Добірка наукової літератури з теми "Decryption coding"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Decryption coding".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Decryption coding"
Gençoǧlu, Muharrem Tuncay, and Mehmet Vural. "Image Coding Using Laplace Transform." ITM Web of Conferences 22 (2018): 01010. http://dx.doi.org/10.1051/itmconf/20182201010.
Повний текст джерелаShahare, Kajal G., and Prof Jayant Adhikari. "A Survey Paper Based On Image Encryption and Decryption Technique." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (May 31, 2022): 994–1000. http://dx.doi.org/10.22214/ijraset.2022.42262.
Повний текст джерелаLi, Qi, Xiangfeng Meng, Yongkai Yin, and Huazheng Wu. "A Multi-Image Encryption Based on Sinusoidal Coding Frequency Multiplexing and Deep Learning." Sensors 21, no. 18 (September 15, 2021): 6178. http://dx.doi.org/10.3390/s21186178.
Повний текст джерелаSun, Dechao, Hong Huang, Dongsong Zheng, Haoliang Hu, Chunyue Bi, and Renfang Wang. "Face Security Authentication System Based on Deep Learning and Homomorphic Encryption." Security and Communication Networks 2022 (April 27, 2022): 1–8. http://dx.doi.org/10.1155/2022/7752292.
Повний текст джерелаMahalakshmi, M. "Cryptographic Algorithm Based on Prime Assignment." International Journal for Research in Applied Science and Engineering Technology 10, no. 1 (January 31, 2022): 1744–51. http://dx.doi.org/10.22214/ijraset.2022.40138.
Повний текст джерелаWang, Bin, Yingjie Xie, Shihua Zhou, Xuedong Zheng, and Changjun Zhou. "Correcting Errors in Image Encryption Based on DNA Coding." Molecules 23, no. 8 (July 27, 2018): 1878. http://dx.doi.org/10.3390/molecules23081878.
Повний текст джерелаOhtsubo, Junji, and Ayano Fujimoto. "Practical image encryption and decryption by phase-coding technique for optical security systems." Applied Optics 41, no. 23 (August 10, 2002): 4848. http://dx.doi.org/10.1364/ao.41.004848.
Повний текст джерелаMihaljević, Miodrag J. "A Security Enhanced Encryption Scheme and Evaluation of Its Cryptographic Security." Entropy 21, no. 7 (July 17, 2019): 701. http://dx.doi.org/10.3390/e21070701.
Повний текст джерелаZhao, Min, Yan Xing, Xiao-Wei Li, and Qiong-Hua Wang. "Two-Step Integral Imaging Coding Based Three-Dimensional Information Encryption Approach." Security and Communication Networks 2018 (2018): 1–9. http://dx.doi.org/10.1155/2018/2658318.
Повний текст джерелаAnusha, R., C. Nithya, R. Venketeswara Pai, and V. Ramanathan. "Coding the Encoded:Automatic Decryption of kaTapayAdi and Aryabhata's Systems of Numeration." Current Science 112, no. 03 (February 10, 2017): 588. http://dx.doi.org/10.18520/cs/v112/i03/588-591.
Повний текст джерелаДисертації з теми "Decryption coding"
陳宜妙. "A video encryption and decryption technique using variable length coding and randomized bit-insertion." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/02682408071006153021.
Повний текст джерела國立交通大學
電子工程系
91
In this paper, we propose a new video encryption algorithm, which is based on the encryption scheme proposed by Huang and Wang in 2001. In Huang’s approach, the encryption operation is fulfilled via the modification of VLC tables. Based on this encryption scheme, we made a few modifications to greatly enhance its security level. The modifications include the use of randomized bit-insertion and bit-flipping to complicate the statistics of ciphertexts and the use of RLC (run-length coding) disarrangement to increase the difficulty in cryptanalysis. This algorithm can be easily employed over an MPEG-4 codec to achieve real-time encryption. The security levels of this proposed algorithm against various types of attacks are also discussed. Moreover, the encrypted data have about the same level of noise sensitivity as the original MPEG-4 bit-stream.
Бараннік, Волод Віктор, А. В. Хаханова, and С. Шульгін. "Model Of Syntactic Representation Of Aerophoto Images Segments." Thesis, 2018. http://openarchive.nure.ua/handle/document/5879.
Повний текст джерелаЧастини книг з теми "Decryption coding"
Mu, Yi, Vijay Varadharajan, and Khan Quac Nguyen. "Delegated Decryption." In Cryptography and Coding, 258–69. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-46665-7_30.
Повний текст джерелаArmour, Marcel, and Bertram Poettering. "Subverting Decryption in AEAD." In Cryptography and Coding, 22–41. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-35199-1_2.
Повний текст джерелаBarwell, Guy, Daniel Page, and Martijn Stam. "Rogue Decryption Failures: Reconciling AE Robustness Notions." In Cryptography and Coding, 94–111. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-27239-9_6.
Повний текст джерелаKim, Seungjoo, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, and Yuliang Zheng. "Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation)." In Cryptography and Coding, 114–27. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45325-3_11.
Повний текст джерела"A difficulty in Rabin decryption is that the correct plaintext must be identified." In Coding Theory and Cryptography, 310. CRC Press, 2000. http://dx.doi.org/10.1201/b16944-143.
Повний текст джерелаHelal Ahmed, Md, Jagmohan Tanti, and Sumant Pushp. "A Public Key Cryptosystem Using Cyclotomic Matrices." In Coding Theory - Recent Advances, New Perspectives and Applications [Working Title]. IntechOpen, 2021. http://dx.doi.org/10.5772/intechopen.101105.
Повний текст джерелаТези доповідей конференцій з теми "Decryption coding"
Ruchkin, V., G. Soldatov, V. Fulin, B. Kostrov, and E. Ruchkina. "Macros for Coding Information Encryption & Decryption in Trusted Platform Module." In 2020 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon). IEEE, 2020. http://dx.doi.org/10.1109/fareastcon50210.2020.9271523.
Повний текст джерелаRouvroy, G., F. X. Standaert, J. J. Quisquater, and J. D. Legat. "Compact and efficient encryption/decryption module for FPGA implementation of the AES Rijndael very well suited for small embedded applications." In International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004. IEEE, 2004. http://dx.doi.org/10.1109/itcc.2004.1286716.
Повний текст джерела