Sign Up to like & get
recommendations!
1
Published in 2018 at "Archives of Computational Methods in Engineering"
DOI: 10.1007/s11831-018-9298-8
Abstract: Image encryption techniques play a significant role in multimedia applications to secure and authenticate digital images. This paper presents a comprehensive study of various image encryption techniques. This paper covers the most significant developments in…
read more here.
Keywords:
image encryption;
image;
paper;
encryption techniques ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "Journal of Ambient Intelligence and Humanized Computing"
DOI: 10.1007/s12652-018-0850-z
Abstract: Confidentiality in storing and transmitting images is needed for different fields such as medical, military, online personal albums, confidential communications and video conferencing, etc. Many image encryption techniques are proposed to ensure confidentiality of data.…
read more here.
Keywords:
digital images;
image encryption;
encryption techniques;
image ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2023 at "Applied Sciences"
DOI: 10.3390/app13085172
Abstract: Digital signature schemes are practical mechanisms for achieving message integrity, authenticity, and non-repudiation. Several asymmetric encryption techniques have been proposed in the literature, each with its proper limitations. RSA and El Gamal prove their robustness,…
read more here.
Keywords:
signature;
encryption;
digital signature;
scheme ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "Symmetry"
DOI: 10.3390/sym14040695
Abstract: With technological advancement, cloud computing paradigms are gaining massive popularity in the ever-changing technological advancement. The main objective of the cloud computing system is to provide on-demand storage and computing resources to the users on…
read more here.
Keywords:
data security;
smart systems;
security;
encryption techniques ... See more keywords