We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. A DNA Cryptosystem Using Diffie–Hellman Key Exchange

    DNA cryptography is a method of concealing information in the form of DNA sequence. It is growing in popularity as a result of its quicker...

    R. Vaishali, S. Manohar Naik in SN Computer Science
    Article 20 February 2024
  2. Paillier cryptosystem enhancement for Homomorphic Encryption technique

    Homomorphic Encryption (HE) is one of the most popular technologies which assists for kee** the confidentiality and privacy of user data on cloud...

    Saja J. Mohammed, Dujan B. Taha in Multimedia Tools and Applications
    Article 07 August 2023
  3. Real time region of interest based chaotic image cryptosystem for IoT applications

    Recently, internet of things (IoT) is extensively used in wide applications like industry, e-healthcare, agriculture to send images through internet...

    S. J. Sheela, K. V. Suresh in Multimedia Tools and Applications
    Article 13 July 2023
  4. Lightweight and authentic symmetric session key cryptosystem for client–server mobile communication

    Over the last decade, millions of 4G and 5G-enabled mobile devices have become part of the Internet. Almost, all the applications have been shifted...

    Zeeshan Ashraf, Adnan Sohail, Muhammad Yousaf in The Journal of Supercomputing
    Article 25 April 2023
  5. Applicable image cryptosystem using bit-level permutation, particle swarm optimisation, and quantum walks

    Digital data plays a paramount part in various fields of life, in which multimedia data represent the majority of transferred digital data via...

    Bassem Abd-El-Atty, Ahmed A. Abd EL-Latif in Neural Computing and Applications
    Article 08 June 2023
  6. New image encryption algorithm based on hyperchaotic 3D-IHAL and a hybrid cryptosystem

    The performance of chaotic systems in generating signals is an essential factor in determining the security of cryptosystems. A new 3D chaotic system...

    Suo Gao, Songbo Liu, ... **anglong Tang in Applied Intelligence
    Article 19 September 2023
  7. Medical image cryptosystem using a new 3-D map implemented in a microcontroller

    Medical images make up for more than 25% of global attacks on privacy. Securing them is therefore of utmost importance. Chaos based image encryption...

    Gideon Pagnol Ayemtsa Kuete, Lee Mariel Heucheun Yepdia, ... Justin Roger Mboupda Pone in Multimedia Tools and Applications
    Article 21 February 2024
  8. Two modifications for Loidreau’s code-based cryptosystem

    This paper presents two modifications for Loidreau’s cryptosystem, a rank metric-based cryptosystem constructed by using Gabidulin codes in the...

    Article 16 August 2022
  9. Skew differential Goppa codes and their application to Mceliece cryptosystem

    A class of linear codes that extends classical Goppa codes to a non-commutative context is defined. An efficient decoding algorithm, based on the...

    José Gómez-Torrecillas, F. J. Lobillo, Gabriel Navarro in Designs, Codes and Cryptography
    Article Open access 19 August 2023
  10. SIFTBCS: scale invariant feature transform based fuzzy vault scheme in biometric cryptosystem

    Biometric cryptosystem (BCS) is a challenging field of study where data is secured using biometrics features and cryptographic encryption. The...

    Prabhjot Kaur, Nitin Kumar in Multimedia Tools and Applications
    Article 07 September 2023
  11. CryptoHHO: a bio-inspired cryptosystem for data security in Fog–Cloud architecture

    The exponential growth of Internet-of-Things (IoT) has raised several data security risks to the Fog–Cloud architecture. The performance and the...

    Md Saquib Jawed, Mohammad Sajid in The Journal of Supercomputing
    Article 06 April 2024
  12. Hybrid cryptosystem based healthcare data sharing with access control policy in cloud environment

    Healthcare cloud computing environments are expanding quickly, and security and confidentiality of patient records are top priorities. Academics and...

    S. Vinothkumar, J. Amutharaj in International Journal of Information Technology
    Article 10 May 2024
  13. Mixed-multiple image encryption algorithm using RSA cryptosystem with fractional discrete cosine transform and 2D-Arnold Transform

    This paper presents a novel multiple-image encryption (MIE) technique based on mixed image elements associated with RSA cryptosystem, fractional...

    Yashavant Kumar, Vandana Guleria in Multimedia Tools and Applications
    Article 03 October 2023
  14. SURFBCS: speeded up robust features based fuzzy vault scheme in biometric cryptosystem

    Biometric cryptosystem (BCS) is an emerging research area in which Biometric alleviates the need to remember passwords and cryptography provides a...

    Prabhjot Kaur, Nitin Kumar, Maheep Singh in The Journal of Supercomputing
    Article 10 March 2023
  15. Asymmetric Cryptosystem Based on Biological Mutation Operation in Chirp-Z Domain

    In this paper, we have proposed an asymmetric image encryption algorithm in the Chirp-Z domain using chaotic Tinkerbell map, DNA coding with...

    Sachin, Phool Singh in Multimedia Tools and Applications
    Article 12 April 2023
  16. Robust medical and color image cryptosystem using array index and chaotic S-box

    Providing robust security within an image cryptosystem during network communication is more essential than ever, highlighting the fundamental aspects...

    Durgabati Podder, Subhrajyoti Deb, ... Aditya Kumar Sahu in Cluster Computing
    Article 12 June 2024
  17. Design and implementation of a new lightweight chaos-based cryptosystem to secure IoT communications

    Internet of things (IoT) provides several applications such as intelligent urban transportation, smart factory, and smart health. In such systems,...

    Abdenour Kifouche, Mohamed Salah Azzaz, ... Remy Kocik in International Journal of Information Security
    Article 01 September 2022
  18. A novel multi-layer color image encryption based on RSA cryptosystem, RP2DFrHT and generalized 2D Arnold map

    The biggest threat to information security is the irrelevant presence of eavesdroppers, unauthorized access, illegal acquisition and modification...

    Shazia Sabir, Vandana Guleria in Multimedia Tools and Applications
    Article 18 March 2023
  19. Image cryptosystem based on modified Henon chaotic map and dynamic encoding mechanism

    In this article, a novel cryptosystem for the protection of images is proposed. The proposed cryptosystem uses two dimensional modified Henon map...

    S. J. Sheela, K. V. Suresh, ... T. S. Rajani in Multimedia Tools and Applications
    Article 06 May 2022
  20. Robust Rabin Cryptosystem Biometric Privacy Preserving Authentication Technique for IoT Enabled Devices Over Cloud

    With the advent of growing technologies and digitalization, smart factories and healthcare systems in the cloud are more focused towards task-driven...

    Devishree Naidu, Niranjan K. Ray in SN Computer Science
    Article 28 May 2024
Did you find what you were looking for? Share feedback.