Статті в журналах з теми "Decryption coding"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Decryption coding".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Gençoǧlu, Muharrem Tuncay, and Mehmet Vural. "Image Coding Using Laplace Transform." ITM Web of Conferences 22 (2018): 01010. http://dx.doi.org/10.1051/itmconf/20182201010.
Повний текст джерелаShahare, Kajal G., and Prof Jayant Adhikari. "A Survey Paper Based On Image Encryption and Decryption Technique." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (May 31, 2022): 994–1000. http://dx.doi.org/10.22214/ijraset.2022.42262.
Повний текст джерелаLi, Qi, Xiangfeng Meng, Yongkai Yin, and Huazheng Wu. "A Multi-Image Encryption Based on Sinusoidal Coding Frequency Multiplexing and Deep Learning." Sensors 21, no. 18 (September 15, 2021): 6178. http://dx.doi.org/10.3390/s21186178.
Повний текст джерелаSun, Dechao, Hong Huang, Dongsong Zheng, Haoliang Hu, Chunyue Bi, and Renfang Wang. "Face Security Authentication System Based on Deep Learning and Homomorphic Encryption." Security and Communication Networks 2022 (April 27, 2022): 1–8. http://dx.doi.org/10.1155/2022/7752292.
Повний текст джерелаMahalakshmi, M. "Cryptographic Algorithm Based on Prime Assignment." International Journal for Research in Applied Science and Engineering Technology 10, no. 1 (January 31, 2022): 1744–51. http://dx.doi.org/10.22214/ijraset.2022.40138.
Повний текст джерелаWang, Bin, Yingjie Xie, Shihua Zhou, Xuedong Zheng, and Changjun Zhou. "Correcting Errors in Image Encryption Based on DNA Coding." Molecules 23, no. 8 (July 27, 2018): 1878. http://dx.doi.org/10.3390/molecules23081878.
Повний текст джерелаOhtsubo, Junji, and Ayano Fujimoto. "Practical image encryption and decryption by phase-coding technique for optical security systems." Applied Optics 41, no. 23 (August 10, 2002): 4848. http://dx.doi.org/10.1364/ao.41.004848.
Повний текст джерелаMihaljević, Miodrag J. "A Security Enhanced Encryption Scheme and Evaluation of Its Cryptographic Security." Entropy 21, no. 7 (July 17, 2019): 701. http://dx.doi.org/10.3390/e21070701.
Повний текст джерелаZhao, Min, Yan Xing, Xiao-Wei Li, and Qiong-Hua Wang. "Two-Step Integral Imaging Coding Based Three-Dimensional Information Encryption Approach." Security and Communication Networks 2018 (2018): 1–9. http://dx.doi.org/10.1155/2018/2658318.
Повний текст джерелаAnusha, R., C. Nithya, R. Venketeswara Pai, and V. Ramanathan. "Coding the Encoded:Automatic Decryption of kaTapayAdi and Aryabhata's Systems of Numeration." Current Science 112, no. 03 (February 10, 2017): 588. http://dx.doi.org/10.18520/cs/v112/i03/588-591.
Повний текст джерелаYang, Xin, and Hongbo Zhang. "Encryption of 3D Point Cloud Object with Deformed Fringe." Advances in Optical Technologies 2016 (February 15, 2016): 1–9. http://dx.doi.org/10.1155/2016/4601462.
Повний текст джерелаVasantha, R., and R. Satya Prasad. "An identity encryption cloud scheme based on SMTP using advanced blow fish algorithm." International Journal of Engineering & Technology 7, no. 1.5 (December 31, 2017): 191. http://dx.doi.org/10.14419/ijet.v7i1.5.9145.
Повний текст джерелаKumari, U. V. Ratna, Santosh Pokhrel, and Hyndavi Anusha Anche. "Blowfish Algorithm-Securing the Future." Journal of Advance Research in Electrical & Electronics Engineering (ISSN: 2208-2395) 2, no. 4 (April 30, 2015): 01–09. http://dx.doi.org/10.53555/nneee.v2i4.202.
Повний текст джерелаSantoso, Kiswara Agung, Ahmad Kamsyakawuni, and Muhammad Seggaf. "MEDICAL IMAGE ENCRYPTION USING DNA ENCODING AND MODIFIED CIRCULAR SHIFT." BAREKENG: Jurnal Ilmu Matematika dan Terapan 16, no. 1 (March 21, 2022): 235–42. http://dx.doi.org/10.30598/barekengvol16iss1pp233-240.
Повний текст джерелаKöhler, Mirko, Ivica Lukić, and Višnja Križanović Čik. "Protecting Information with Subcodstanography." Security and Communication Networks 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/9130683.
Повний текст джерелаKLOTS, Yurii, and Luda KORETSKA. "METHOD OF DATA TRANSMISSION PROTECTION IN CYBERPHYSICAL SYSTEMS." Herald of Khmelnytskyi National University 303, no. 6 (December 2021): 106–10. http://dx.doi.org/10.31891/2307-5732-2021-303-6-106-110.
Повний текст джерелаZhu, Shuqin, and Congxu Zhu. "Secure Image Encryption Algorithm Based on Hyperchaos and Dynamic DNA Coding." Entropy 22, no. 7 (July 15, 2020): 772. http://dx.doi.org/10.3390/e22070772.
Повний текст джерелаFujita, Hachiro. "Quantum McEliece public-key cryptosystem." Quantum Information and Computation 12, no. 3&4 (March 2012): 181–203. http://dx.doi.org/10.26421/qic12.3-4-1.
Повний текст джерелаDömösi, Pál, Carolin Hannusch, and Géza Horváth. "A Cryptographic System Based on a New Class of Binary Error-Correcting Codes." Tatra Mountains Mathematical Publications 73, no. 1 (August 1, 2019): 83–96. http://dx.doi.org/10.2478/tmmp-2019-0007.
Повний текст джерелаZaz, Youssef, Lhoussain El Fadil, and Mohamed El Kayyali. "Securing EPR Data Using Cryptography and Image Watermarking." International Journal of Mobile Computing and Multimedia Communications 4, no. 2 (April 2012): 76–87. http://dx.doi.org/10.4018/jmcmc.2012040106.
Повний текст джерелаKhan, Ali, Qifu Tyler Sun, Zahid Mahmood, and Ata Ullah Ghafoor. "Energy Efficient Partial Permutation Encryption on Network Coded MANETs." Journal of Electrical and Computer Engineering 2017 (2017): 1–10. http://dx.doi.org/10.1155/2017/4657831.
Повний текст джерелаAl-Khateeb, Zeena N., and Melad Jader. "Encryption and hiding text using DNA coding and hyperchaotic system." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 2 (August 1, 2020): 766. http://dx.doi.org/10.11591/ijeecs.v19.i2.pp766-774.
Повний текст джерелаGünlü, Onur, and Rafael Schaefer. "An Optimality Summary: Secret Key Agreement with Physical Unclonable Functions." Entropy 23, no. 1 (December 24, 2020): 16. http://dx.doi.org/10.3390/e23010016.
Повний текст джерелаXu, Fa-Feng, Zhong-Liang Gong, Yu-Wu Zhong, Jiannian Yao, and Yong Sheng Zhao. "Wavelength-Tunable Single-Mode Microlasers Based on Photoresponsive Pitch Modulation of Liquid Crystals for Information Encryption." Research 2020 (December 2, 2020): 1–9. http://dx.doi.org/10.34133/2020/6539431.
Повний текст джерелаLi, Xiaofeng, Yulong Bai, Weishuan Pan, Di Wang, and Yong-Jie Ma. "Development of a Family of Chaotic Systems with Infinite Equilibria and Its Application for Image Encryption." Complexity 2022 (March 30, 2022): 1–18. http://dx.doi.org/10.1155/2022/1250489.
Повний текст джерелаAdithya B. and Santhi G. "DNA Cryptography Using DNA Fragment Assembly and Fragment Key Expansion for Genomic Data." International Journal of Organizational and Collective Intelligence 12, no. 2 (April 2022): 1–19. http://dx.doi.org/10.4018/ijoci.286173.
Повний текст джерелаFerrari, Silvia, and Maurizio Pesce. "Cell-Based Mechanosensation, Epigenetics, and Non-Coding RNAs in Progression of Cardiac Fibrosis." International Journal of Molecular Sciences 21, no. 1 (December 19, 2019): 28. http://dx.doi.org/10.3390/ijms21010028.
Повний текст джерелаLiu, Jingang, Yongge Wang, Zongxiang Yi, and Zhiqiang Lin. "polarRLCE: A New Code-Based Cryptosystem Using Polar Codes." Security and Communication Networks 2019 (December 26, 2019): 1–10. http://dx.doi.org/10.1155/2019/3086975.
Повний текст джерелаAbu Taha, Mohammed, Wassim Hamidouche, Naty Sidaty, Marko Viitanen, Jarno Vanne, Safwan El Assad, and Olivier Deforges. "Privacy Protection in Real Time HEVC Standard Using Chaotic System." Cryptography 4, no. 2 (June 24, 2020): 18. http://dx.doi.org/10.3390/cryptography4020018.
Повний текст джерелаChang, Yao Tang, and Chung Wei Tsailin. "Enhanced Design for AWG-Based Dynamic Reconfigurable Free-Spectral-Range Group Hopping Coder/Decoders to Protect against Eavesdropping." Applied Mechanics and Materials 764-765 (May 2015): 1240–44. http://dx.doi.org/10.4028/www.scientific.net/amm.764-765.1240.
Повний текст джерелаKhalaf, Rifaat Zaidan, and Alharith Abdulkareem Abdullah. "Novel Quantum Encryption Algorithm Based on Multiqubit Quantum Shift Register and Hill Cipher." Advances in High Energy Physics 2014 (2014): 1–5. http://dx.doi.org/10.1155/2014/104325.
Повний текст джерелаGulen, Utku, Abdelrahman Alkhodary, and Selcuk Baktir. "Implementing RSA for Wireless Sensor Nodes." Sensors 19, no. 13 (June 27, 2019): 2864. http://dx.doi.org/10.3390/s19132864.
Повний текст джерелаWang, Jiabo, and Cong Ling. "How to Construct Polar Codes for Ring-LWE-Based Public Key Encryption." Entropy 23, no. 8 (July 23, 2021): 938. http://dx.doi.org/10.3390/e23080938.
Повний текст джерелаLotfi, Mehdi, Hossein Kheiri, and Azizeh Jabbari. "Provide a New Encryption Algorithm for Medical Images and Evaluate the Proposed Algorithm." Frontiers in Health Informatics 8, no. 1 (January 30, 2019): 2. http://dx.doi.org/10.30699/fhi.v8i1.155.
Повний текст джерелаA. Aljazaery, Ibtisam, Haider Th Salim Alrikabi, and Abdul Hadi M. Alaidi. "Encryption of Color Image Based on DNA Strand and Exponential Factor." International Journal of Online and Biomedical Engineering (iJOE) 18, no. 03 (March 8, 2022): 101–13. http://dx.doi.org/10.3991/ijoe.v18i03.28021.
Повний текст джерелаBarannik, Vladimir, Serhii Sidchenko, Natalia Barannik, and Valeriy Barannik. "Development of the method for encoding service data in cryptocompression image representation systems." Eastern-European Journal of Enterprise Technologies 3, no. 9(111) (June 30, 2021): 103–15. http://dx.doi.org/10.15587/1729-4061.2021.235521.
Повний текст джерелаКрасноруцкий, Андрей Александрович, Сергей Сергеевич Шульгин, Анна Владимировна Хаханова та Дмитрий Владимирович Баранник. "МЕТОД ОПРЕДЕЛЕНИЯ СИЛЬНО ИНФОРМАТИВНЫХ СЕГМЕНТОВ АЭРОФОТОСНИМКА". RADIOELECTRONIC AND COMPUTER SYSTEMS, № 1 (23 лютого 2018): 15–22. http://dx.doi.org/10.32620/reks.2018.1.02.
Повний текст джерелаJie, Xia, and Rui Jun Jing. "On-Line Decrypting: A Homomorphic Realization for Network Coding." Applied Mechanics and Materials 543-547 (March 2014): 2728–32. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.2728.
Повний текст джерелаBogolubov, Anatoli F. "Bring us deliverance, spy! (interpretations of The Spies’ March by Kipling in time of the Media War and Pandemic)." NSU Vestnik. Series: Linguistics and Intercultural Communication 18, no. 2 (2020): 132–53. http://dx.doi.org/10.25205/1818-7935-2020-18-2-132-153.
Повний текст джерела"Image Encryption and Decryption using RSA Algorithm with Share Creation Techniques." International Journal of Recent Technology and Engineering 8, no. 4 (December 30, 2019): 2797–800. http://dx.doi.org/10.35940/ijeat.b4021.129219.
Повний текст джерела"A Unified Framework for Encryption and Decryption of Images Based on Autoencoder (UFED)." International Journal of Advanced Trends in Computer Science and Engineering 10, no. 3 (June 7, 2021): 1813–20. http://dx.doi.org/10.30534/ijatcse/2021/451032021.
Повний текст джерела"Ciphering and Deciphering Messages by Graph Labeling Techniques Through Multilevel Cryptosystem." International Journal of Recent Technology and Engineering 8, no. 4S5 (February 5, 2020): 33–39. http://dx.doi.org/10.35940/ijrte.d1013.1284s519.
Повний текст джерелаGeorge, Loay E., Enas Kh Hassan, Sajaa G. Mohammed, and Faisel G. Mohammed. "Selective Image Encryption Based on DCT, Hybrid Shift Coding and Randomly Generated Secret Key." Iraqi Journal of Science, April 26, 2020, 920–35. http://dx.doi.org/10.24996/ijs.2020.61.4.25.
Повний текст джерелаVaidya, Gayatri, Mohammad Chand Jamali, Snehlata Katheria, and Juan Carlos Cotrina-Aliaga. "Decryption of DNA and Its Role in Treating Genetic Disorder at Early Stage." Journal of Pharmaceutical Research International, March 23, 2022, 59–69. http://dx.doi.org/10.9734/jpri/2022/v34i26b35984.
Повний текст джерелаDutta, Pinky Saikia, and Sauvik Chakraborty. "Image based Steganography in Cryptography implementing different Encryption-Decryption Algorithm." International Journal of Scientific Research in Computer Science, Engineering and Information Technology, July 10, 2020, 745–48. http://dx.doi.org/10.32628/cseit2063191.
Повний текст джерелаSingh, Khoirom Motilal, Laiphrakpam Dolendro Singh, and Themrichon Tuithung. "Text Encryption based on Huffman Coding and ElGamal Cryptosystem." Recent Patents on Engineering 14 (September 17, 2020). http://dx.doi.org/10.2174/1872212114999200917144000.
Повний текст джерелаSiahaan, Fitri Angelina. "IMPLEMENTASI ALGORITMA UNARY CODING UNTUK MENGKOMPRESI TEKS TERENKRIPSI EL GAMAL." JURNAL MEDIA INFORMATIKA BUDIDARMA 2, no. 1 (January 27, 2018). http://dx.doi.org/10.30865/mib.v2i1.994.
Повний текст джерела"Advanced Encryption Standard for Data Encryption using EDK Environment in FPGA." International Journal of Recent Technology and Engineering 8, no. 4 (November 30, 2019): 11969–72. http://dx.doi.org/10.35940/ijrte.d9920.118419.
Повний текст джерела"Scalar Multiplication via Elliptic Net using Generalized Equivalent Sequences." International Journal of Engineering and Advanced Technology 9, no. 1 (October 30, 2019): 7188–92. http://dx.doi.org/10.35940/ijeat.a2007.109119.
Повний текст джерелаLI, XU, FARIS KATEB, and SHAOFEI WU. "ADOPTION OF FRACTIONAL DIFFERENTIAL EQUATIONS UNDER IMPROVED VARIATIONAL ITERATIVE ALGORITHM COMBINED WITH DNA CODING ALGORITHM IN IMAGE ENCRYPTION." Fractals 30, no. 02 (February 14, 2022). http://dx.doi.org/10.1142/s0218348x2240062x.
Повний текст джерела