Articles with "encryption technique" as a keyword



Photo from wikipedia

Randomly Distorted Double Substitution Encryption Technique with Effective Block Diffusion and Chaos-Induced Noise

Sign Up to like & get
recommendations!
Published in 2021 at "Arabian Journal for Science and Engineering"

DOI: 10.1007/s13369-021-06282-3

Abstract: To properly respond to ever-growing threats to information security, there is a pressing need for more effective encryption techniques. This paper offers an innovative block-based encryption technique that combines effective random manipulations of a block’s… read more here.

Keywords: technique; block diffusion; block; encryption technique ... See more keywords
Photo from wikipedia

Lightweight Encryption Technique to Enhance Medical Image Security on Internet of Medical Things Applications

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3061710

Abstract: The importance of image security in the field of medical imaging is challenging. Several research works have been conducted to secure medical healthcare images. Encryption, not risking loss of data, is the right solution for… read more here.

Keywords: lightweight encryption; encryption technique; security; image ... See more keywords
Photo by joshuafuller from unsplash

Chaos Based Encryption Technique for Compressed H264/AVC Videos

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3223355

Abstract: Saving videos streaming from the unlawful users became an urgent claim. Cryptography and Steganography are the most important and indispensable processes to protect and embed the multimedia data during the transfer or storage process. Chaotic-based… read more here.

Keywords: encryption technique; chaos based; avc; encryption ... See more keywords
Photo by radowanrehan from unsplash

Speech Encryption Technique using S - box based on Multi Chaotic Maps

Sign Up to like & get
recommendations!
Published in 2021 at "TEM Journal"

DOI: 10.18421/tem103-54

Abstract: This paper proposes the establishment of a secure encryption system for data transmission that includes three stages: first stage is a scrambling stage that is divided into scrambling of different sizes blocks and scrambling bits,… read more here.

Keywords: technique using; speech encryption; using box; encryption ... See more keywords

Light and Secure Encryption Technique Based on Artificially Induced Chaos and Nature-Inspired Triggering Method

Sign Up to like & get
recommendations!
Published in 2022 at "Symmetry"

DOI: 10.3390/sym14020218

Abstract: Encryption is the de facto method for protecting information, whether this information is locally stored or on transit. Although we have many encryption techniques, they have problems inherited from the computational models that they use.… read more here.

Keywords: encryption technique; nature inspired; inspired triggering; encryption ... See more keywords