Articles with "encryption techniques" as a keyword



Photo from wikipedia

A Comprehensive Review on Image Encryption Techniques

Sign Up to like & get
recommendations!
Published in 2018 at "Archives of Computational Methods in Engineering"

DOI: 10.1007/s11831-018-9298-8

Abstract: Image encryption techniques play a significant role in multimedia applications to secure and authenticate digital images. This paper presents a comprehensive study of various image encryption techniques. This paper covers the most significant developments in… read more here.

Keywords: image encryption; image; paper; encryption techniques ... See more keywords
Photo from wikipedia

Digital image encryption techniques for wireless sensor networks using image transformation methods: DCT and DWT

Sign Up to like & get
recommendations!
Published in 2019 at "Journal of Ambient Intelligence and Humanized Computing"

DOI: 10.1007/s12652-018-0850-z

Abstract: Confidentiality in storing and transmitting images is needed for different fields such as medical, military, online personal albums, confidential communications and video conferencing, etc. Many image encryption techniques are proposed to ensure confidentiality of data.… read more here.

Keywords: digital images; image encryption; encryption techniques; image ... See more keywords
Photo from wikipedia

A Novel Digital Signature Scheme for Advanced Asymmetric Encryption Techniques

Sign Up to like & get
recommendations!
Published in 2023 at "Applied Sciences"

DOI: 10.3390/app13085172

Abstract: Digital signature schemes are practical mechanisms for achieving message integrity, authenticity, and non-repudiation. Several asymmetric encryption techniques have been proposed in the literature, each with its proper limitations. RSA and El Gamal prove their robustness,… read more here.

Keywords: signature; encryption; digital signature; scheme ... See more keywords
Photo by markusspiske from unsplash

Encryption Techniques for Smart Systems Data Security Offloaded to the Cloud

Sign Up to like & get
recommendations!
Published in 2022 at "Symmetry"

DOI: 10.3390/sym14040695

Abstract: With technological advancement, cloud computing paradigms are gaining massive popularity in the ever-changing technological advancement. The main objective of the cloud computing system is to provide on-demand storage and computing resources to the users on… read more here.

Keywords: data security; smart systems; security; encryption techniques ... See more keywords