We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 840 results
  1. Qualitative and Quantitative Analysis of Modifications in Playfair Cipher

    Security in digital world has become a paramount issue, even more so in the post pandemic world when the digital footprint of the world has...
    Anubhab Ray, Kartikeya Singh, ... Nirmalya Kar in Computational Intelligence in Communications and Business Analytics
    Conference paper 2024
  2. Partially identified Babassu cipher and attack on it

    In the present article, we consider a new class of one-pad ciphers. We define its encryption algorithm as a partial function with two arguments. The...

    A. V. Babash, E. Đš. Baranova in Journal of Computer Virology and Hacking Techniques
    Article 01 March 2022
  3. A reversible system based on hybrid toggle radius-4 cellular automata and its application as a block cipher

    The one-dimensional cellular automata (CA) system detailed herein uses a hybrid mechanism to attain reversibility, and this approach is adapted to...

    Everton R. Lira, Heverton B. de MacĂŞdo, ... Gina M. B. Oliveira in Natural Computing
    Article 25 March 2023
  4. Unsafe Mechanisms of Bluetooth, \(E_0\) Stream Cipher Cryptanalysis with Quantum Annealing

    Due to Shor’s and Grover’s algorithms, quantum computing has become one of the fastest-evolving areas in computational science. Nowadays, one of the...
    Mateusz Leśniak, Elżbieta Burek, Michał Wroński in Computational Science – ICCS 2024
    Conference paper 2024
  5. An image cipher based on bio-molecular hyper chaotic system with dual diffusion scheme

    Sensitive images are being transmitted over insecure media as network and information technology evolve at a rapid pace. As a result, people are...

    Sujarani Rajendran, Manivannan Doraipandian, ... Kannan Kirthivasan in Multimedia Tools and Applications
    Article 10 October 2023
  6. Image cipher using image filtering with 3D DNA-based confusion and diffusion strategy

    In this paper, an image cipher is presented based on DNA sequence operations, image filtering and memrisitve chaotic system. Firstly, plain image is...

    Zhihua Gan, **uli Chai, ... **angjun Wu in Neural Computing and Applications
    Article 18 July 2021
  7. Securing Digital Images using Stream Cipher and MDS Matrix

    This is an improved and extended version of the paper presented in CVIP 2020 conference. Stream ciphers are extensively used over a wide range of...

    Abdul Gaffar, Anand B. Joshi, Dhanesh Kumar in SN Computer Science
    Article 16 September 2021
  8. A hybrid authenticated image encryption scheme using elliptic curves for enhanced security

    The rapid evolution of digital technology has heightened concerns about the security of multimedia communication across vulnerable platforms. In...

    Shalini Gupta, Nitish, ... Arun Kumar Sharma in International Journal of Information Technology
    Article 12 March 2024
  9. TEXCEL: text encryption with elliptic curve cryptography for enhanced security

    Elliptic curve cryptography has emerged as a potent tool for safeguarding data communications. This research paper addresses the problem of...

    P. L. Sharma, Shalini Gupta, ... Arun Kumar Sharma in Multimedia Tools and Applications
    Article 22 May 2024
  10. Image Security Using Hyperchaos and Multidimensional Playfair Cipher

    Image is utilized in diverse fields due to its vividness, intuitiveness, and copiousness. Existing methods for image encryption have limitations such...
    Krishnaraj Bhat, Dindayal Mahto, ... Chandrashekhar Azad in Security and Privacy
    Conference paper 2021
  11. Detection of Classical Cipher Types with Feature-Learning Approaches

    To break a ciphertext, as a first step, it is essential to identify the cipher used to produce the ciphertext. Cryptanalysis has acquired deep...
    Ernst Leierzopf, Vasily Mikhalev, ... Eckehard Hermann in Data Mining
    Conference paper 2021
  12. Multilayer symmetric and asymmetric technique for audiovisual cryptography

    In order to ensure the secure transmission and storage of video content, this research work provides a video encryption algorithm using symmetric and...

    Aryan Parekh, Mayav Antani, ... Meera Narvekar in Multimedia Tools and Applications
    Article 16 September 2023
  13. Securing encrypted image information in audio data

    Advances in communication technologies have fueled growth in digital data transfer. Images are one of the most often conveyed types of digital...

    Zeba Shamsi, Dolendro Singh Laiphrakpam in Multimedia Tools and Applications
    Article 06 March 2023
  14. A novel pseudo-random number assisted fast image encryption algorithm

    Image information encryption is an essential research direction in symmetric cryptography. A new digital image cryptosystem is proposed in this...

    Aiguo Chen, Yong Zhang in Multimedia Tools and Applications
    Article 16 October 2023
  15. Image encryption algorithm based on DNA network and hyperchaotic system

    This paper presents a novel deoxyribonucleic acid (DNA) network encryption method combined with a hyperchaotic system for image encryption. The DNA...

    **wei Yu, Kaiyu Peng, ... Wei **e in The Visual Computer
    Article 02 January 2024
  16. A new encryption model for multimedia content using two dimensional Brownian motion and coupled map lattice

    An image encryption model is presented in this paper. The model uses two-dimensional Brownian Motion as a source of confusion and diffusion in image...

    Mukesh Rawat, Anil Singh Bafila, ... Sanjeev Singh in Multimedia Tools and Applications
    Article 13 April 2023
  17. Characterizing a Time–Memory Tradeoff Against PudgyTurtle

    PudgyTurtle is not a cipher, but rather an alternative way to utilize the keystream in binary-additive stream-cipher cryptosystems. Instead of...

    David A. August, Anne C. Smith in SN Computer Science
    Article Open access 27 June 2023
  18. An approach to enhance the security of unmanned aerial vehicles (UAVs)

    There is a significant surge in unmanned aerial vehicles’ (UAVs) popularity with an ongoing increase in demand due to their multi-functional uses....

    Noshin A. Sabuwala, Rohin D. Daruwala in The Journal of Supercomputing
    Article 12 December 2023
  19. DNACDS: Cloud IoE big data security and accessing scheme based on DNA cryptography

    The Internet of Everything (IoE) based cloud computing is one of the most prominent areas in the digital big data world. This approach allows...

    Ashish Singh, Abhinav Kumar, Suyel Namasudra in Frontiers of Computer Science
    Article 12 August 2023
  20. An Efficient CH Based Authentication and Authorization for Secure EHR Using DF-BCrypt and Hashed Access Structure

    An Electronic Health Record (EHR) is a standard collection of health data from the general population and patients that is electronically stored in a...
    Conference paper 2024
Did you find what you were looking for? Share feedback.