Showing 241 - 260 results of 271 for search '(image OR images) encryption algorithm', query time: 0.14s Refine Results
  1. 241

    Algoritma Enkripsi Dan Embedding Citra Digital Menggunakan Logistic Map-3 Dan Least Siginificant BIT by Edi Sukirman, Suryadi MT, Rindang R Pratiwi

    Published 2025-06-01
    “…Digital images that have been encrypted (coded) so that they produce invisible images (blurry or messy images). …”
    Get full text
    Article
  2. 242

    Adaptive Steganography Using Improve Bit-plane Complexity Segmentation by Noor Gassan Abdullah, Shahd Abdulrhman Hasso

    Published 2024-06-01
    “…The goal of content-adaptive steganography is to conceal data inside the image's intricate texture. This research introduces an improved algorithm for concealing messages within color images. …”
    Get full text
    Article
  3. 243

    Acousto-optic cryptosystem based on dynamic DNA encoding and hyperchaotic system in gyrator domains by Gege Sun, Wenbo Song, Miao Tian, Zhengjun Liu, Hang Chen

    Published 2025-05-01
    “…Subsequently, employing an Acousto-optic modulation algorithm, audio information is fitted into image information and serves as part of the encryption system key, significantly enhancing the correlation between the key and the user. …”
    Get full text
    Article
  4. 244

    Generalized Fractional Order Complex Lorenz System-Based Dual Layer Security Enhancement Approach by K. Meera, N. Selvaganesan

    Published 2025-01-01
    “…A two layer enhanced security approach that combines cryptography and steganography is introduced, which includes 1) encryption of satellite image using advanced encryption standard algorithm with hashed key and 2) embedding the encrypted image using the least significant bit, discrete wavelet transform and spread spectrum based steganography to strengthen the security. …”
    Get full text
    Article
  5. 245

    Privacy-preserved data hiding using compressive sensing and fuzzy C-means clustering by Ming Li, Lanlan Wang, Haiju Fan

    Published 2020-02-01
    “…The original image is preprocessed first to generate multiple highly correlated classes with fuzzy C-means clustering algorithm. …”
    Get full text
    Article
  6. 246

    A Framework of Secured Embedding Scheme Using Vector Discrete Wavelet Transformation and Lagrange Interpolation by Maheswari Subramanian, Reeba Korah

    Published 2018-01-01
    “…The proposed work uses a steganographic scheme for useful information with the help of human skin tone regions as cover image. The proposed algorithm has undergone Lagrange interpolation encryption for enhancement of the security of the hidden information. …”
    Get full text
    Article
  7. 247

    An Exponentially Delayed Feedback Chaotic Model Resistant to Dynamic Degradation and Its Application by Bocheng Liu, Jian Song, Niande Jiang, Zhuo Wang

    Published 2025-07-01
    “…At the same time, in order to verify the practicality of the method, an image encryption algorithm is designed, and its security analysis results show that the algorithm has a high level of security and can compete with other encryption schemes. …”
    Get full text
    Article
  8. 248

    A Combination of SHA-256 and DES for Visual Data Protection by Aristides Bima Wintaka, Christy Atika Sari, Eko Hari Rachmawanto, Rabei Raad Ali

    Published 2025-05-01
    “…This study employs SHA-256 and DES algorithms to safeguard visual data through encryption and decryption processes. …”
    Get full text
    Article
  9. 249

    Adaptive Multi-Switching Synchronization of High-Order Memristor-Based Hyperchaotic System with Unknown Parameters and Its Application in Secure Communication by Zhili Xiong, Shaocheng Qu, Jing Luo

    Published 2019-01-01
    “…Finally, the proposed algorithm applied in secure communication of masking encryption and image encryption is validated by statistical analysis.…”
    Get full text
    Article
  10. 250

    Hide Compressed Texts in an Audio File by Shahad Hasso

    Published 2013-03-01
    “…Steganography art is a technique of hiding data within data, as hiding text message within an image or an audio file or a video file, it is a new method used as a substitute for the known encryption technology. …”
    Get full text
    Article
  11. 251

    Analisis Pengaruh Citra Terhadap Kombinasi Kriptografi RSA dan STEGANOGRAFi LSB by Agus Rakhmadi Mido, Erik Iman Heri Ujianto

    Published 2022-02-01
    “…The analysis of an algorithmic combination in this research includes analysis of variable influence image of the encryption and decryption process. …”
    Get full text
    Article
  12. 252

    Securing Communication Channels: An Advanced Steganography Approach With Orthogonal Frequency Division Multiplexing (OFDM) by Ammar Mohammedali Fadhil, Ali Y. Jaber

    Published 2025-01-01
    “…The proposed system uses advanced algorithms to modify the size and phase of the OFDM subcarriers and hide secret information within the transmitted signal by segmenting the image hierarchically into small segments, arranging them randomly, and embedding secret message in a random order to the image pixels to increase data security. …”
    Get full text
    Article
  13. 253

    A fast secure and more reliable underwater communication system based on light fidelity technology by M. Sami Ataa, Eman E. Sanad

    Published 2025-04-01
    “…Security is reinforced using the Advanced Encryption Standard and reliability is ensured through the Cyclic Redundancy Check algorithm. …”
    Get full text
    Article
  14. 254

    An Efficient Cryptosystem for Video Surveillance in the Internet of Things Environment by Rafik Hamza, Alzubair Hassan, Teng Huang, Lishan Ke, Hongyang Yan

    Published 2019-01-01
    “…Finally, the proposed framework performs an efficient image encryption algorithm by employing a discrete fractional random transform (DFRT). …”
    Get full text
    Article
  15. 255

    Modified SPECK (M-SPECK) Lightweight Cipher Architecture for Resource-Constrained Applications by R. Mohanapriya, V. Nithish Kumar

    Published 2025-01-01
    “…The major challenge of IoT is providing data security with a low-complexity cryptography algorithm. However, traditional encryption algorithms are unsuitable for IoT applications due to their high complexity, whereas lightweight block ciphers have become promising solutions for resource-constrained applications. …”
    Get full text
    Article
  16. 256

    Computationally secure steganography based on speech synthesis by Menghan LI, Kejiang CHEN, Weiming ZHANG, Nenghai YU

    Published 2022-06-01
    “…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
    Get full text
    Article
  17. 257
  18. 258

    Development of biometric systems for passenger identification based on noise-resistant coding means by A. A. Gladkikh, A. K. Volkov, T. G. Ulasyuk

    Published 2021-04-01
    “…The problems are characterized by the possibility of biometric images compromise, which can potentially lead to the loss of their confidentiality and the impossibility of their further usage for personal identification. …”
    Get full text
    Article
  19. 259

    Blockchain and Bigdata to Secure Data Using Hash and Salt Techniques by AlSelami Fudhah A.

    Published 2022-04-01
    “…Let’s try to secure the data even more using encryption algorithms to make sure that proper data is used for analysis etc.…”
    Get full text
    Article
  20. 260

    On the implementation of a secured watermarking mechanism based on cryptography and bit pairs matching by Sanjeev Narayan Bal, Manas Ranjan Nayak, Subir Kumar Sarkar

    Published 2021-06-01
    “…The pixel bits are represented in pairs following the proposed algorithm, then the encrypted watermark pixel bit pairs are compared with all bit pairs of original image and accordingly the replacement of bit pairs takes place with the respective matched pair assigned number binary equivalent. …”
    Get full text
    Article