSTRACT:</strong> Information security is the combination of policies, rules and practices to prevent any unauthorized access or attacks that causes corruption to data, information, and computing services. Information security techniques and programs are built around the core objective to secure data and information by adapting encryption algorithms methods. Encryption algorithm methods impeded in the information security programs or encryption software tools enforce more security by encrypting and decrypting data and information. Encryption algorithm methods are based on algorithms t
APA, Harvard, Vancouver, ISO, and other styles
13

Farhan, Mohammed Mahmoud. "Image Authentication Using Public Key." Al-Salam Journal for Engineering and Technology 4, no. 1 (2024): 78–87. http://dx.doi.org/10.55145/ajest.2025.04.01.007.

Full text
Abstract:
This study talked about importance of data protection during Internet communication and highlights the utilize of image encryption as a specialized method. Image encryptions contain the utilize of unique key values to hide and show messages within images, with algorithms that are difficult to decryption. This work focuses on a modified version of the Rivest-Shamir-Adleman (RSA) encryption system, which is compatible with grayscale and color images and is implemented in C#. Additionally, it combines Advanced Encryption Standard (AES) and cryptography techniques to enhance encryption protection.
APA, Harvard, Vancouver, ISO, and other styles
14

Alslman, Yasmeen, Eman Alnagi, Ashraf Ahmad, Yousef AbuHour, Remah Younisse, and Qasem Abu Al-haija. "Hybrid Encryption Scheme for Medical Imaging Using AutoEncoder and Advanced Encryption Standard." Electronics 11, no. 23 (2022): 3967. http://dx.doi.org/10.3390/electronics11233967.

Full text
Abstract:
Recently, medical image encryption has gained special attention due to the nature and sensitivity of medical data and the lack of effective image encryption using innovative encryption techniques. Several encryption schemes have been recommended and developed in an attempt to improve medical image encryption. The majority of these studies rely on conventional encryption techniques. However, such improvements have come with increased computational complexity and slower processing for encryption and decryption processes. Alternatively, the engagement of intelligent models such as deep learning a
APA, Harvard, Vancouver, ISO, and other styles
15

Namdeo, Thorat Nilesh, Amit Singla, and Tanaji Dhaigude. "VISUAL CRYPTOGRAPHY WITH COLOR IMAGE ENCRYPTION VIA IMPROVED ELLIPTIC CURVE CRYPTOGRAPHY (ECC) AND OTP GENERATION: SELF-IMPROVED GOLD RUSH OPTIMIZATION ALGORITHM FOR OPTIMAL KEY GENERATION." International Journal of Innovations & Research Analysis 04, no. 03(I) (2024): 52–58. http://dx.doi.org/10.62823/ijira/4.3(i).6808.

Full text
Abstract:
Visual Cryptography is a cryptographic technique that involves encrypting images in such a way that decryption can be performed visually without the need for complex computations. This technique holds significant importance in secure image sharing, as it ensures that sensitive visual information remains confidential during transmission. Recognizing this significance, a novel approach named Self-Improved Gold Rush Optimization (SIGRO)-based Visual Cryptography has been proposed in this research. This approach encompasses two main phases: Embedding and Extraction. It involves encrypting three or
APA, Harvard, Vancouver, ISO, and other styles
16

Ali Pitchay, Sakinah, Wail Abdo Ali Alhiagem, Farida Ridzuan, and Sundresan Perumal. "Mobile Application Design for Protecting the Data in Cloud Using Enhanced Technique of Encryption." International Journal of Engineering & Technology 7, no. 4.15 (2018): 98. http://dx.doi.org/10.14419/ijet.v7i4.15.21427.

Full text
Abstract:
This paper provides an enhanced technique for improving the security and protecting the privacy of the cloud computing users by encrypting the data before it reached to server’s storage. Encrypting means the process of converting information or data into unreadable language to prevent unauthorized access. This paper will propose a mobile application design, which will allow the user to encrypt and decrypt the data hence maintaining security and privacy. In the proposed system design, the AES Algorithm will handle the encryption of the data using a keyword which will be defined by the user duri
APA, Harvard, Vancouver, ISO, and other styles
17

H Al-khafaji, Kawther, and Hanan A. Al-Haidari A.Al-Haidari. "Gray X-Ray medical images encryption and decryption by chaotic algorithm." Modern Journal of Health and Applied Sciences 2, no. 1 (2025): 1–11. https://doi.org/10.70411/mjhas.2.1.2025143.

Full text
Abstract:
The procedure for securely transferring encrypted images over the network so that an unauthorized user cannot decrypt them is by implementing strong algorithms that cannot be decrypted. There are different methods and multiple algorithms for encrypting and decrypting images. The most common way to encrypt images is the Chaotic Image System. The encryption key and decryption key are called the “symmetric key." In this research, a medical researcher found that the chaotic logistic encryption algorithm has a better effect on encrypting medical X-ray image information and hides the statistical pro
APA, Harvard, Vancouver, ISO, and other styles
18

Alzain, Mohammed. "Chaos Baker-based Image Encryption in Operation Modes." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 17, no. 1 (2018): 7153–63. http://dx.doi.org/10.24297/ijct.v17i1.7328.

Full text
Abstract:
This research paper study the application of chaos baker map for digital image encryption in different operation modes. The employed modes include the electronic code book (ECB), cipher block chaining (CBC), output feedback chaining (OFB), and cipher feedback chaining (CFB). The proposed method works by applying the chaos baker map in different operation modes for encrypting digital images. A group of tests were carried out to examine the impact of operation modes on chaos baker-based encryption. This is done using several encryption metrics like visual inspection, statistical measures, entrop
APA, Harvard, Vancouver, ISO, and other styles
19

Riyaz Fathima Abdul and Saravanan Arumugam. "A Novel Data Transmission Model Using Hybrid Encryption Scheme for Preserving Data Integrity." Advances in Technology Innovation 10, no. 1 (2025): 15–28. https://doi.org/10.46604/aiti.2024.14114.

Full text
Abstract:
The objective of the study is to introduce a novel hybrid encryption scheme, combining both symmetric and asymmetric encryptions with a data shuffling mechanism, to enhance data obfuscation and encryption security. The approach uses RSA for asymmetric encryption and ChaCha20-Poly1305 for symmetric encryption. To increase the complexity, an additional phase involves reorganizing the RSA-encrypted data blocks. Furthermore, symmetric key generation using the key derivation function is employed to generate the key for symmetric encryption through an asymmetric private key. Decryption entails rever
APA, Harvard, Vancouver, ISO, and other styles
20

Zhang, Zhenhua, Deqi Huang, Yating Tu, and Zikuang Ye. "Layer multiplexing and DNA based color image encryption." Journal of Physics: Conference Series 2858, no. 1 (2024): 012039. http://dx.doi.org/10.1088/1742-6596/2858/1/012039.

Full text
Abstract:
Abstract A layer multiplexing-based encrypted image scheme for DNA color images is proposed. Firstly, a memristor is added to the Sprott-B chaotic system to make it a fourth-order memristorised hyper-chaotic system. The hyperchaotic system has better pseudo-randomness. The encryption system proposed generates the initial value of the system by SHA3-256 function to achieve “One image, one secret”. The chaotic sequence is generated by a memory hyperchaotic system for encrypting the image. The encryption process includes image zero complements, image chunking, DNA encryption, layer multiplexing,
APA, Harvard, Vancouver, ISO, and other styles
21

Wu, Yuchen. "Theoretical Analysis of AES Encryption Optimization Based on Quaternions and Rotation Matrices." Theoretical and Natural Science 100, no. 1 (2025): 75–82. https://doi.org/10.54254/2753-8818/2025.21702.

Full text
Abstract:
As a commonly used symmetric encryption method, AES (Advanced Encryption Standard) still has some steps that cannot fully ensure the effectiveness of encryption, and Symmetric Key Encryption has the risk of key leakage in common. This paper mainly researches an optimization model of AES encryption method, which is based on the original AES encryption method. This model adds another password in the SubByte and MixColumns step, in order to ensure the effectiveness of encryption. The optimization model is achieved with programs on python. Experimental data shows that the encryption process is too
APA, Harvard, Vancouver, ISO, and other styles
22

Kulwinder, Kaur*1 &. Brahmaleen Kaur Sidhu2. "AN HYBRID APPROACH FOR EFFICIENT DATA ENCRYPTION AND DECRYPTION FOR DATA SECURITY IN CLOUD COMPUTING." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 5, no. 9 (2018): 188–93. https://doi.org/10.5281/zenodo.1421045.

Full text
Abstract:
In this paper, a hybrid encryption is proposed using combination of two asymmetric schemes. The existing schemes are lacking in encrypting large data files, there time complexity may worsen with size. In this work the homomorphic algorithm is used along with RSA, to enhance the encryption and decryption time. The evaluation study has been done between AES, 3DES, DES and proposed algorithm on basis of their time complexities. Our proposed work has very least complexity for both encryption and decryption. Proposed scheme is also highly secure as it involves 2 encryption and decryption rounds.
APA, Harvard, Vancouver, ISO, and other styles
23

Kuo, Tzu-Hsiang, and Ja-Ling Wu. "A High Throughput BFV-Encryption-Based Secure Comparison Protocol." Mathematics 11, no. 5 (2023): 1227. http://dx.doi.org/10.3390/math11051227.

Full text
Abstract:
Secure comparison is a fundamental problem in multiparty computation. There are two different parties, each holding an l-bit integer, denoted by 𝑎 and 𝑏, respectively. The goal of secure comparison is to compute the order relationship between 𝑎 and 𝑏, say (𝑎 &gt; 𝑏) ∈ {0.1}, without revealing their inputs to any others. Since previous solutions based on homomorphic encryption need at least Ω(l) encryptions for each l-bit comparison, the total encryption time leads to a computational bottleneck for these protocols. This work presents a fast, semi-honest, secure comparison protocol based on the
APA, Harvard, Vancouver, ISO, and other styles
24

Mandangan, Arif, and Irene Lim Jin Ying. "Chaotic Encryption Scheme for Colour Image using 3D Lorenz Chaotic Map and 3D Chen System." International Journal of Computational Thinking and Data Science 1, no. 1 (2024): 10–24. http://dx.doi.org/10.37934/ctds.1.1.1024.

Full text
Abstract:
Chaos-based image encryption system is an encryption method that uses chaotic systems in encrypting digital images for the purpose of enhancing security. Chaos theory exhibits some distinctive characteristics, which include butterfly-like patterns, unpredictable behavior, and sensitive dependence to initial conditions. . In the past few decades, image encryption based on a single chaotic map has been a common technique in encrypting images. However, there are still unauthorized interceptors who illegally access and obtain the private information of the image. With that being the case, an encry
APA, Harvard, Vancouver, ISO, and other styles
25

Irene Lim Jin Ying and Arif Mandangan. "Chaotic Encryption Scheme for Colour Image using 3D Lorenz Chaotic Map and 3D Chen System." International Journal of Advanced Research in Computational Thinking and Data Science 1, no. 1 (2025): 10–24. https://doi.org/10.37934/ctds.1.1.1024a.

Full text
Abstract:
Chaos-based image encryption system is an encryption method that uses chaotic systems in encrypting digital images for the purpose of enhancing security. Chaos theory exhibits some distinctive characteristics, which include butterfly-like patterns, unpredictable behavior, and sensitive dependence to initial conditions. . In the past few decades, image encryption based on a single chaotic map has been a common technique in encrypting images. However, there are still unauthorized interceptors who illegally access and obtain the private information of the image. With that being the case, an encry
APA, Harvard, Vancouver, ISO, and other styles
26

Qizi, Toshboyeva Feruza To'lqin, and Bebutova Zulayxo Hamidovna. "MODERN METHODS AND ESSENCE OF ENSURING INFORMATION SECURITY IN THE INFORMATION SOCIETY." European Journal of Contemporary Business Law & Technology: Cyber Law, Blockchain, and Legal Innovations 1, no. 7 (2024): 106–11. https://doi.org/10.61796/ejcblt.v1i7.872.

Full text
Abstract:
In today's information society, the problem of information security is extremely important. In this article, the concept of information security and its tasks, threats to information security, the concept of encryption and types of encryptions, encryption standards, cryptography goals are given in-depth information. Issues of reliable protection of information were studied
APA, Harvard, Vancouver, ISO, and other styles
27

Parenreng‬, Jumadi Mabe, Sahraeni Maulida Mustari, and Abdul Wahid. "E-mail Security System Using El-Gamal Hybrid Algorithm and AES (Advanced Encryption Standard) Algorithm." Internet of Things and Artificial Intelligence Journal 2, no. 1 (2022): 1–9. http://dx.doi.org/10.31763/iota.v2i1.510.

Full text
Abstract:
E-mail is a medium of long-distance communication via the internet, which is currently often used for message exchange needs. But the use of e-mail has security problems, especially regarding data leakage when sending messages via e-mail. One of the efforts to improve the security of data and information is the application of cryptographic techniques and methods, namely end-to-end encryption. Cryptography is the science of reducing the risk of security threats by encrypting and decrypting data and information. In the implementation of the e-mail system, at least 2 (two) suitable encryption tec
APA, Harvard, Vancouver, ISO, and other styles
28

Ramanathan, Thirumalaimuthu, Md Jakir Hossen, Md Shohel Sayeed, and Joseph Emerson Raja. "Survey on computational intelligence based image encryption techniques." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 3 (2020): 1428. http://dx.doi.org/10.11591/ijeecs.v19.i3.pp1428-1435.

Full text
Abstract:
Image encryption is an important area in visual cryptography that helps in protecting images when shared through internet. There is lot of cryptography algorithms applied for many years in encrypting images. In the recent years, artificial intelligence techniques are combined with cryptography algorithms to support image encryption. Some of the benefits that artificial intelligence techniques can provide are prediction of possible attacks on cryptosystem using machine learning algorithms, generation of cryptographic keys using optimization algorithms, etc. Computational intelligence algorithms
APA, Harvard, Vancouver, ISO, and other styles
29

Thirumalaimuthu, T. Ramanathan, Hossen J., Sayeed S., and Emerson Raja J. "Survey on computational intelligence based image encryption techniques." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 3 (2020): 1428–35. https://doi.org/10.11591/ijeecs.v19.i3.pp1428-1435.

Full text
Abstract:
Image encryption is an important area in visual cryptography that helps in protecting images when shared through internet. There is lot of cryptography algorithms applied for many years in encrypting images. In the recent years, artificial intelligence techniques are combined with cryptography algorithms to support image encryption. Some of the benefits that artificial intelligence techniques can provide are prediction of possible attacks on cryptosystem using machine learning algorithms, generation of cryptographic keys using optimization algorithms, etc. Computational intelligence algorithms
APA, Harvard, Vancouver, ISO, and other styles
30

Yeow, Sin-Qian, and Kok-Why Ng. "Neural Network Based Data Encryption: A Comparison Study among DES, AES, and HE Techniques." JOIV : International Journal on Informatics Visualization 7, no. 3-2 (2023): 2086. http://dx.doi.org/10.30630/joiv.7.3-2.2336.

Full text
Abstract:
With the improvement of technology and the continuous expansion and deepening of neural network technology, its application in computer network security plays an important role. However, the development of neural networks is accompanied by new threats and challenges. This paper proposes to encrypt the weight data using encryption algorithms and embed image encryption algorithms to improve protected data security further. The purpose is to address the feasibility and effectiveness of using modern encryption algorithms for data encryption in machine learning in response to data privacy breaches.
APA, Harvard, Vancouver, ISO, and other styles
31

SHIBU BAI, Mr SHANE. "Recovering and Analysing Data from Encrypted Devices." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem45625.

Full text
Abstract:
Abstract - This paper presents a secure and efficient data protection approach using hybrid encryption, combining symmetric and asymmetric cryptographic methods to enhance both speed and security. Symmetric encryption, specifically the AES algorithm, isutilized for encrypting large volumes of data quickly, while RSA is employed to securely exchange the encryption keys. Alongside this, the work also introduces a data recovery and analysis component designed to retrieve and verify encrypted data, ensuring its integrity and accessibility when needed. The system is developed in Java and tested for
APA, Harvard, Vancouver, ISO, and other styles
32

Huda Anwar and Zill e Shams. "Algorithms of Encryption Using Graph Theory." Mathematical Sciences and Applications 2, no. 2 (2023): 73–85. http://dx.doi.org/10.52700/msa.v2i2.16.

Full text
Abstract:
Encryption plays a vital role in securing sensitive information in various domains from communication networks to financial transactions. Graph theory, with its vast mathematical framework and powerful algorithms, presents a potential method for creating encryption methods. This abstract introduces an algorithm that leveragesgraph theory concepts to provide a symmetric encryption method. Encryption is the process of hiding the original plain-text message by producing a cipher text; decryption is the process of resolving the cipher text to reveal the original plain-text message. In this researc
APA, Harvard, Vancouver, ISO, and other styles
33

Abeer Salim Jamil, Raghad Abdulaali Azeez, and Nidaa Flaih Hassan. "An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments." International Journal of Online and Biomedical Engineering (iJOE) 19, no. 01 (2023): 93–106. http://dx.doi.org/10.3991/ijoe.v19i01.36901.

Full text
Abstract:
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process
APA, Harvard, Vancouver, ISO, and other styles
34

Aitkhozhayeva, Y. Zh, and D. S. Akhmetsharipov. "Technology for using special encryption functions in PostgreSQL." Bulletin of the National Engineering Academy of the Republic of Kazakhstan 91, no. 1 (2024): 21–29. http://dx.doi.org/10.47533/2024.1606-146x.02.

Full text
Abstract:
Cryptographic encryption mechanisms in the open source PostgreSQL server DBMS are discussed. Special high-level and low-level functions of symmetric encryption of the Pgcrypto module for ensuring information security of data are analyzed. The analysis of special functions of the third-party GPG program is performed, which allow performing asymmetric encryption in the PostgreSQL database server. A combined data encryption technology in database tables is proposed, using a hierarchy of keys (asymmetric and symmetric encryption) with a passphrase, which is also encrypted to ensure better protecti
APA, Harvard, Vancouver, ISO, and other styles
35

Wang, Pengfei, Yixu Wang, Jiafu Xiang, and Xiaoling Xiao. "Fast Image Encryption Algorithm for Logistics-Sine-Cosine Mapping." Sensors 22, no. 24 (2022): 9929. http://dx.doi.org/10.3390/s22249929.

Full text
Abstract:
Because images are vulnerable to external attacks in the process of network transmission and traditional image encryption algorithms have limitations such as long encryption time, insufficient entropy or poor diffusion of cipher image information when encrypting color images, a fast image encryption algorithm based on logistics-sine-cosine mapping is proposed. The algorithm first generates five sets of encrypted sequences from the logistics-sine-cosine mapping, then uses the order of the encryption sequence to scramble the image pixels and designs a new pixel diffusion network to further impro
APA, Harvard, Vancouver, ISO, and other styles
36

Zhao, Dongfang. "Compile-Time Fully Homomorphic Encryption: Eliminating Online Encryption via Algebraic Basis Synthesis." Cryptography 9, no. 2 (2025): 44. https://doi.org/10.3390/cryptography9020044.

Full text
Abstract:
We propose a new framework for compile-time ciphertext synthesis in fully homomorphic encryption (FHE) systems. Instead of invoking encryption algorithms at runtime, our method synthesizes ciphertexts from precomputed encrypted basis vectors using only homomorphic additions, scalar multiplications, and randomized encryptions of zero. This decouples ciphertext generation from encryption and enables efficient batch encoding through algebraic reuse. We formalize this technique as a randomized module morphism and prove that it satisfies IND-CPA security. Our proof uses a hybrid game framework that
APA, Harvard, Vancouver, ISO, and other styles
37

Huang, Xing Li, and Huan Chun Yang. "Two-Way ID Authentication and Hardware Encryption-Based Security Design of Mobile Hard Disk." Applied Mechanics and Materials 58-60 (June 2011): 573–78. http://dx.doi.org/10.4028/www.scientific.net/amm.58-60.573.

Full text
Abstract:
The design of the "two-way ID authentication and hardware encryption-based secure mobile hard disk" adopts the smart card-based technology of two way ID authentication, thus enables higher authentication strength than ordinary password authentication and USB-KEY one way certification; adoption of dedicated hardware encryption chip on encrypting the hard disk data enhances the encryption speed; since this encryption is a hardware level encryption, it is completely transparent to users, and do not rely on the operating system or other applications, with almost no impact on system performance; th
APA, Harvard, Vancouver, ISO, and other styles
38

Vaishnavi Agrawal. "Enhancing Privacy on Online Social Networs: A comparative study of encryption techniques." Journal of Advances and Scholarly Researches in Allied Education 21, no. 5 (2024): 25–32. http://dx.doi.org/10.29070/cqryaz86.

Full text
Abstract:
The ability to connect with people all over the world and share private information has made online social networks (OSNs) indispensable to contemporary communication. Because of the serious privacy and security concerns that come with their fast growth, protecting user data is of the utmost importance. In order to improve OSN privacy, this study examines several encryption techniques. It discusses symmetric encryption (ECC and RSA) and synthetic encryption (AES) as well as hybrid methods that combine the two types of encryption. Using examples from well-known sites such as LinkedIn, Facebook,
APA, Harvard, Vancouver, ISO, and other styles
39

Agarwal, Sohit, and Gagan Joshi. "Hybrid Encryption of Cloud Processing With IOT Devices Using DNA And RSA Cryptography." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 6 (2023): 21–27. http://dx.doi.org/10.17762/ijritcc.v11i6.6767.

Full text
Abstract:
The research paper titled "Hybrid Data Encryption as well as Decryption Using Hybrid RSA and DNA" develops a hybrid cryptosystem by combining the usefulness of such an asymmetric-key (public-key) cryptosystem with the efficacy of a symmetric-key (private-key) cryptosystem. These two types of cryptosystems use different types of keys. The method addresses concerns regarding the users' right to privacy, authentication, and accuracy by utilizing a data encryption process that is secure in both directions. Both the process of encrypting data and the process of decrypting data, which are both utili
APA, Harvard, Vancouver, ISO, and other styles
40

Li, Bingcheng, Dingkang Li, and Mingyuan Zhu. "Application analysis of data encryption technology." Applied and Computational Engineering 50, no. 1 (2024): 199–205. http://dx.doi.org/10.54254/2755-2721/50/20241502.

Full text
Abstract:
Data encryption technology is a key method to secure sensitive data. The privacy and confidentiality of data is protected by encrypting the data, i.e., transforming the original data into a form that cannot be understood without authorization. However, the security of traditional encryption algorithms is gradually challenged with the increase in computing power. Therefore, studying how to apply more advanced encryption techniques has become a current research hotspot. This study aims to analyze the application of data encryption techniques and explore the advantages and applicability of emergi
APA, Harvard, Vancouver, ISO, and other styles
41

Limbachia, Dipen. "Encryption of Card Details Using AES with a 128-bit Key a Secure Approach to Data Protection." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 03 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem29484.

Full text
Abstract:
Data security is a critical concern in today's digital age, particularly regarding the protection of sensitive information such as cardholder data. This research paper explores the implementation of Advanced Encryption Standard (AES) encryption with a 128-bit key as a means of safeguarding card details. The project demonstrates the encryption and decryption process, ensuring data confidentiality and integrity. Utilizing the pycryptodome library in Python, the AES encryption technique is applied to encrypt card details, offering a secure approach to data protection. The methodology section outl
APA, Harvard, Vancouver, ISO, and other styles
42

Michael, N. John, Ozioma Ogoegbulem, Victor Obukohwo, and Etaroghene Egbogho Henry. "NUMBER THEORY IN RSA ENCRYPTION SYSTEMS." GPH - International Journal of Mathematics 06, no. 11 (2023): 07–16. https://doi.org/10.5281/zenodo.10209900.

Full text
Abstract:
<strong>RSA encryption is a widely employed cryptographic system based on the principles of number theory. Number theory is the branch of pure mathematics that studies positive whole numbers, called natural numbers and integers. Number theory seeks to discover relationships existing between numbers. Cryptography is the study of encryption and decryption of information. By encrypting information, data can be transmitted to the intended recipient securely across the internet. In this paper, we propose an RSA encryption scheme based on number theory, showing its applications to cryptography.</str
APA, Harvard, Vancouver, ISO, and other styles
43

Alsalam Ali, Nashwan, Abdul Monem S. Rahma, and Shaimaa H. Shaker. "Survey on 3D Content Encryption." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 15 (2021): 115. http://dx.doi.org/10.3991/ijim.v15i15.24179.

Full text
Abstract:
&lt;p class="0abstract"&gt;The rapidly growing 3D content exchange over the internet makes securing 3D content became a very important issue. The solution for this issue is to encrypting data of 3D content, which included two main parts texture map and 3D models. The standard encryption methods such as AES and DES are not a suitable solution for 3D applications due to the structure of 3D content, which must maintain dimensionality and spatial stability. So, these problems are overcome by using chaotic maps in cryptography, which provide confusion and diffusion by providing uncorrelated numbers
APA, Harvard, Vancouver, ISO, and other styles
44

Sinha, Mr Anurag, and Mr Amrit Kumar Bhadani. "Double Layer Cryptography using Multiplicative Cipher and Chemical Periodic Table." Indian Journal of Data Communication and Networking 1, no. 2 (2021): 21–30. http://dx.doi.org/10.35940/ijdcn.b5008.041221.

Full text
Abstract:
According to the present communication system one of the main concerns is secured transformation of data. In this paper we be inclined to propose a two-level encryption in this paper in the first level encryption we use the multiplicative ciphers and Cesar cipher in this level the plain text letters, we shall multiply the key numbers in this level and the second layer encryption we use periodic table exploitation the properties if the quality table, and thus use it for encrypting and decrypting in the same manners. For the information of network security in the second level encryption we will
APA, Harvard, Vancouver, ISO, and other styles
45

Sinha, Mr Anurag, and Mr Amrit Kumar Bhadani. "Double Layer Cryptography using Multiplicative Cipher and Chemical Periodic Table." Indian Journal of Data Communication and Networking 1, no. 2 (2021): 21–30. http://dx.doi.org/10.54105/ijdcn.b5008.041221.

Full text
Abstract:
According to the present communication system one of the main concerns is secured transformation of data. In this paper we be inclined to propose a two-level encryption in this paper in the first level encryption we use the multiplicative ciphers and Cesar cipher in this level the plain text letters, we shall multiply the key numbers in this level and the second layer encryption we use periodic table exploitation the properties if the quality table, and thus use it for encrypting and decrypting in the same manners. For the information of network security in the second level encryption we will
APA, Harvard, Vancouver, ISO, and other styles
46

Pushpendra, Tiwari. "A study and comparison of the various cryptography technique standards within fifteen factors." i-manager's Journal on Digital Forensics & Cyber Security 1, no. 1 (2023): 21. http://dx.doi.org/10.26634/jdf.1.1.19134.

Full text
Abstract:
This paper focuses on analyzing the performance of various encryption algorithms, namely RSA, ECC, and DSA, in terms of encrypting and decrypting sensitive data. Encryption is crucial for ensuring the security of data, and there are two types of encryption algorithms: Symmetric key and Asymmetric-key encryption. RSA is highly secure but has high computation time, whereas ECC provides equivalent security with lower computing power and battery usage. The study compares the implementation and analysis of DES, 3DES, AES, RSA, ECC, and DSA, highlighting their strengths and weaknesses. The paper aim
APA, Harvard, Vancouver, ISO, and other styles
47

Irzayzah, Mr Samyrah M. Abu. "A New Application for Encryption and Decryption Using the TAS Algorithm." International Journal for Research in Applied Science and Engineering Technology 11, no. 11 (2023): 2428–44. http://dx.doi.org/10.22214/ijraset.2023.56928.

Full text
Abstract:
Abstract: Encryption is based on precise algorithms and specific mathematical operations it is indispensable for the security and safety of information and files that are of great importance in our lives. This paper discusses a new encryption and decryption technique, we used very powerful and complex encryption and decryption algorithms. Our study relies on encrypting the blocks according to the code writing style by making the encryption process for each individual block individually and does not depend on all the blocks that precede it in the message. We focus on sending several messages wi
APA, Harvard, Vancouver, ISO, and other styles
48

Anurag, Sinha, and Kumar Bhadani Amrit. "Double Layer Cryptography using Multiplicative Cipher and Chemical Periodic Table." Indian Journal of Data Communication and Networking (IJDCN) 1, no. 2 (2021): 21–30. https://doi.org/10.54105/ijdcn.B5008.041221.

Full text
Abstract:
According to the present communication system one of the main concerns is secured transformation of data. In this paper we be inclined to propose a two-level encryption in this paper in the first level encryption we use the multiplicative ciphers and Cesar cipher in this level the plain text letters, we shall multiply the key numbers in this level and the second layer encryption we use periodic table exploitation the properties if the quality table, and thus use it for encrypting and decrypting in the same manners. For the information of network security in the second level encryption we will
APA, Harvard, Vancouver, ISO, and other styles
49

Kovalchuk, A. M., Yuriy Peleckh, and Tetiana Bubela. "BIT OPERATIONS WITH ELEMENTS OF THE RSA ALGORITHM IN ENCRYPTION-DECRYPTION OF COLOR IMAGES." Measuring Equipment and Metrology 83, no. 3 (2022): 5–10. http://dx.doi.org/10.23939/istcmtm2022.03.005.

Full text
Abstract:
An image as a stochastic signal is one of the most common forms of information. Protecting images from unauthorized access and applying is a correspondingly urgent task. This causes the use of well-known classical encryption methods in the case of image encryption. But the image is a signal that possesses, in addition to typical informativeness, also visual informativeness. Informativeness for modern image processing methods makes it possible to ensure unauthorized access. Creating an attack on an encrypted image is possible in two ways: by traditional hacking of encryption methods, or by clas
APA, Harvard, Vancouver, ISO, and other styles
50

Yu, Wanbo, and Hao Wang. "Analysis of trigonometric chaotic sequence by proposing an index-based bit level scrambling image encryption." Modern Physics Letters B 35, no. 24 (2021): 2150406. http://dx.doi.org/10.1142/s0217984921504066.

Full text
Abstract:
Chaotic map is applied to numerous research fields, such as encryption of data and information. In this paper, a novel bit-level scrambling encryption based on three-dimensional trigonometric chaotic sequence is proposed. This encryption is operated on grayscale images because pixel value of which is between 0 and 255, which can be converted into 8-bit binary number, then each image can be converted into eight binary images. Combine binary images a three-dimensional matrix as input, which have three index values width, height, and page. Generate three numbers by the chaotic sequence to locate
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!