• Nenhum resultado encontrado

[PDF] Top 20 Efficiency and Security of Some Image Encryption Algorithms

Has 10000 "Efficiency and Security of Some Image Encryption Algorithms" found on our website. Below are the top 20 most common "Efficiency and Security of Some Image Encryption Algorithms".

Efficiency and Security of Some Image Encryption Algorithms

Efficiency and Security of Some Image Encryption Algorithms

... results of efficient measuring methods whereby the encryption capability of four algorithms are ...the encryption quality, the memory requirement and the execution time of ... See full document

4

Design and Implementation of Video Encryption for Multimedia  Applications

Design and Implementation of Video Encryption for Multimedia Applications

... video encryption algorithms can be broadly classified into two ...selective encryption technique. In selective encryption technique only parts of the video are encrypted, thereby ... See full document

6

Increasing Security by Implementing Image Encryption using AES Algorithm

Increasing Security by Implementing Image Encryption using AES Algorithm

... distortion of the image data with respect to the plain image. In some applications, it could be desirable to achieve enough visual degradation, so that an attacker would still understand the ... See full document

4

Image Compression Algorithms for Fingerprint System

Image Compression Algorithms for Fingerprint System

... centuries and the validity of fingerprint identification has been well ...individuals and across fingers of same ...analysis of fingerprints for matching purposes generally requires the ... See full document

6

WSES: HIGH SECURED DATA ENCRYPTION AND AUTHENTICATION USING WEAVING, ROTATION AND FLIPPING

WSES: HIGH SECURED DATA ENCRYPTION AND AUTHENTICATION USING WEAVING, ROTATION AND FLIPPING

... Identification security protocols often rely on hash function methods. Some of the applications need protected from collision and some of them do not needing pre- image ... See full document

8

Proposed Hyperchaotic System for Image Encryption

Proposed Hyperchaotic System for Image Encryption

... Hénon and Logistic maps which provides characteristics of high capacity, security and ...an image encryption ...the image encryption algorithm which based on the ... See full document

4

Selective image encryption for Medical and Satellite Images

Selective image encryption for Medical and Satellite Images

... selective encryption some content of the image is ...part of the image. Consequently, selective encryption is sometimes called partial ...provides security to the ... See full document

7

COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETWORKS (MANETS)

COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETWORKS (MANETS)

... Umaparvathi and Varughese in [9] presented a comparison of the most commonly used symmetric encryption algorithms AES (Rijndael), DES, 3DES and Blowfish in terms of power ... See full document

13

Substitution-diffusion based Image Cipher

Substitution-diffusion based Image Cipher

... Security of images has become very important for many applications like video conferencing, secure facsimile, medical, military applications ...focus of the present work, the information under ... See full document

12

Image Encryption using chaos functions and fractal key

Image Encryption using chaos functions and fractal key

... growth of image transmission on computer networks and Internet, digital image security has been very ...to image transmission, secure and fast algorithms are ... See full document

8

Encryption and Decryption of Digital Image Using Color Signal

Encryption and Decryption of Digital Image Using Color Signal

... the security of digital images has become more and more important since the communications of digital products over open network occur more and more frequently [2, 3, ...Surveys ... See full document

5

An image encryption algorithm utilizing julia sets and hilbert curves.

An image encryption algorithm utilizing julia sets and hilbert curves.

... flexible and may have some restrictions in the ...novel image encryption ...images and has a good efficiency in the ...set and scramble it with the Hilbert curve in ... See full document

9

Analyzing the Efficiency of Text-to-Image  Encryption Algorithm

Analyzing the Efficiency of Text-to-Image Encryption Algorithm

... the efficiency of the TTIE ...text encryption for a network system (TTIE is good for a Virtual Private Network, VPN, where encrypted data are sent and received across shared or public ... See full document

4

EVALUATION OF ITERATIVE ALGORITHMS FOR TOMOGRAPHY IMAGE RECONSTRUCTION

EVALUATION OF ITERATIVE ALGORITHMS FOR TOMOGRAPHY IMAGE RECONSTRUCTION

... aspect of the computed tomography (CT) for medical application, industrial tomography systems applications should be adapted to the different size and geometry objects, usually placed in an ag- gressive ... See full document

16

Elliptic Curve Cryptography Services for Mobile Operating Systems

Elliptic Curve Cryptography Services for Mobile Operating Systems

... normally and in the background be sending spam messages either by email or SMS, if such is allowed in the application ...knowledge of the ...development of ECCrypto, the security reasons ... See full document

120

MSMET: A MODIFIED & SECURE MULTILANGUAGE ENCRYPTION TECHNIQUE

MSMET: A MODIFIED & SECURE MULTILANGUAGE ENCRYPTION TECHNIQUE

... communication and is usually the strongest link in the chain of ...advancement of classical cryptography, may evolve as a choice of classical cryptography lovers seeking a better ...range ... See full document

4

AROCRYPT: A CONFIDENTIALITY TECHNIQUE FOR SECURING ENTERPRISE’s DATA IN CLOUD

AROCRYPT: A CONFIDENTIALITY TECHNIQUE FOR SECURING ENTERPRISE’s DATA IN CLOUD

... Multi-level Encryption algorithm to secure the data in the ...fence and ceaser cipher ...values of each character. Assign a key and apply it on the text using the formula: E = (p + k + i) % ... See full document

9

Analysis of Virus Algorithms

Analysis of Virus Algorithms

... restrict some functions, delete files, format your disk and automatically shutdown your ...conscious of spyware and adware when you surf in the Internet and download ...itself ... See full document

4

Influence of supply voltage frequency of induction coil on inoculation efficiency of pure aluminium structure

Influence of supply voltage frequency of induction coil on inoculation efficiency of pure aluminium structure

... influence of forced by use of electromagnetic field liquid metal movement on changes in structure of pure metals, which solidify with flat crystallization front is ...influence of this forced ... See full document

6

A review of computational methods applied for identification and quantification of atherosclerotic plaques in images

A review of computational methods applied for identification and quantification of atherosclerotic plaques in images

... thrombus and dense fibrous ...T2W and PWD images were used to initialize the ...tion of the chromatic variance and the ...compactness of the cluster and the second one is the ... See full document

55

Show all 10000 documents...