• Nenhum resultado encontrado

[PDF] Top 20 Analyzing the Efficiency of Text-to-Image Encryption Algorithm

Has 10000 "Analyzing the Efficiency of Text-to-Image Encryption Algorithm" found on our website. Below are the top 20 most common "Analyzing the Efficiency of Text-to-Image Encryption Algorithm".

Analyzing the Efficiency of Text-to-Image  Encryption Algorithm

Analyzing the Efficiency of Text-to-Image Encryption Algorithm

... referred to as encipherment is used to convert the plaintext to encode or make unreadable form of text ...[1]. The sensitive data are encrypted on the sender side ... See full document

4

Watermark based Substitution technique Hill Cipher applied on Images

Watermark based Substitution technique Hill Cipher applied on Images

... With the wide use of Internet in every organization security becomes a serious ...due to that there is scope for an attacker to attack the ...arises the Data Security problem ... See full document

7

Substitution-diffusion based Image Cipher

Substitution-diffusion based Image Cipher

... employed to illustrate the superior confusion and diffusion properties of the encryption ...analyzed the histograms of about hundred encrypted images and their ... See full document

12

Inventive Cubic Symmetric Encryption System for Multimedia

Inventive Cubic Symmetric Encryption System for Multimedia

... act of cracking or breaking a cipher involves extracting the plain text from the cipher text with no knowledge of the key and frequently with no encryption ... See full document

7

Message Encryption Using Deceptive Text and Randomized Hashing

Message Encryption Using Deceptive Text and Randomized Hashing

... message encryption using the concept called deceptive text is ...plain text to receiver, instead, we send a meaningful deceptive text and an encrypted special index file ... See full document

7

Odd-Even Based Cryptography

Odd-Even Based Cryptography

... that the shared key is the pair (4, 12). The sender needs to send the character ...is the sixth character in the alphabet). The encryption algorithm ... See full document

3

Increasing Security by Implementing Image Encryption using AES Algorithm

Increasing Security by Implementing Image Encryption using AES Algorithm

... measures the perceptual distortion of the image data with respect to the plain ...desirable to achieve enough visual degradation, so that an attacker would still ... See full document

4

A Text Localization Algorithm in Color Image via New Projection Profile

A Text Localization Algorithm in Color Image via New Projection Profile

... section, the new projection profile is ...side of the every line and records a change in case of facing the pixel change from zero to one and again returns to ...Counting ... See full document

4

Design and Implementation of Image Encryption Algorithm Using Chaos

Design and Implementation of Image Encryption Algorithm Using Chaos

... proposed image encryption algorithm has two major ...Firstly, the correlation among the adjacent pixels is disturbed completely as the image data have strong correlations ... See full document

5

Integral Imaging Based 3-D Image Encryption Algorithm Combined with Cellular Automata

Integral Imaging Based 3-D Image Encryption Algorithm Combined with Cellular Automata

... shows the basic concept of the II system, composed of a pickup part and a display ...In the pickup part, a 3-D object is recorded on a charge-coupled device (CCD) in the form ... See full document

10

A Refined Hybrid Image Retrieval System using Text and Color

A Refined Hybrid Image Retrieval System using Text and Color

... features of an image represents the more detailed perceptual aspects while text addresses the high level semantics underlying the more general conceptual aspects of an ... See full document

9

A Novel Approach for Identify Small and Capital Handwritten Letter

A Novel Approach for Identify Small and Capital Handwritten Letter

... sequence of strokes whose features are extracted and classified. Although the off-line and on-line character recognition techniques have different approaches, they share a lot of common problems and ... See full document

5

Cluster Based Hybrid Niche Mimetic and Genetic Algorithm for Text Document Categorization

Cluster Based Hybrid Niche Mimetic and Genetic Algorithm for Text Document Categorization

... operations to effectively design an MA for simultaneous clustering and feature ...successfully to solve a wide variety of optimization ...suited to fine tuning structures in complex search ... See full document

7

Proposed Hyperchaotic System for Image Encryption

Proposed Hyperchaotic System for Image Encryption

... communications of digital products over the network (wired/wireless) has expanded ...need to secure data and its transmission and also to identify the required levels of security ... See full document

4

A Block Cipher using Rotation and Logical XOR Operations

A Block Cipher using Rotation and Logical XOR Operations

... Encryption is the process of converting a plaintext message into cipher text which can be decoded back into the original message using the secret ...An encryption/ ... See full document

6

EFFICIENT ALGORITHM FOR RSA TEXT ENCRYPTION USING CUDA-C

EFFICIENT ALGORITHM FOR RSA TEXT ENCRYPTION USING CUDA-C

... key encryption scheme. This algorithm relies on the difficulty of factoring large numbers which has seriously affected its performance and so restricts its use in wider ...Therefore, ... See full document

9

A Novel Algorithm for Watermarking and Image Encryption

A Novel Algorithm for Watermarking and Image Encryption

... in image analysis for capturing contours and fine details in images. The contourlet transform is composed of basic functions oriented in multiple scales at different directions with flexible aspect ... See full document

10

Efficiency and Security of Some Image Encryption Algorithms

Efficiency and Security of Some Image Encryption Algorithms

... describes the results of efficient measuring methods whereby the encryption capability of four algorithms are ...measuring the encryption quality, the memory ... See full document

4

Encryption Image Using Small Order Linear Systems and Repeated Modular Numbers

Encryption Image Using Small Order Linear Systems and Repeated Modular Numbers

... Form the testing of our algorithm which appearing in Table 1 we have a three encrypted images for each original ...plain image of an RGB ...interesting to note that the ... See full document

6

An image encryption algorithm utilizing julia sets and hilbert curves.

An image encryption algorithm utilizing julia sets and hilbert curves.

... use the Miscellaneous [16] as our database, which consists of 16 color images and 28 monochrome ...All the experiments were conducted on a Core(TM) i5(2.40 GHz) PC. The mapping function ... See full document

9

Show all 10000 documents...