We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 81-100 of 10,000 results
  1. A new three-dimensional memristor chaotic circuit design and its application in image encryption

    In recent years, memristors have received widespread attention due to their inherent nonlinear characteristics. To this end, a three-dimensional...

    Jie Zhang, Enze Liu, Yan Guo in The Journal of Supercomputing
    Article 25 March 2024
  2. EVAD: encrypted vibrational anomaly detection with homomorphic encryption

    One of the main concerns of cloud-based services based on machine and deep learning algorithms is the privacy of users’ data. This is particularly...

    Alessandro Falcetta, Manuel Roveri in Neural Computing and Applications
    Article 01 March 2024
  3. An image encryption algorithm based on 6-dimensional hyper chaotic system and DNA encoding

    Image encryption algorithm based on chaos has been widely used in various industries, but many image encryption algorithms based on low-dimensional...

    Qingfeng Li, Lei Chen in Multimedia Tools and Applications
    Article 01 June 2023
  4. Candidate iO from Homomorphic Encryption Schemes

    We propose a new approach to construct general-purpose indistinguishability obfuscation (iO). Our construction is obtained via a new intermediate...

    Zvika Brakerski, Nico Döttling, ... Giulio Malavolta in Journal of Cryptology
    Article Open access 08 June 2023
  5. A hybrid lightweight blockchain based encryption scheme for security enhancement in cloud computing

    Cloud services provide an optimal form of demand based data outsourcing. The large amount of user data sharing increases the possibility of attacks,...

    Pranav Shrivastava, Bashir Alam, Mansaf Alam in Multimedia Tools and Applications
    Article 27 September 2023
  6. A hybrid authenticated image encryption scheme using elliptic curves for enhanced security

    The rapid evolution of digital technology has heightened concerns about the security of multimedia communication across vulnerable platforms. In...

    Shalini Gupta, Nitish, ... Arun Kumar Sharma in International Journal of Information Technology
    Article 12 March 2024
  7. A hybrid encryption model for the hyperspectral images: application to hyperspectral medical images

    Hyperspectral images collect information across the electromagnetic spectrum and are widely used to recognize signals, identify materials, and find...

    Suvita Rani Sharma, Birmohan Singh, Manpreet Kaur in Multimedia Tools and Applications
    Article 21 June 2023
  8. Proactive threshold-proxy re-encryption scheme for secure data sharing on cloud

    Cloud-based data sharing addresses the limited storage availability problem for resource-constrained users albeit at the cost of privacy and the need...

    Raghav, Nitish Andola, ... Shekhar Verma in The Journal of Supercomputing
    Article 03 April 2023
  9. Double-image coupling encryption algorithm based on TLCS and misplacement diffusion

    A new double-image coupling encryption algorithm based on TLCS and misplacement diffusion is proposed. This paper proposes a new one-dimensional...

    Ziying Zhang, Lin Teng in Multimedia Tools and Applications
    Article 10 February 2024
  10. Reversible Data Hiding in Encryption Domain based on two dimensional histogram shifting and secure encryption system

    Reversible Data Hiding in Encryption Domain (RDHED) can be used in different areas such as secure remote sensing or telemedicine. Since data...

    Alireza Ghaemi, Habibollah Danyali, Kamran Kazemi in Multimedia Tools and Applications
    Article 21 April 2022
  11. Three-channel robust optical encryption via engineering coherence Stokes vector of partially coherent light

    Optical encryption strategies utilizing fully coherent light have been widely explored but often face challenges such as speckle noise and beam...

    Yonglei Liu, Zhen Dong, ... Yangjian Cai in PhotoniX
    Article Open access 03 April 2024
  12. A data compression and encryption method for green edge computing

    Green edge computing aims to reasonably allocate computing resources on the premise of ensuring the reliability of information services. The...

    Jianli Liu, Yu Zhang, Bei Gong in Cluster Computing
    Article 06 February 2023
  13. Optimizing the SM4 Encryption Algorithm for Blockchain Security

    Encryption algorithms play a critical role in ensuring data security. However, challenges such as slow operation and suboptimal efficiency arise...
    **aomeng Hu, Haibo Yi, ... Yaning Du in Blockchain Technology and Application
    Conference paper 2024
  14. Encryption of medical data based on blockchain and multi-chaotic maps

    In this work, the SHA-256 mapper of the blockchain has been utilized to secure medical data from brute-force attacks. The uniform distribution and...

    Suvita Rani Sharma, Birmohan Singh, Manpreet Kaur in Multimedia Tools and Applications
    Article 06 July 2024
  15. Efficient Neuroimaging Data Security and Encryption Using Pixel-Based Homomorphic Residue Number System

    In recent times, there has been an increasing attention in designing a homomorphic privacy-preserving classification method for neuro-images based on...

    Lateef Opeyemi Usman, Ravie Chandren Muniyandi, Morufat Adebola Usman in SN Computer Science
    Article 31 October 2023
  16. A hybrid scheme using hyper-chaotic system and elliptic curve cryptography for image encryption

    This paper offers an efficient hybrid image encryption algorithm based on an elliptic curve cryptography (ECC), skew tent map and hyperchaotic system...

    Ismehene Chaouch, Anis Naanaa, Sadok ElAsmi in Multimedia Tools and Applications
    Article 19 April 2024
  17. A novel four image encryption approach in sparse domain based on biometric keys

    In this paper, a novel four-image encryption method using biometric keys based on a compressive phase retrieval algorithm is proposed. In the...

    Gaurav Verma, Wenqi He, **ang Peng in Multimedia Tools and Applications
    Article 17 February 2023
  18. Latin Square and Machine Learning Techniques Combined Algorithm for Image Encryption

    Multimedia data is crucial in the military, medical, forensics, social, etc., to transmit a large amount of data. Security of this sensitive...

    Sakshi Patel, V. Thanikaiselvan in Circuits, Systems, and Signal Processing
    Article 17 June 2023
  19. An encryption technique based on bilateral chaotic systems and fuzzy symbol encoding

    Encryption techniques have been proposed to improve security using chaos theory, mathematical computations, DNA computations, substitution-masking...

    Muhammed Jassem Al-Muhammed in Soft Computing
    Article 31 August 2023
  20. Angular momentum holography via a minimalist metasurface for optical nested encryption

    Metasurfaces can perform high-performance multi-functional integration by manipulating the abundant physical dimensions of light, demonstrating great...

    Hui Yang, Peng He, ... Huigao Duan in Light: Science & Applications
    Article Open access 28 March 2023
Did you find what you were looking for? Share feedback.