Articles de revues sur le sujet « Encryption techniques »

Pour voir les autres types de publications sur ce sujet consultez le lien suivant : Encryption techniques.

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 50 meilleurs articles de revues pour votre recherche sur le sujet « Encryption techniques ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.

1

Et. al., Jaichandran R,. « A Hybrid Encryption Model with Attribute Based Encryption and Advanced Encryption Standard Techniques ». Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no 2 (11 avril 2021) : 334–36. http://dx.doi.org/10.17762/turcomat.v12i2.720.

Texte intégral
Résumé :
The emergence of cloud computing has completely changed the information technology sector, storage of information’s and access control. The main challenge in the migration of enterprises is the security to gain data owners confidence. In existing approach, many digital signatures based methodologies are used. In the existing approach, encryption time, security, encryption complexity are the parameters which need more focus. To overcome the existing issue, in this paper we proposed an hybrid architecture invoking attribute based encryption (ABE) for encrypting the key and advanced encryption standard (AES) for file encryption. Thus the proposed methodology provides security, confidentiality and optimizing storage and encryption cost
Styles APA, Harvard, Vancouver, ISO, etc.
2

Ramanathan, Thirumalaimuthu, Md Jakir Hossen, Md Shohel Sayeed et Joseph Emerson Raja. « Survey on computational intelligence based image encryption techniques ». Indonesian Journal of Electrical Engineering and Computer Science 19, no 3 (1 septembre 2020) : 1428. http://dx.doi.org/10.11591/ijeecs.v19.i3.pp1428-1435.

Texte intégral
Résumé :
Image encryption is an important area in visual cryptography that helps in protecting images when shared through internet. There is lot of cryptography algorithms applied for many years in encrypting images. In the recent years, artificial intelligence techniques are combined with cryptography algorithms to support image encryption. Some of the benefits that artificial intelligence techniques can provide are prediction of possible attacks on cryptosystem using machine learning algorithms, generation of cryptographic keys using optimization algorithms, etc. Computational intelligence algorithms are popular in enhancing security for image encryption. The main computational intelligence algorithms used in image encryption are neural network, fuzzy logic and genetic algorithm. In this paper, a review is done on computational intelligence-based image encryption methods that have been proposed in the recent years and the comparison is made on those methods based on their performance on image encryption.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Parenreng‬, Jumadi Mabe, Sahraeni Maulida Mustari et Abdul Wahid. « E-mail Security System Using El-Gamal Hybrid Algorithm and AES (Advanced Encryption Standard) Algorithm ». Internet of Things and Artificial Intelligence Journal 2, no 1 (16 février 2022) : 1–9. http://dx.doi.org/10.31763/iota.v2i1.510.

Texte intégral
Résumé :
E-mail is a medium of long-distance communication via the internet, which is currently often used for message exchange needs. But the use of e-mail has security problems, especially regarding data leakage when sending messages via e-mail. One of the efforts to improve the security of data and information is the application of cryptographic techniques and methods, namely end-to-end encryption. Cryptography is the science of reducing the risk of security threats by encrypting and decrypting data and information. In the implementation of the e-mail system, at least 2 (two) suitable encryption techniques are needed, namely symmetric encryption techniques to encrypt messages and data to be sent via e-mail effectively and efficiently, and asymmetric encryption techniques used to distribute keys used by symmetric encryption. Therefore, in this study, we use the El-Gamal encryption model to distribute the symmetric key, and the AES encryption model is a fairly secure algorithm to protect message data or confidential information.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Sharma, Ramandeep, Richa Sharma et Harmanjit Singh. « Classical Encryption Techniques ». INTERNATIONAL JOURNAL OF COMPUTERS & ; TECHNOLOGY 3, no 1 (1 août 2012) : 84–90. http://dx.doi.org/10.24297/ijct.v3i1b.2745.

Texte intégral
Résumé :
This paper reviews some of the classical encryption and modern techniques which are widely used to solve the problem in open networked systems, where information is being received and misused by adversaries by means of facilitating attacks at various levels in the communication. In this paper the proposition of building the basics of classical encryption and modern techniques and the comparison has been done between each of them.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Yeow, Sin-Qian, et Kok-Why Ng. « Neural Network Based Data Encryption : A Comparison Study among DES, AES, and HE Techniques ». JOIV : International Journal on Informatics Visualization 7, no 3-2 (30 novembre 2023) : 2086. http://dx.doi.org/10.30630/joiv.7.3-2.2336.

Texte intégral
Résumé :
With the improvement of technology and the continuous expansion and deepening of neural network technology, its application in computer network security plays an important role. However, the development of neural networks is accompanied by new threats and challenges. This paper proposes to encrypt the weight data using encryption algorithms and embed image encryption algorithms to improve protected data security further. The purpose is to address the feasibility and effectiveness of using modern encryption algorithms for data encryption in machine learning in response to data privacy breaches. The approach consists of training a neural network to simulate a model of machine learning and then encrypting it using Data Encryption Standard (DES), Advanced Encryption Standard (AES), and Homomorphic Encryption (HE) techniques, respectively. Its performance is evaluated based on the encryption/decryption accuracy and computational efficiency. The results indicate that combining DES with Blowfish offers moderate encryption and decryption speeds but is less secure than AES and HE. AES provides a practical solution, balancing security and performance, offering a relatively swift encryption and decryption process while maintaining high security. However, Fernet and HE present a viable alternative if data privacy is a top priority. Encryption and decryption times increase with file size and require sufficient computational resources. Future research should explore image encryption techniques to balance security and accurate image retrieval during decryption. Advanced privacy-preserving approaches, such as differential privacy and secure multi-party computation, may enhance security and confidentiality in digital encryption and decryption processes.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Li, Bingcheng, Dingkang Li et Mingyuan Zhu. « Application analysis of data encryption technology ». Applied and Computational Engineering 50, no 1 (25 mars 2024) : 199–205. http://dx.doi.org/10.54254/2755-2721/50/20241502.

Texte intégral
Résumé :
Data encryption technology is a key method to secure sensitive data. The privacy and confidentiality of data is protected by encrypting the data, i.e., transforming the original data into a form that cannot be understood without authorization. However, the security of traditional encryption algorithms is gradually challenged with the increase in computing power. Therefore, studying how to apply more advanced encryption techniques has become a current research hotspot. This study aims to analyze the application of data encryption techniques and explore the advantages and applicability of emerging encryption algorithms. This paper presents a variety of methods for preventing users' privacy breaches, with a primary focus on the principles of homomorphic encryption and how data can be accessed by users without decryption. Additionally, the working principles of secure multiparty computation are discussed, allowing multiple users to perform calculations on shared data while preserving data privacy. Furthermore, the paper explores data encryption techniques that employ specific algorithms to convert plaintext into ciphertext, ensuring both data consistency and privacy. Finally, a summary and future prospects are provided.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Thabit, Zainab Hasan, Sadiq A. Mehdi et Bashar M. Nema. « Enhancing Color Image Security : Encryption with Dynamic Chaotic Three-Dimensional System and Robust Security Analysis ». Al-Mustansiriyah Journal of Science 34, no 4 (30 décembre 2023) : 87–95. http://dx.doi.org/10.23851/mjs.v34i4.1411.

Texte intégral
Résumé :
The rapid tech growth and widespread internet usage caused a surge in sharing multimedia (text, images, videos, audio) across public networks. Protecting this data is vital, demanding encryption to prevent unauthorized access. Image encryption distorts images for security. This paper highlights encryption's vital role in safeguarding multimedia, especially amid rising internet use and media exchange. It introduces a novel solution: a chaotic three-dimensional system for color image encryption. The study scrutinizes system traits using math software. It employs a new chaotic system to generate a crucial key sequence for pixel scrambling. Utilizing stream cipher encryption enhances security. Extensive security analysis tests its resilience against attacks like histogram and correlation techniques. Results are promising: a fairly uniform histogram, minimal correlation among pixels nearing zero, and entropy close to the ideal. Metrics like NPCR and UACI almost match ideal values, ensuring high security. Experiments confirm its effectiveness in encrypting diverse color images. The approach guarantees a uniform histogram, minimal pixel correlation nearing zero, entropy near the ideal value (8), and NPCR/UACI values close to ideals (99.61191% and 33.41068% respectively).
Styles APA, Harvard, Vancouver, ISO, etc.
8

Yang, Ming, Monica Trifas, Guillermo Francia III et Lei Chen. « Cryptographic and Steganographic Approaches to Ensure Multimedia Information Security and Privacy ». International Journal of Information Security and Privacy 3, no 3 (juillet 2009) : 37–54. http://dx.doi.org/10.4018/jisp.2009100703.

Texte intégral
Résumé :
Information security and privacy have traditionally been ensured with data encryption techniques. Generic data encryption standards, such as DES, RSA, AES, are not very efficient in the encryption of multimedia contents due to the large volume. In order to address this issue, different image/video encryption methodologies have been developed. These methodologies encrypt only the key parameters of image/video data instead of encrypting it as a bitstream. Joint compression-encryption is a very promising direction for image/video encryption. Nowadays, researchers start to utilize information hiding techniques to enhance the security level of data encryption methodologies. Information hiding conceals not only the content of the secret message, but also its very existence. In terms of the amount of data to be embedded, information hiding methodologies can be classified into low bitrate and high bitrate algorithms. In terms of the domain for embedding, they can be classified into spatial domain and transform domain algorithms. Different categories of information hiding methodologies, as well as data embedding and watermarking strategies for digital video contents, will be reviewed. A joint cryptograph-steganography methodology, which combines both encryption and information hiding techniques to ensure patient information security and privacy in medical images, is also presented.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Alslman, Yasmeen, Eman Alnagi, Ashraf Ahmad, Yousef AbuHour, Remah Younisse et Qasem Abu Al-haija. « Hybrid Encryption Scheme for Medical Imaging Using AutoEncoder and Advanced Encryption Standard ». Electronics 11, no 23 (30 novembre 2022) : 3967. http://dx.doi.org/10.3390/electronics11233967.

Texte intégral
Résumé :
Recently, medical image encryption has gained special attention due to the nature and sensitivity of medical data and the lack of effective image encryption using innovative encryption techniques. Several encryption schemes have been recommended and developed in an attempt to improve medical image encryption. The majority of these studies rely on conventional encryption techniques. However, such improvements have come with increased computational complexity and slower processing for encryption and decryption processes. Alternatively, the engagement of intelligent models such as deep learning along with encryption schemes exhibited more effective outcomes, especially when used with digital images. This paper aims to reduce and change the transferred data between interested parties and overcome the problem of building negative conclusions from encrypted medical images. In order to do so, the target was to transfer from the domain of encrypting an image to encrypting features of an image, which are extracted as float number values. Therefore, we propose a deep learning-based image encryption scheme using the autoencoder (AE) technique and the advanced encryption standard (AES). Specifically, the proposed encryption scheme is supposed to encrypt the digest of the medical image prepared by the encoder from the autoencoder model on the encryption side. On the decryption side, the analogous decoder from the auto-decoder is used after decrypting the carried data. The autoencoder was used to enhance the quality of corrupted medical images with different types of noise. In addition, we investigated the scores of structure similarity (SSIM) and mean square error (MSE) for the proposed model by applying four different types of noise: salt and pepper, speckle, Poisson, and Gaussian. It has been noticed that for all types of noise added, the decoder reduced this noise in the resulting images. Finally, the performance evaluation demonstrated that our proposed system improved the encryption/decryption overhead by 50–75% over other existing models.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Mohammed, Zahraa A., Hadeel Qasem Gheni, Zahraa Jabbar Hussein et Ali Kadhum M. Al-Qurabat. « Advancing Cloud Image Security via AES Algorithm Enhancement Techniques ». Engineering, Technology & ; Applied Science Research 14, no 1 (8 février 2024) : 12694–701. http://dx.doi.org/10.48084/etasr.6601.

Texte intégral
Résumé :
Communication system and internet dominance in our society, has made image security a matter of paramount concern. Cryptography involves encrypting data to protect information exchange between senders and receivers, establishing a foundation for secure communication. The Advanced Encryption Standard (AES) is an exceptional algorithm that plays a pivotal role in this area because of its ability to consistently transform plain data into cipher data using the same encryption key. This algorithm engages intricate encryption techniques, harnessing a variety of algorithms and transformations to ensure robust data security. This study introduces an image encryption technique to comprehensively address security requirements. The proposed method uses the AES algorithm to provide high reliability and unparalleled safety, effectively protecting precious images against any form of malicious attack. The sender's image is intelligently fragmented into multiple pieces to maximize data confidentiality, employing a sophisticated algorithm. Upon decryption by the intended recipient, these fragments seamlessly merge to reconstruct the original image. The suggested technique allows users to securely store their data in the cloud, mitigating concerns related to potential data leakage, damage, or corruption. Thus, by integrating a cloud-based storage system, and utilizing digital signatures through OpenSSL, this method guarantees airtight security and reliability for sensitive data.
Styles APA, Harvard, Vancouver, ISO, etc.
11

Zhu, Bingxin, Puwen Wei et Mingqiang Wang. « Adaptive Security of Broadcast Encryption, Revisited ». Security and Communication Networks 2017 (2017) : 1–16. http://dx.doi.org/10.1155/2017/1404279.

Texte intégral
Résumé :
We provide a strong security notion for broadcast encryption, called adaptive security in the multichallenge setting (MA-security), where the adversary can adaptively have access to the key generation oracle and the encryption oracle many times (multichallenge). The adversary specially can query for the challenge ciphertexts on different target user sets adaptively, which generalizes the attacks against broadcast encryptions in the real world setting. Our general result shows that the reduction of the adaptive secure broadcast encryption will lose a factor of q in the MA setting, where q is the maximum number of encryption queries. In order to construct tighter MA-secure broadcast encryptions, we investigate Gentry and Water’s transformation and show that their transformation can preserve MA-security at the price of reduction loss on the advantage of the underlying symmetric key encryption. Furthermore, we remove the q-type assumption in Gentry and Water’s semistatically secure broadcast encryption by using Hofheinz-Koch-Striecks techniques. The resulting scheme instantiated in a composite order group is MA-secure with constant-size ciphertext header.
Styles APA, Harvard, Vancouver, ISO, etc.
12

Wedad Abdul Khuder Naser, Amal Abbas Kadhim et Safana Hyder Abbas. « Subject review : Image encryption techniques ». Global Journal of Engineering and Technology Advances 15, no 3 (30 juin 2023) : 029–31. http://dx.doi.org/10.30574/gjeta.2023.15.3.0098.

Texte intégral
Résumé :
Security is one of the core areas of study in recent days. Encryption of the image is widely known as an effective method for its secure transmission. The objective of any image encryption method is to obtain a top quality hidden image in order to keep information secret. This paper is a study of research authors in the field of image encryption with a research review to see how the field of image encryption has progressed and the best algorithms in their performance.
Styles APA, Harvard, Vancouver, ISO, etc.
13

El-Yahyaoui, Ahmed, et Mohamed Daifr Ech-Cherif El Kettani. « About Fully Homomorphic Encryption Improvement Techniques ». International Journal of Embedded and Real-Time Communication Systems 10, no 3 (juillet 2019) : 1–20. http://dx.doi.org/10.4018/ijertcs.2019070101.

Texte intégral
Résumé :
Fully homomorphic encryption schemes (FHE) are a type of encryption algorithm dedicated to data security in cloud computing. It allows for performing computations over ciphertext. In addition to this characteristic, a verifiable FHE scheme has the capacity to allow an end user to verify the correctness of the computations done by a cloud server on his encrypted data. Since FHE schemes are known to be greedy in term of processing consumption and slow in terms of runtime execution, it is very useful to look for improvement techniques and tools to improve FHE performance. Parallelizing computations is among the best tools one can use for FHE improvement. Batching is a kind of parallelization of computations when applied to an FHE scheme, it gives it the capacity of encrypting and homomorphically processing a vector of plaintexts as a single ciphertext. This is used in the context of cloud computing to perform a known function on several ciphertexts for multiple clients at the same time. The advantage here is in optimizing resources on the cloud side and improving the quality of services provided by the cloud computing. In this article, the authors will present a detailed survey of different FHE improvement techniques in the literature and apply the batching technique to a promising verifiable FHE (VFHE) recently presented by the authors at the WINCOM17 conference.
Styles APA, Harvard, Vancouver, ISO, etc.
14

Pushpendra, Tiwari. « A study and comparison of the various cryptography technique standards within fifteen factors ». i-manager's Journal on Digital Forensics & ; Cyber Security 1, no 1 (2023) : 21. http://dx.doi.org/10.26634/jdf.1.1.19134.

Texte intégral
Résumé :
This paper focuses on analyzing the performance of various encryption algorithms, namely RSA, ECC, and DSA, in terms of encrypting and decrypting sensitive data. Encryption is crucial for ensuring the security of data, and there are two types of encryption algorithms: Symmetric key and Asymmetric-key encryption. RSA is highly secure but has high computation time, whereas ECC provides equivalent security with lower computing power and battery usage. The study compares the implementation and analysis of DES, 3DES, AES, RSA, ECC, and DSA, highlighting their strengths and weaknesses. The paper aims to provide a comprehensive comparison of these cryptographic techniques, including their performances, to assist in selecting the most appropriate algorithm for specific applications.
Styles APA, Harvard, Vancouver, ISO, etc.
15

Joshi, Bineet, Bansidhar Joshi, Anupama Mishra, Varsha Arya, Avadhesh Kumar Gupta et Dragan Peraković. « A Comparative Study of Privacy-Preserving Homomorphic Encryption Techniques in Cloud Computing ». International Journal of Cloud Applications and Computing 12, no 1 (1 janvier 2022) : 1–11. http://dx.doi.org/10.4018/ijcac.309936.

Texte intégral
Résumé :
In cloud computing, a third party hosts a client's data, which raises privacy and security concerns. To maintain privacy, data should be encrypted by cryptographic techniques. However, encrypting the data makes it unsuitable for indexing and fast processing, as data needs to be decrypted to plain text before it can be further processed. Homomorphic encryption helps to overcome this shortcoming by allowing users to perform operations on encrypted data without decryption. Many academics have attempted to address the issue of data security, but none have addressed the issue of data privacy in cloud computing as thoroughly as this study has. This paper discusses the challenges involved in maintaining the privacy of cloud-based data and the techniques used to address these challenges. It was identified that homomorphic encryption is the best solution of all. This work also identified and compared the various homomorphic encryption schemes which are capable of ensuring the privacy of data in cloud storage and ways to implement them through libraries.
Styles APA, Harvard, Vancouver, ISO, etc.
16

Kumar, Brijesh, et Amrita Saraswat. « Security on Cloud using High Level Encryption Techniques ». International Journal of Trend in Scientific Research and Development Volume-1, Issue-6 (31 octobre 2017) : 915–18. http://dx.doi.org/10.31142/ijtsrd4712.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
17

Kaur, Mandeep, Surender Singh et Manjit Kaur. « Computational Image Encryption Techniques : A Comprehensive Review ». Mathematical Problems in Engineering 2021 (19 juillet 2021) : 1–17. http://dx.doi.org/10.1155/2021/5012496.

Texte intégral
Résumé :
Images contain very sensitive and confidential information. Because images play a significant role in many applications such as military communication, remote-sensing, and medical-imaging, therefore, it is necessary to protect sensitive and confidential information from unauthorized use and modification. To achieve this objective, encryption is one of the best methods among the information hiding methods. In recent years, many image encryption approaches are designed by the researchers. They use different concepts for image encryption to increase security. The main aim of this paper is to present a comprehensive review of the existing image encryption approaches. These approaches are categorized based on different concepts such as chaotic maps, DNA, compressive sensing, and optical image encryption. Comparisons are made among the existing approaches to access the various security parameters. Key performance metrics are also presented. The future scope of image encryption is also presented to encourage the research community.
Styles APA, Harvard, Vancouver, ISO, etc.
18

Mahna, Shivanku, et Sravan Ch. « Data Encryption Techniques for USB ». International Journal of Computer Applications 104, no 7 (18 octobre 2014) : 14–17. http://dx.doi.org/10.5120/18213-9162.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
19

SIROMONEY, RANI, K. G. SUBRAMANIAN et P. J. ABISHA. « ENCRYPTION-DECRYPTION TECHNIQUES FOR PICTURES ». International Journal of Pattern Recognition and Artificial Intelligence 03, no 03n04 (décembre 1989) : 497–503. http://dx.doi.org/10.1142/s0218001489000371.

Texte intégral
Résumé :
Language theoretic public key cryptosystems for strings and pictures are discussed. Two methods of constructing public key cryptosystems for the safe transmission or storage of chain code pictures are presented; the first one encrypts a chain code picture as a string and the second one as a two-dimensional array.
Styles APA, Harvard, Vancouver, ISO, etc.
20

Vasim Ahamad, Mohd, Misbah Urrahman Siddiqui, Maria Masroor et Urooj Fatima. « An Improved Playfair Encryption Technique Using Fibonacci Series Generated Secret Key ». International Journal of Engineering & ; Technology 7, no 4.5 (22 septembre 2018) : 347. http://dx.doi.org/10.14419/ijet.v7i4.5.20104.

Texte intégral
Résumé :
With the technology advancements and easy availability of internet, every day millions of users share information electronically through emails, file sharing, e-commerce, etc. As, internet is highly vulnerable to various attacks, sending sensitive information over the Internet may be dangerous. One of the ways to protect the sensitive Information is using the cryptographic techniques. So, while sharing sensitive information over the Internet, it should be sent in encrypted form to prevent the access by unauthorized person. Encryption can be defined as the process of transforming information in such a manner that only authorized person can understand the shared information. In this paper, we have taken Playfair encryption algorithm for encryption and modified it by using Fibonacci series. Fibonacci series is used to generate a random key, which is used for encrypting the message in Playfair encryption algorithm. Using Fibonacci numbers and generating random keys provide significant security to shared information.
Styles APA, Harvard, Vancouver, ISO, etc.
21

Ranjan, Kumar H. S., Safeeriya S. P. Fathimath, Ganesh Aithal et Surendra Shetty. « A Survey on Key(s) and Keyless Image Encryption Techniques ». Cybernetics and Information Technologies 17, no 4 (27 novembre 2017) : 134–64. http://dx.doi.org/10.1515/cait-2017-0046.

Texte intégral
Résumé :
AbstractAs in recent years digital data transmission and image application have been increasing, maintaining secure transmission of image is of high importance. Image Encryption is implemented to achieve security on image applications. This paper exhibits a survey on various existing image encryption techniques. The paper mainly focuses on two types: Image encryption with Key(s) and Image Encryption without Key(s). In addition it also describes several properties of a good image encryption technique. The paper presents a survey of most popular algorithms and research papers that are related with different image encryption techniques.
Styles APA, Harvard, Vancouver, ISO, etc.
22

Dr.R.Premkumar., Dr.C.Priya., S.Vengatesh Kumar.,, Dr M. Vidhyalakshmi &. Dr S. Saranya;. « Investigation on Image Encryption Using Chaos Based Techniques ». International Journal for Modern Trends in Science and Technology 7, no 05 (27 mai 2021) : 147–53. http://dx.doi.org/10.46501/ijmtst0705025.

Texte intégral
Résumé :
As the trading of information over the open systems and internet is quickly developing, security of the information turns into a major concern. One conceivable answer for this issue is to encode the information. Chaos has been generally utilized for image encryption for its diverse elements. There are numerous chaotic based encryption procedures for information concealing like validation, hashing, cryptography have been created and are in practice nowadays. This paper moreover investigates the properties of various mapping techniques that stretches out to the execution parameters utilized as a part of encryption forms. Every one of the strategies checked on appeared inside the most recent years and are observed to be valuable for the present day encryption applications. Every system is one of a kind in its own specific manner, which may be reasonable for various applications. Over the long haul, new encryption strategies are advancing. Hence, quick and secure traditional encryption systems will be required in applications requiring high rate of security.
Styles APA, Harvard, Vancouver, ISO, etc.
23

Parthasarathy, Rajamohan, Seow Soon Loong et Preethy Ayyappan. « An Efficient Encryption Implementation Using AES Algorithm Techniques ». Journal of Engineering & ; Technological Advances 3, no 1 (2018) : 61–70. http://dx.doi.org/10.35934/segi.v3i1.61.

Texte intégral
Résumé :
The AES algorithm is a symmetric block cipher that can encrypt, (encipher), and decrypt, (decipher), information. Encryption converts data to an unintelligible form called cipher-text. Decryption of the cipher-text converts the data back into its original form, which is called plaintext. The AES algorithm is capable of using cryptographic keys of 128, 192, and 256 bits to encrypt and decrypt data in blocks of 128 bits. The National Institute of Standards and Technology, (NIST), solicited proposals for the Advanced Encryption Standard, (AES). The AES is a Federal Information Processing Standard, (FIPS), which is a cryptographic algorithm that is used to protect electronic data. Advanced Encryption Standard (AES), specifying an Advanced Encryption Algorithm to replace the Data Encryption standard (DES) the Expired in 1998. NIST has solicited candidate algorithms for inclusion in AES, resulting in fifteen official candidate algorithms of which Rijndael was chosen as the Advanced Encryption Standard. Some of these implementations are optimized for speed, some for area, some for configurability, and some for low-power applications. This is carried out in the Cadence Tool with NC simvision software.
Styles APA, Harvard, Vancouver, ISO, etc.
24

Jameel, Enas Ali, et Sameera Abbas Fadhel. « Digital Image Encryption Techniques : Article Review ». Technium : Romanian Journal of Applied Sciences and Technology 4, no 2 (27 février 2022) : 24–35. http://dx.doi.org/10.47577/technium.v4i2.6026.

Texte intégral
Résumé :
In this age of the multi-media, images have an important impact on communication. When users upload images over an insecure communication network, total security is a difficult problem to address in order to maintain image confidentiality. Also, encryption is a technique for keeping images secret. This study gives a basic introduction to cryptography, as well as a concise overview regarding the many image encryption algorithms' elemental security criteria. This paper includes an overview of several image encryption approaches as well as a comparison of discrete image encoding techniques, before coming to a conclusion and recommending future research.
Styles APA, Harvard, Vancouver, ISO, etc.
25

Simkin, Mark G. « Using Spreadsheets to Teach Data Encryption Techniques ». AIS Educator Journal 1, no 1 (1 décembre 2006) : 27–37. http://dx.doi.org/10.3194/aise.2006.1.1.27.

Texte intégral
Résumé :
There are a variety of reasons why understanding encryption technology is likely to become increasingly important in the future, and therefore why accounting courses are likely to include encryption materials in future curricula. This paper discusses five encryption techniques: transposition ciphers, cyclic substitution ciphers, Vigenere ciphers, exclusive OR ciphers, and permutation ciphers. Accompanying these discussions are explanations of how instructors can demonstrate these techniques with spreadsheet models. The author's experiences with such models in classroom use have been uniformly positive.
Styles APA, Harvard, Vancouver, ISO, etc.
26

M, Sreekala, et Varghese Paul. « A Novel Hybrid Encryption Method for Multimedia Encryption Using Elliptic Curve Cryptography and TDMRC ». International Journal of Emerging Research in Management and Technology 6, no 7 (29 juin 2018) : 1. http://dx.doi.org/10.23956/ijermt.v6i7.178.

Texte intégral
Résumé :
We are in the era of digital revolution and the benefits are remarkable. People are much dependent on digital technology and can’t survive without it. With the advancement of Internet and its applications, we share a wide range of data including texts, images, audios and videos in a more extensive space and time scope that we never had before. This increases the need for security day by day. Cryptography is an art of Science that uses complex logic in order to design powerful encryption techniques. Both symmetric and asymmetric key encryptions have their own advantages. Time Dependant Multiple Random Cipher(TDMRC) code is one of the best symmetric encryption schemes. Elliptic curve cryptography(ECC) is widely used because of its less key size and faster key generation. This paper proposes a new method of hybrid encryption method using ECC and TDMRC.
Styles APA, Harvard, Vancouver, ISO, etc.
27

Al-Fayoumi, Mustafa A., Ammar Odeh, Ismail Keshta et Ashraf Ahmad. « Techniques of medical image encryption taxonomy ». Bulletin of Electrical Engineering and Informatics 11, no 4 (1 août 2022) : 1990–97. http://dx.doi.org/10.11591/eei.v11i4.3850.

Texte intégral
Résumé :
Medical images are one of the most significant and sensitive data types in computer systems. Sending medical images over the internet necessitates using a robust encryption scheme that is resistant to cryptographic attacks. Confidentiality is the most critical part of the three security objectives for information systems security, namely confidentiality, integrity, and availability. Confidentiality is the most critical aspect for the secure storage and transfer of medical images. In this study, we attempt to classify various encryption methods in order to assist researchers in selecting the optimal strategy for protecting sensitive patient information while transferring medical images without alteration and outline the measures that should be adopted to address challenges and concerns relevant to techniques of medical image encryption.
Styles APA, Harvard, Vancouver, ISO, etc.
28

Prashant, MD Sohail Haque, Amrinder Kaur et Pankaj Yadav. « Comparative Analysis of AES and RSA with Other Encryption Techniques for Secure Communication ». International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no 2 (19 avril 2024) : 565–74. http://dx.doi.org/10.32628/cseit2410263.

Texte intégral
Résumé :
In today’s digitized era, where the whole world is interconnected and every information about individuals are collected, it is important to process and store the data such that it is safe from unauthorized access. Encryption is used to turn the plain text into cipher text which makes the data unreadable, thus maintaining its confidentiality and integrity. Among the several encryption methods available, Advanced Encryption Standard (AES) and Rivest Shamir Adleman (RSA) are popularly used due to their effectiveness and efficiency. However, alternative encryption techniques exist, each offers different level of security and performance. This study presents a thorough comparative analysis of AES and RSA alongside other encryption methods to assess their suitability for secure communication. Factors such as encryption strength, computational complexity, key management, scalability, and versatility are examined to provide a comprehensive understanding of each technique's strengths and weaknesses. By scrutinizing these aspects, this research aims to offer insights for decision-makers in selecting the most suitable encryption method tailored to specific requirements and constraints.
Styles APA, Harvard, Vancouver, ISO, etc.
29

Abu Zitar, Raed, et Muhammed J. Al-Muhammed. « Hybrid encryption technique : Integrating the neural network with distortion techniques ». PLOS ONE 17, no 9 (28 septembre 2022) : e0274947. http://dx.doi.org/10.1371/journal.pone.0274947.

Texte intégral
Résumé :
This paper proposes a hybrid technique for data security. The computational model of the technique is grounded on both the non-linearity of neural network manipulations and the effective distortion operations. To accomplish this, a two-layer feedforward neural network is trained for each plaintext block. The first layer encodes the symbols of the input block, making the resulting ciphertext highly uncorrelated with the input block. The second layer reverses the impact of the first layer by generating weights that are used to restore the original plaintext block from the ciphered one. The distortion stage imposes further confusion on the ciphertext by applying a set of distortion and substitution operations whose functionality is fully controlled by random numbers generated by a key-based random number generator. This hybridization between these two stages (neural network stage and distortion stage) yields a very elusive technique that produces ciphertext with the maximum confusion. Furthermore, the proposed technique goes a step further by embedding a recurrent neural network that works in parallel with the first layer of the neural network to generate a digital signature for each input block. This signature is used to maintain the integrity of the block. The proposed method, therefore, not only ensures the confidentiality of the information but also equally maintains its integrity. The effectiveness of the proposed technique is proven through a set of rigorous randomness testing.
Styles APA, Harvard, Vancouver, ISO, etc.
30

Gosavi, Mr Abhijeet, Mr Sakib Shaikh, Mr Adnan Sayyed, Mr Somesh Sapa, Mr Ayan Shaikh et Prof A. A. Pund. « Enabling Encrypted Cloud Emails with Data Encryption using Advanced Encryption Techniques ». International Journal for Research in Applied Science and Engineering Technology 11, no 6 (30 juin 2023) : 864–69. http://dx.doi.org/10.22214/ijraset.2023.53709.

Texte intégral
Résumé :
Abstract: Cloud computing offers a flexible and convenient means of exchanging data, with several advantages for both society and individuals. With the widespread usage of cloud emails and frequent reports of large-scale email leakage occurrences, the security property known as forward secrecy has become desirable and necessary for both users and cloud email service providers to increase the security of cloud email systems. Typical techniques of attaining forward secrecy, such as Diffie-Hellman key exchange and forward-secure public-key encryption, have not been extensively authorized and used because they fail to meet the security and practicality requirements of email systems at the same time. We introduce a new cryptographic primitive called forward-secure puncturable identity-based encryption (fs-PIBE) in this paper to capture forward secrecy of encrypted cloud email systems without sacrificing practicability. It allows an email user to perform fine-grained decryption capacity revocation. In the standard model, we design a framework for encrypted cloud email systems and instantiate it with a concrete fs-PIBE structure that has constant ciphertext size and proved security. We enhance the proposed fs-PIBE scheme to provide end-to-end encryption and outsourced decryption, respectively, to improve the security and efficiency of the presented framework.
Styles APA, Harvard, Vancouver, ISO, etc.
31

Geetha, S., P. Punithavathi, A. Magnus Infanteena et S. Siva Sivatha Sindhu. « A Literature Review on Image Encryption Techniques ». International Journal of Information Security and Privacy 12, no 3 (juillet 2018) : 42–83. http://dx.doi.org/10.4018/ijisp.2018070104.

Texte intégral
Résumé :
Encryption is one of the techniques that ensure the security of images used in various domains like military intelligence, secure medical imaging services, intranet and internet communication, e-banking, social networking image communication like Facebook, WhatsApp, Twitter etc. All these images travel in a free and open network either during storage or communication; hence their security turns out to be a crucial necessity in the grounds of personal privacy and confidentiality. This article reviews and summarizes various image encryption techniques so as to promote development of advanced image encryption methods that facilitate increased versatility and security.
Styles APA, Harvard, Vancouver, ISO, etc.
32

Mark Espalmado, John, et Edwin Arboleda. « DARE Algorithm : A New Security Protocol by Integration of Different Cryptographic Techniques ». International Journal of Electrical and Computer Engineering (IJECE) 7, no 2 (1 avril 2017) : 1032. http://dx.doi.org/10.11591/ijece.v7i2.pp1032-1041.

Texte intégral
Résumé :
Exchange of information between computer networks requires a secure communications channel to prevent and monitor unauthorized access, modification and denial of the computer network. To address this growing problem, security experts sought ways to advance the integrity of data transmission. Security Attacks compromises the security and hence hybrid cryptographic algorithms have been proposed to achieve safe service in the proper manner, such as user authentication and data confidentiality. Data security and authenticity are achieved using these algorithms. Moreover, to improve the strength and cover each algorithm’s weaknesses, a new security algorithm can be designed using the combination of different cryptographic techniques. This design uses Digital Signature Algorithm (DSA) for authentic key generation, Data Encryption Standard (DES) for key scheduling, and Advanced Encryption Standard (AES) and Rivest–Schamir–Adleman Algorithm (RSA) in encrypting data. This new security algorithm has been proposed for improved security and integrity by integration of these cryptographic techniques.
Styles APA, Harvard, Vancouver, ISO, etc.
33

Chowdhary, Chiranji Lal, Pushpam Virenbhai Patel, Krupal Jaysukhbhai Kathrotia, Muhammad Attique, Kumaresan Perumal et Muhammad Fazal Ijaz. « Analytical Study of Hybrid Techniques for Image Encryption and Decryption ». Sensors 20, no 18 (10 septembre 2020) : 5162. http://dx.doi.org/10.3390/s20185162.

Texte intégral
Résumé :
The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption and decryption. This paper propose an analysis for performing image encryption and decryption by hybridization of Elliptic Curve Cryptography (ECC) with Hill Cipher (HC), ECC with Advanced Encryption Standard (AES) and ElGamal with Double Playfair Cipher (DPC). This analysis is based on the following parameters: (i) Encryption and decryption time, (ii) entropy of encrypted image, (iii) loss in intensity of the decrypted image, (iv) Peak Signal to Noise Ratio (PSNR), (v) Number of Pixels Change Rate (NPCR), and (vi) Unified Average Changing Intensity (UACI). The hybrid process involves the speed and ease of implementation from symmetric algorithms, as well as improved security from asymmetric algorithms. ECC and ElGamal cryptosystems provide asymmetric key cryptography, while HC, AES, and DPC are symmetric key algorithms. ECC with AES are perfect for remote or private communications with smaller image sizes based on the amount of time needed for encryption and decryption. The metric measurement with test cases finds that ECC and HC have a good overall solution for image encryption.
Styles APA, Harvard, Vancouver, ISO, etc.
34

Sridhar, B. « Performance Evaluation of Different Encryption Techniques ». Research Journal of Engineering and Technology 9, no 3 (2018) : 227. http://dx.doi.org/10.5958/2321-581x.2018.00031.4.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
35

Dhiman, Reema. « IMAGE ENCRYPTION TECHNIQUES : A LITERATURE REVIEW ». International Journal of Advanced Research in Computer Science 8, no 7 (20 août 2017) : 239–44. http://dx.doi.org/10.26483/ijarcs.v8i7.4209.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
36

Soofi, Aized Amin, M. Irfan Khan et Fazal-e. Amin. « Encryption Techniques for Cloud Data Confidentiality ». International Journal of Grid and Distributed Computing 7, no 4 (31 août 2014) : 11–20. http://dx.doi.org/10.14257/ijgdc.2014.7.4.02.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
37

M. Abdullah, Rozin, et Araz Rajab Abrahim. « Review of Image Encryption using Different Techniques ». Academic Journal of Nawroz University 11, no 3 (30 juin 2022) : 170–77. http://dx.doi.org/10.25007/ajnu.v11n3a1301.

Texte intégral
Résumé :
Encryption is one of the measures that ensure the security of images used in various fields such as military understanding, secure clinical imaging offices, Internet and intranet media, electronic banking, and individual association images such as Facebook, WhatsApp, Twitter, etc. On this huge number of images that are sent in a free and open link either during selection or messaging; Then their security ends up being a central need in individual insurance organizations and the arrangement. This article audits and summarizes various image encryption systems to further develop advanced image encryption strategies that operate with expanded flexibility and security.
Styles APA, Harvard, Vancouver, ISO, etc.
38

Viresh, Kasheenath Babaleshwar, Karade Sinchana, N. Sakshi et Naidu Anush. « Audio encryption and decryption using AES algorithm technique ». i-manager’s Journal on Electronics Engineering 14, no 2 (2024) : 8. http://dx.doi.org/10.26634/jele.14.2.20486.

Texte intégral
Résumé :
Audio cryptography is the practice of encrypting audio data to prevent illegal access to and listening to it. This paper presents an innovative technique of audio cryptography based on the Python computer language. To ensure secrecy and integrity, the suggested system encrypts and decrypts audio signals using advanced cryptographic techniques. A crucial component of AES, the cryptographic key is dynamically created to improve security. Python's broad library support and ease of use make it an ideal platform for implementing the AES algorithm, which ensures dependable and effective audio data encryption. The system utilizes Python's cryptography library for seamless integration and ease of implementation. Simulation results demonstrate the efficacy of the AES algorithm in securely encrypting and decrypting audio data with reduced noise compared to traditional methods.
Styles APA, Harvard, Vancouver, ISO, etc.
39

Azhari, Rama, et Agita Nisa Salsabila. « Analyzing the Impact of Quantum Computing on Current Encryption Techniques ». IAIC Transactions on Sustainable Digital Innovation (ITSDI) 5, no 2 (22 février 2024) : 148–57. http://dx.doi.org/10.34306/itsdi.v5i2.662.

Texte intégral
Résumé :
As the field of quantum computing progresses, the disruption to traditional encryption methods, which secure vast amounts of sensitive data, becomes an imminent threat, and conventional encryption techniques, primarily based on mathematical complexity, may no longer suffice in the era of quantum supremacy. This research systematically analyzes the vulnerabilities of current encryption standards in the face of advanced quantum computing capabilities, focusing specifically on widely-used cryptographic protocols such as RSA and AES, which are foundational to modern cybersecurity. Employing the SmartPLS method, the study models the interaction between quantum computing power and the robustness of existing encryption techniques, involving simulating quantum attacks on sample cryptographic algorithms to evaluate their quantum resistance. The findings reveal that quantum computing possesses the capacity to significantly compromise traditional encryption methods within the next few decades, with RSA encryption showing substantial vulnerabilities while AES requires considerably larger key sizes to maintain security. This study underscores the urgency for the development of quantum-resistant encryption techniques, critical to safeguarding future digital communication and data integrity, and advocates for a paradigm shift in cryptographic research and practice, emphasizing the need for 'quantum-proof' algorithms. It also contributes to the strategic planning for cybersecurity in the quantum age and provides a methodological framework using SmartPLS for further exploration into the impact of emerging technologies on existing security protocols.
Styles APA, Harvard, Vancouver, ISO, etc.
40

Gaurav Agarwal, Mohammed Shakeel, Akash Sanghi, YDS Arya,. « A Novel Security Model for Password Encryption Using Aadhaar and Amicable Number ». Tuijin Jishu/Journal of Propulsion Technology 44, no 4 (16 octobre 2023) : 1096–107. http://dx.doi.org/10.52783/tjjpt.v44.i4.981.

Texte intégral
Résumé :
In this day and age, data hacking has become a major source of fear. In order to avoid any further theft of data, we must stop this criminal hacking. Backups, encryption, access control, and other techniques are just a few that may be used to ensure data integrity. We did not combine the existing approaches when we announced our encryption process. The secret to encrypting user passwords is to utilize a mathematical calculation equation that is well-defined and a number conversion mechanism. Users must provide their password and Aadhaar number in order to register. Encrypted password has been recorded in the database. Every industry uses encryption to secure data, and there are many potential applications for it in the future.
Styles APA, Harvard, Vancouver, ISO, etc.
41

Dr. Gaurav Aggarwal, Mr. Hirdesh Sharma. « Comparative Analysis of Multi-Level Algorithm with Different Encryption and Decryption Security Algorithms ». Tuijin Jishu/Journal of Propulsion Technology 44, no 3 (5 octobre 2023) : 1640–48. http://dx.doi.org/10.52783/tjjpt.v44.i3.555.

Texte intégral
Résumé :
This research explores network data encryption and decryption strategies used in communication networks. The majority of network communication systems revolve around information sharing on mobile phones, networked PCs, and other internet-connected electronic devices. As information travels through several networks and is subject to numerous types of assaults, unsecure data can be read, altered, or faked by anybody with access to it. To defend against this form of assault, data encryption / decryption techniques are utilized. To illustrate the effects and evaluate the efficacy of each decoding and encryption method used in network technologies, Visual Basic simulation studies that encrypted and decrypt data were created, developed, and tested. Further study was for comparative analysis of Multi-Level Algorithm with different Security Algorithms for encrypting data approach.
Styles APA, Harvard, Vancouver, ISO, etc.
42

Wadho, Shuaib Ahmed, Areej Fatemah Meghji, Aun Yichiet, Roshan Kumar et Farhan Bashir Shaikh. « Encryption Techniques and Algorithms to Combat Cybersecurity Attacks : A Review ». VAWKUM Transactions on Computer Sciences 11, no 1 (30 juin 2023) : 295–305. http://dx.doi.org/10.21015/vtcs.v11i1.1521.

Texte intégral
Résumé :
The danger of cyber-attacks is constant in the current digital environment. The necessity for effective security actions are more crucial than ever before due to the increasingly complex nature of cybersecurity attacks. Using encryption approaches and algorithms is one of the best ways to secure more sensitive data from cyber-attacks. In order to effectively defend against cybersecurity assaults, this research study attempts to give an analysis of the function that encryption methods and approaches serve. We investigate various encryption algorithms and techniques, their advantages and disadvantages, and their applications. In addition, we investigate the difficulties of encryption and the potential solutions to these difficulties.
Styles APA, Harvard, Vancouver, ISO, etc.
43

Irwanto, Dola. « File Encryption and Decryption Using Algorithm Aes-128 Bit Based Website ». MALCOM : Indonesian Journal of Machine Learning and Computer Science 4, no 2 (1 avril 2024) : 670–77. http://dx.doi.org/10.57152/malcom.v4i2.1305.

Texte intégral
Résumé :
Digital data security has become very important in the current information era. One way to maintain data security is to use encryption and decryption techniques. The Advanced Encryption Standard (AES) algorithm has been proven effective in protecting data with a high level of security. This research aims to implement the AES-128 bit algorithm for online file encryption and decryption via a website. The method used in this research includes developing a website that provides a user interface for uploading and encrypting files, as well as for decrypting files that have been previously encrypted. The AES-128 bit algorithm is used to carry out the file encryption and decryption process. Users can choose their own encryption key or use a random key generated by the system. The result of this research is a website that can be used to efficiently secure sensitive files using the AES-128 bit algorithm. By using this website, users can easily encrypt the files they want to protect and also decrypt files that have been encrypted previously. The security of user data is guaranteed through the use of strong encryption algorithms and well-managed keys.
Styles APA, Harvard, Vancouver, ISO, etc.
44

Kannan, Rajesh, et Dr R. Mala. « Analysis of Encryption Techniques to Enhance Secure Data Transmission ». International Journal of Engineering and Computer Science 7, no 09 (9 septembre 2018) : 24311–18. http://dx.doi.org/10.18535/ijecs/v7i9.04.

Texte intégral
Résumé :
with the rapid increase of technology, the data stored and transmitted among the client and server has been increased tremendously. In order to provide high security for the confidential data, there is a need for proper encryption techniques that are to be followed by the concerns. This paper presents an analysis of the various encryption algorithms and their performance on handling the private data with authentication, access control, secure configuration and data encryption. Document oriented databases such as MongoDB, Cassandra, CouchDB, Redis and Hypertable are compared on the basis of their security aspects since they manipulate the huge amount of unstructured data in their databases. It is proposed that each database has its own security breaches and emphasises the need for proper encryption methods to secure the data stored in them.
Styles APA, Harvard, Vancouver, ISO, etc.
45

Garg, Monika, Karanvir Kaur et Simerpreet Kaur. « Using 3GPP- A Secure IDS for MANETs ». INTERNATIONAL JOURNAL OF COMPUTERS & ; TECHNOLOGY 4, no 2 (30 octobre 2005) : 518–21. http://dx.doi.org/10.24297/ijct.v4i2b2.3312.

Texte intégral
Résumé :
Mobile Ad hoc NETwork (MANET) is one of the important and unique applications. MANET does not require a fixednetwork infrastructure, every single node works as both a transmitter and a receiver. Nodes communicate directly witheach other when they are both within the same communication range else they can propagate message to neighbor nodesto pass the message. A new intrusion detection system named Enhanced Adaptive Acknowledgement (EAACK) speciallydesigned for MANETs. By the adoption of MRA scheme, EAACK is capable of detecting malicious nodes despite theexistence of false misbehavior report. The results will demonstrate positive performances against Watchdog, TWOACKand AACK in the cases of receiver collision, limited transmission power and false misbehavior report. EAACKdemonstrates higher malicious behavior detection rates in certain circumstances while does not greatly affect the networkperformances. EAACK is designed based on the Digital signature Algorithm (DSA) and RSA. Those techniques havedrawback due to network overhead. We need techniques for security like encryptions, hybrid encryption or sign encryptionto protect our message.
Styles APA, Harvard, Vancouver, ISO, etc.
46

Ibrahim, Dina, Kareem Ahmed, Mohamed Abdallah et AbdElmgeid A. Ali. « A New Chaotic-Based RGB Image Encryption Technique Using a Nonlinear Rotational 16 × 16 DNA Playfair Matrix ». Cryptography 6, no 2 (8 juin 2022) : 28. http://dx.doi.org/10.3390/cryptography6020028.

Texte intégral
Résumé :
Due to great interest in the secure storage and transmission of color images, the necessity for an efficient and robust RGB image encryption technique has grown. RGB image encryption ensures the confidentiality of color images during storage and transmission. In the literature, a large number of chaotic-based image encryption techniques have been proposed, but there is still a need for a robust, efficient and secure technique against different kinds of attacks. In this paper, a novel RGB image encryption technique is proposed for encrypting individual pixels of RGB images using chaotic systems and 16 rounds of DNA encoding, transpositions and substitutions. First, round keys are generated randomly using a logistic chaotic function. Then, these keys are used across different rounds to alter individual pixels using a nonlinear randomly generated 16×16 DNA Playfair matrix. Experimental results show the robustness of the proposed technique against most attacks while reducing the consumed time for encryption and decryption. The quantitative metrics show the ability of the proposed technique to maintain reference evaluation values while resisting statistical and differential attacks. The obtained horizontal, vertical and diagonal correlation is less than 0.01, and the NPCR and UACI are larger than 0.99 and 0.33, respectively. Finally, NIST analysis is presented to evaluate the randomness of the proposed technique.
Styles APA, Harvard, Vancouver, ISO, etc.
47

Shah, Jalpa, et JS Dhobi. « REVIEW OF IMAGE ENCRYPTION AND DECRYPTION TECHNIQUES FOR 2D IMAGES ». International Journal of Engineering Technologies and Management Research 5, no 1 (7 février 2020) : 81–84. http://dx.doi.org/10.29121/ijetmr.v5.i1.2018.49.

Texte intégral
Résumé :
In the emerging era of Internet, multimedia software and application security of images is of major concern. To offer security to these images encryption is the way for robust security. With Image Encryption it becomes difficult to analyze the image that is communicated over untrusted network. Also it provides security for any unauthorized access. The paper provides an introduction to cryptography and various image encryption techniques are reviewed for 2D images.
Styles APA, Harvard, Vancouver, ISO, etc.
48

Rabie, A., Kh El Shafie, A. Hammuoda et M. Rohiem. « Data ecryption based on multi-order FrFT, and FPGA implementation of DES algorith ». International Journal of Reconfigurable and Embedded Systems (IJRES) 9, no 2 (1 juillet 2020) : 141. http://dx.doi.org/10.11591/ijres.v9.i2.pp141-152.

Texte intégral
Résumé :
<span>Cryptography techniques need some algorithms for encryption of data. Most of available encryption techniques are used for textual data; a few of encryption methods are used for multimedia data; However, This Algorithms that are used for textual data may not be inefficient for multimedia, because it is size is greater than the text. Therefore, Cryptosystems need to find and develop a new encryption schemes for such data. The most popular symmetric key algorithms are Data Encryption Standard (DES). However, DES is may be not suitable for multimedia because it consumes times. Encryption and decryption of these data require different methods. In this paper a method for encryption/decryption data by using the nature of FrFT in signals analysis, based on multi-order Fractional Fourier Transform has been introduced. The security of the method used in the encryption work was taken into account to identify the different indicators to measure the security of the encryption Techniques. These indicators are: sensitivity proposed Techniques for the key, the complexity of the processes, and statistical analysis. The key is formed by combination of order of Fractional Fourier Transform. The encrypted data is obtained by the summation of different orders. Numerical simulation results are given to demonstrate this proposed method.</span>
Styles APA, Harvard, Vancouver, ISO, etc.
49

Et. al., K. S. Mohanasathiya,. « Security And Privacy Using Two Fold Encryption Protocol Techniques In Edge Computing ». Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no 10 (28 avril 2021) : 6025–34. http://dx.doi.org/10.17762/turcomat.v12i10.5427.

Texte intégral
Résumé :
With deployments of IoT devices and the arrival of 5G fast wireless, placing compute and analytics close to where data is created is making the case for edge computing. Edge computing is transforming the way data is being handled, processed, and delivered from millions of devices around the world. The explosive growth of internet-connected devices – the IoT – along with new applications that require real-time computing power, continues to drive edge-computing systems. Due to several advantages like low latency, Real-Time Availability. Real-time Data Transmission, brings Company and customer together, Edge Computing is used. To overcome several problems regarding security and privacy concerns, this paper provides solution by introducing Secured Two Fold Encryption Protocol in Edge Computing (STFC) based on two encryption schemes namely proxy re-encryption and searchable encryption. This paper particularly focus on securing the data from attackers by providing double encryption scheme. In this paper, Resource Manager is introduced in order to reduce the computational overhead in the encryption process.
Styles APA, Harvard, Vancouver, ISO, etc.
50

Fadhel, Sabah, Mohd Shafry et Omar Farook. « Chaos Image Encryption Methods : A Survey Study ». Bulletin of Electrical Engineering and Informatics 6, no 1 (1 mars 2017) : 99–104. http://dx.doi.org/10.11591/eei.v6i1.599.

Texte intégral
Résumé :
With increasing dependence on communications over internet and networks, secure data transmission is coming under threat. One of the best solutions to ensure secure data transmissions is encryption. Multiple forms of data, such as text, audio, image, and video can be digitally transmitted, nowadays images being the most popular and old encryption techniques such as: AES,DES,RSA etc., show low security level when used for image encryption. This problem was resolved by using of chaos encryption which is an acceptable form of encryption for image data. The sensitivity to initial conditions and control parameters make chaos encryption suitable for image applications. This study discusses various chaos encryption techniques.
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie