38   Artículos

« Anterior     Página: 1 de 2     Siguiente »

 
en línea
Behrouz Zolfaghari and Takeshi Koshiba    
Recently, many researchers have been interested in the application of chaos in cryptography. Specifically, numerous research works have been focusing on chaotic image encryption. A comprehensive survey can highlight existing trends and shed light on less... ver más
Revista: Applied System Innovation    Formato: Electrónico

 
en línea
Mamoon Riaz, Hammad Dilpazir, Sundus Naseer, Hasan Mahmood, Asim Anwar, Junaid Khan, Ian B. Benitez and Tanveer Ahmad    
In the past few decades, the transmission of data over an unsecure channel has resulted in an increased rate of hacking. The requirement to make multimedia data more secure is increasing day by day. Numerous algorithms have been developed to improve effi... ver más
Revista: Information    Formato: Electrónico

 
en línea
Dani Elias Mfungo, Xianping Fu, Xingyuan Wang and Yongjin Xian    
In today?s digital age, it is crucial to secure the flow of information to protect data and information from being hacked during transmission or storage. To address this need, we present a new image encryption technique that combines the Kronecker xor pr... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Moatsum Alawida, Je Sen Teh and Wafa? Hamdan Alshoura    
Drone-based surveillance has become widespread due to its flexibility and ability to access hazardous areas, particularly in industrial complexes. As digital camera capabilities improve, more visual information can be stored in high-resolution images, re... ver más
Revista: Drones    Formato: Electrónico

 
en línea
Hongming Li, Lilai Zhang, Hao Cao and Yirui Wu    
Deoxyribonucleic Acid (DNA) computing has demonstrated great potential in data encryption due to its capability of parallel computation, minimal storage requirement, and unbreakable cryptography. Focusing on high-dimensional image data for encryption wit... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Fatma S. Alrayes, Saud S. Alotaibi, Khalid A. Alissa, Mashael Maashi, Areej Alhogail, Najm Alotaibi, Heba Mohsen and Abdelwahed Motwakel    
Unmanned Aerial Vehicles (UAVs), or drones, provided with camera sensors enable improved situational awareness of several emergency responses and disaster management applications, as they can function from remote and complex accessing regions. The UAVs c... ver más
Revista: Drones    Formato: Electrónico

 
en línea
Ibrahim Abunadi, Hanan Abdullah Mengash, Saud S. Alotaibi, Mashael M. Asiri, Manar Ahmed Hamza, Abu Sarwar Zamani, Abdelwahed Motwakel and Ishfaq Yaseen    
Recent developments of semiconductor and communication technologies have resulted in the interconnection of numerous devices in offering seamless communication and services, which is termed as Internet of Everything (IoE). It is a subset of Internet of T... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Hala A. Naman,Naseer Ali Hussien,Mohand Lokman Al-dabag,Haider Th.Salim Alrikabi     Pág. pp. 172 - 183
One of the unexpected intelligence tactics known in World War II was to conceal the data in images that were reduced to the size of a point that was used in every text and transported in front of the enemy's eyes. In the new age, and after the expansion ... ver más

 
en línea
Chih-Hsueh Lin, Guo-Hsin Hu, Che-Yu Chan and Jun-Juh Yan    
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Haotian Liang, Guidong Zhang, Wenjin Hou, Pinyi Huang, Bo Liu and Shouliang Li    
Most of the image encryption schemes based on chaos have so far employed symmetric key cryptography, which leads to a situation where the key cannot be transmitted in public channels, thus limiting their extended application. Based on the elliptic curve ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Hanmeng Wu, Jun Wang, Ziyi Zhang, Xudong Chen and Zheng Zhu    
A multi-image encryption with super-large-capacity is proposed by using spherical diffraction and filtering diffusion. In the proposed method, initial images are processed sequentially by filtering diffusion and chaos scrambling. The images are combined ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yuqiang Dou and Ming Li    
Security of image communication is more and more important in many applications such as the transmission of military and medical images. To meet the requirement, a new color image encryption algorithm using a new one-dimension (1D) chaotic map was propos... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Isabel Amaya Barrera, César Augusto Suárez Parra, Daniel Santos Bustos    
ResumenDescargasReferenciasCómo citar
Revista: Ingeniería    Formato: Electrónico

 
en línea
Terlumun Gbaden, Blama Nachaba     Pág. Page:1 - 14Abstract
Revista: Current Journal of Applied Science and Technology    Formato: Electrónico

 
en línea
Li-Lian Huang, Shi-Ming Wang and Jian-Hong Xiang    
Since the proposed scheme can efficiently perform image encryption, it can be applied to real-time communication, such as telemedicine.
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Dandan Liu, Jian Shen, Zhihua Xia and Xingming Sun    
Content-based image retrieval (CBIR) has been widely used in many applications. Large storage and computation overheads have made the outsourcing of CBIR services attractive. However, the privacy issues brought by outsourcing have become a big problem. I... ver más
Revista: Information    Formato: Electrónico

 
en línea
Arun Kumar Rai, Hari Om, Satish Chand and Chia-Chen Lin    
In today?s digital age, ensuring the secure transmission of confidential data through various means of communication is crucial. Protecting the data from malicious attacks during transmission poses a significant challenge. To achieve this, reversible dat... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Neng Zhou, Minqing Zhang, Han Wang, Mengmeng Liu, Yan Ke and Xu An Wang    
To combine homomorphic public key encryption with reversible data hiding, a reversible data hiding scheme in homomorphic encrypted image based on EC-EG is proposed. Firstly, the cover image is segmented. The square grid pixel group randomly selected by t... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Ammar Odeh, Anas Abu Taleb, Tareq Alhajahjeh and Francisco Navarro    
Securing medical imaging poses a significant challenge in preserving the confidentiality of healthcare data. Numerous research efforts have focused on fortifying these images, with encryption emerging as a primary solution for maintaining data integrity ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Hang Chen, Zhengjun Liu, Camel Tanougast and Jie Ding    
An encryption algorithm for hyperspectral data in fractional Fourier domain is designed. Firstly, the original hyperspectral image is separated into single bands and then each pair of bands are regarded as the real and imaginary part of a complex functio... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »