Showing 261 - 271 results of 271 for search '(image OR images) encryption algorithm', query time: 0.10s Refine Results
  1. 261

    Key Generation and Testing Based on Biometrics by Alaa AbdulRaheeM, shahd Abdulrhman Hasso

    Published 2024-06-01
    “…In this research, the key generation process was created by converting biometrics (the iris) into a digital representation (a set of binary numbers from the two iris) that can be used in the encryption process. This is done by using digital image processing algorithms to extract unique features from the two irises. …”
    Get full text
    Article
  2. 262

    Biometric cryptosystem to secure smart object communications in the internet of things by Abdallah Meraoumia, Mohamed Amroune, Lakhadr Laimeche, Hakiml Bendjenna

    Published 2022-03-01
    “…Subsequently, the user message is encrypted using the AES algorithm, whereas the user template is encrypted by a proposed algorithm. …”
    Get full text
    Article
  3. 263

    Artificial Noise Physical Layer Security for V2X Joint Radar Communication Systems-Based OTFS Waveform by Abdelrahman Abushattal, Ayhan Yazgan

    Published 2025-01-01
    “…The secrecy capacity, average bit-error rate (BER), time complexity, and execution time results present the performance of the proposed AN scheme and its ability to protect legitimate users’ information in a promising manner while providing the radar user with sufficient quality of service (QoS), where the proposed approach provides a secrecy capacity level up to 7 nats/symbol with an execution time that is 42 times faster than the Advanced Encryption Standard (AES) and 6.4 thousand times better than Rivest-Shamir-Adleman (RSA) cryptographic algorithms.…”
    Get full text
    Article
  4. 264

    New <i>μ</i>-Synchronization Criteria for Nonlinear Drive–Response Complex Networks with Uncertain Inner Couplings and Variable Delays of Unknown Bounds by Anran Zhou, Chongming Yang, Chengbo Yi, Hongguang Fan

    Published 2025-02-01
    “…Moreover, numerical experiments and image encryption algorithms are carried out to verify our theoretical results’ effectiveness.…”
    Get full text
    Article
  5. 265

    Research on airport baggage anomaly retention detection technology based on machine vision, edge computing, and blockchain by Yuzhou Chen, Gang Mao, Xue Yang, Mingqian Du, Hongqing Song

    Published 2024-12-01
    “…To address this challenge, this paper proposes a real‐time detection and alerting of luggage anomaly retention based on the YOLOv5 object detection model, leveraging visual algorithms. By eliminating cloud servers and deploying multiple edge servers to establish a private chain, images of anomalously retained luggage are encrypted and stored on the chain. …”
    Get full text
    Article
  6. 266

    Steganography in IoT: A Comprehensive Survey on Approaches, Challenges, and Future Directions by Maha Driss, Lamia Berriche, Safa Ben Atitallah, Siwar Rekik

    Published 2025-01-01
    “…While effective, traditional encryption techniques are often computationally expensive and easily identifiable, making them unsuitable for many IoT applications. …”
    Get full text
    Article
  7. 267

    Analysis of Communication Compression and Transmission in a Multimedia and Internet of Things Environment Integrating Scene Elements by Jia Jia, Guohua Wu

    Published 2022-01-01
    “…Moreover, this paper proposes a reversible information hiding algorithm for encrypted images based on pixel sorting and grouping prediction and discusses how to improve the prediction accuracy through the histogram of prediction errors. …”
    Get full text
    Article
  8. 268

    A lightweight lattice-based group signcryption authentication scheme for Internet of things by XU Chuan, AI Xinghao, WANG Shanshan, ZHAO Guofeng, HAN Zhenzhen

    Published 2024-04-01
    “…In the key generation stage, the improved trapdoor diagonal matrix was designed to optimize the original image sampling algorithm required for key generation and reduce the overall time required for generating a large number of keys. …”
    Get full text
    Article
  9. 269

    A lightweight lattice-based group signcryption authentication scheme for Internet of things by XU Chuan, AI Xinghao, WANG Shanshan, ZHAO Guofeng, HAN Zhenzhen

    Published 2024-04-01
    “…In the key generation stage, the improved trapdoor diagonal matrix was designed to optimize the original image sampling algorithm required for key generation and reduce the overall time required for generating a large number of keys. …”
    Get full text
    Article
  10. 270

    Integrated photonic programmable random matrix generator with minimal active components by Kevin Zelaya, Mostafa Honari-Latifpour, Mohammad-Ali Miri

    Published 2025-02-01
    “…In manipulating classical light, random operations are utilized for random projections and dimensionality reduction, which are important for analog signal processing, computing, and imaging. In quantum information processing, random unitary operations are essential to boson sampling algorithms for multiphoton states in linear photonic circuits. …”
    Get full text
    Article
  11. 271