Sign Up to like & get
recommendations!
0
Published in 2021 at "Arabian Journal for Science and Engineering"
DOI: 10.1007/s13369-021-06282-3
Abstract: To properly respond to ever-growing threats to information security, there is a pressing need for more effective encryption techniques. This paper offers an innovative block-based encryption technique that combines effective random manipulations of a block’s…
read more here.
Keywords:
technique;
block diffusion;
block;
encryption technique ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Access"
DOI: 10.1109/access.2021.3061710
Abstract: The importance of image security in the field of medical imaging is challenging. Several research works have been conducted to secure medical healthcare images. Encryption, not risking loss of data, is the right solution for…
read more here.
Keywords:
lightweight encryption;
encryption technique;
security;
image ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3223355
Abstract: Saving videos streaming from the unlawful users became an urgent claim. Cryptography and Steganography are the most important and indispensable processes to protect and embed the multimedia data during the transfer or storage process. Chaotic-based…
read more here.
Keywords:
encryption technique;
chaos based;
avc;
encryption ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2021 at "TEM Journal"
DOI: 10.18421/tem103-54
Abstract: This paper proposes the establishment of a secure encryption system for data transmission that includes three stages: first stage is a scrambling stage that is divided into scrambling of different sizes blocks and scrambling bits,…
read more here.
Keywords:
technique using;
speech encryption;
using box;
encryption ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "Symmetry"
DOI: 10.3390/sym14020218
Abstract: Encryption is the de facto method for protecting information, whether this information is locally stored or on transit. Although we have many encryption techniques, they have problems inherited from the computational models that they use.…
read more here.
Keywords:
encryption technique;
nature inspired;
inspired triggering;
encryption ... See more keywords