Filters








81 Hits in 7.1 sec

DNA Based Cryptography Techniques with Applications and Limitations

2019 International Journal of Engineering and Advanced Technology  
This type of cryptography uses DNA molecules which have very high dense storage capacity and large scale parallelism.  ...  Cryptography techniques and systems have been developed for data security.DNA cryptography techniques are much better as compared to Quantum cryptography techniques and modern cryptography techniques.  ...  [9] suggested a hybrid scheme to secure a DNA cryptography technique using elliptic curve cryptography (ECC).  ... 
doi:10.35940/ijeat.f9285.088619 fatcat:etrqoc6nqbfwplioqnb7oenzby

An analytical survey on the role of image cryptography and related computational methods

Vivek Ranjan, Kailash Patidar, Rishi Kushwaha
2020 International Journal of Advanced Computer Research  
They have proposed a robust approach which is based on elliptic curve cryptography (ECC) and hill cipher. They have used least significant bits (LSB) watermarking for the image embedding.  ...  A new high capacity image steganography method combined with image elliptic curve cryptography and deep neural network. IEEE Access. 2020; 8:25777-88. [15] Abhinav A, Manikandan VM, Bini AA.  ... 
doi:10.19101/ijacr.2020.10480104 fatcat:4gray5ozz5fefarsw3hwczwsci

A Hybrid Encryption Algorithm for Security Enhancement of Wireless Sensor Networks: A Supervisory Approach to Pipelines

Omid Mahdi Ebadati E., Farshad Eshghi, Amin Zamani
2020 CMES - Computer Modeling in Engineering & Sciences  
A wireless sensor network is a wireless network consisting of distributed devices distributed at various distances, which monitors the physical and environmental conditions using sensors.  ...  The proposed algorithm fulfills three principles of cryptography: integrity, confidentiality and authentication.  ...  Conflicts of Interest: I hereby declare that there is no conflict of interest related to this manuscript (article) entitled "Fusion of Medical Images in Wavelet Domain: A Hybrid Implementation" with manuscript  ... 
doi:10.32604/cmes.2020.08079 fatcat:thissiwhpvfyzbxf6pvic4n5x4

A Novel Scheme for Image Authentication and Secret Data Sharing

Auqib Hamid Lone, Ab Waheed Lone, Moin Uddin
2016 International Journal of Computer Network and Information Security  
In this paper we propose a novel scheme for image authentication and secret data sharing based on three level security model viz: Compression, steganography and cryptography.  ...  Compression optimizes the resource usage, steganography conceals the existence of message and cryptography is used to achieve confidentiality and authentication.  ...  Tuncer and E. Avci [6] proposed a new data hiding method based on secret sharing scheme with DNA-XOR operator for color images.  ... 
doi:10.5815/ijcnis.2016.09.02 fatcat:33izp23fv5dgxk53bz4lgdckjm

Chaotic Image Encryption: State-of-the-Art, Ecosystem, and Future Roadmap

Behrouz Zolfaghari, Takeshi Koshiba
2022 Applied System Innovation  
A comprehensive survey can highlight existing trends and shed light on less-studied topics in the area of chaotic image encryption.  ...  In addition to such a survey, this paper studies the main challenges in this field, establishes an ecosystem for chaotic image encryption, and develops a future roadmap for further research in this area  ...  [96] proposed a novel image encryption and transmission procedure based on Elliptic Curve Cryptography (ECC).  ... 
doi:10.3390/asi5030057 fatcat:cpnitagmdze5bpla5l6koaaiwy

Hybrid Cryptosystem Based on Pseudo Chaos of Novel Fractional Order Map and Elliptic Curves

A. Al-khedhairi, Amr Elsonbaty, A. A. Elsadany, Esam A. A. Hagras
2020 IEEE Access  
Secondly, a new reliable secure encryption scheme combining the associated chaotic pseudo-orbits of the proposed map with the advantages of elliptic curves in public key cryptography is suggested, for  ...  The hybrid scheme is capable to confirm reliable secret keys exchange in addition to highly obscure and hide transmitted information messages.  ...  , and clarity of the work.  ... 
doi:10.1109/access.2020.2982567 fatcat:khki4lq2unf7nentgsg3fh2hzy

A Review of Modern DNA-based Steganography Approaches

Omar Haitham Alhabeeb, Fariza Fauzi, Rossilawati Sulaiman
2021 International Journal of Advanced Computer Science and Applications  
These modern algorithms overpass the performance of the old ones either by exploiting a biological factor that exists in the DNA itself or by using a suitable technique available in another field of computer  ...  Features like enormous hiding capacity, high computational power, and the randomness of its building contents, all sustained to prove DNA supremacy.  ...  A mathematical approach of data encryption and hiding is proposed in [28] . Two secret keys are generated using Elliptic Curve Cryptography (ECC) and Gaussian Kernal Function (GKF).  ... 
doi:10.14569/ijacsa.2021.0121021 fatcat:4x7bfkmuujadnf3a4lzlnyti3y

A Comprehensive Review About Image Encryption Methods

Cihan TİKEN, Ruya SAMLI
2022 Harran Üniversitesi Mühendislik Dergisi  
Finally, the images used in the articles were compared with each other in many ways and the results were presented graphically.  ...  Studies on both colored and gray level images have been handled together.  ...  The researchers proposed a novel image cryptography technique which is an extremely powerful method based on principle of Rubik's cube in [4] .  ... 
doi:10.46578/humder.1066545 fatcat:uoq5vxftergjbp74ssrrdcwyn4

Terminologies and Techniques based Image Encryption A Survey

Rogash Y Masiha
2022 Artificial Intelligence & Robotics Development Journal  
In this paper, a state-of-the-art survey of various techniques developed by various researchers in the field of image encryption is presented, and a detailed comparison of various available techniques  ...  In comparison to grayscale images, colored images are more affordable technologically, thus more people use them.  ...  A method for grayscale photos was proposed by Dawahdeh (Dawahdeh et al., 2018) which involved the use of the Hill cipher algorithm for time-efficient computations and the application of elliptic curve  ... 
doi:10.52098/airdj.202255 fatcat:whc65fxmubfunpzerj642iqx3i

A Secure Network Communication Protocol Based on Text to Barcode Encryption Algorithm

Abusukhon Ahmad, Bilal Hawashin
2015 International Journal of Advanced Computer Science and Applications  
In this paper, we propose a novel method for data encryption based on the transformation of a text message into a barcode image.  ...  This technique is used to protect the data from hackers by scrambling these data into a non-readable form.  ...  ACKNOWLEDGMENT We would like to acknowledge and extend our heartfelt gratitude to Al-ZaytoonahUniversity of Jordan.  ... 
doi:10.14569/ijacsa.2015.061209 fatcat:lvefrfljb5b4fii3oc5a57vnbq

The Dichotomy of Neural Networks and Cryptography: War and Peace

Behrouz Zolfaghari, Takeshi Koshiba
2022 Applied System Innovation  
Neural networks can be used against cryptosystems; they can play roles in cryptanalysis and attacks against encryption algorithms and encrypted data.  ...  In recent years, neural networks and cryptographic schemes have come together in war and peace; a cross-impact that forms a dichotomy deserving a comprehensive review study.  ...  One way to achieve this using neural cryptography is to first perform Discrete Cosine similarity Transform and Elliptic Curve Cryptography to first encrypt the image you would like to hide [110] .  ... 
doi:10.3390/asi5040061 fatcat:6p5evyj7h5dvfckt6qzmqbzipi

Evolutionary Computing Assisted Visually- Imperceptible Hybrid Cryptography and Steganography Model for Secure Data Communication over Cloud Environment

R. Denis, P. Madhubala
2020 International Journal of Computer Networks And Applications  
We developed a novel Hybrid Cryptosystem by strategically applying Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) algorithms to secure secret data to be embedded in a cover image.  ...  In addition, the use of the Adaptive Genetic Algorithm based Optimal Pixel Adjustment (AGA-OPAP) strengthened the Least Significant Bit embedding while retaining the best possible image quality and visual  ...  Ahmed et al [21] presented a model based on a user interface in which the sender could pick the appropriate cover and secret message that was processed using Elliptic Curve Cryptography based encryption  ... 
doi:10.22247/ijcna/2020/205321 fatcat:xzvlyfah3raadgvln3gcz4oahe

A Survey on Key(s) and Keyless Image Encryption Techniques

Kumar H. S. Ranjan, Safeeriya S. P. Fathimath, Ganesh Aithal, Surendra Shetty
2017 Cybernetics and Information Technologies  
The paper presents a survey of most popular algorithms and research papers that are related with different image encryption techniques.  ...  The paper mainly focuses on two types: Image encryption with Key(s) and Image Encryption without Key(s). In addition it also describes several properties of a good image encryption technique.  ...  based on elliptic curve cryptography.  ... 
doi:10.1515/cait-2017-0046 fatcat:7k52h4kd3zbezf3atr5e2tz2k4

Image Encryption and Decryption System through a Hybrid Approach Using the Jigsaw Transform and Langton's Ant Applied to Retinal Fundus Images

Andrés Romero-Arellano, Ernesto Moya-Albor, Jorge Brieva, Ivan Cruz-Aceves, Juan Gabriel Avina-Cervantes, Martha Alicia Hernandez-Gonzalez, Luis Miguel Lopez-Montero
2021 Axioms  
The Jigsaw transform was used to hide visual information effectively, whereas Langton's ant and the deterministic noise algorithm give a reliable and secure approach.  ...  In this work, a new medical image encryption/decryption algorithm was proposed. It is based on three main parts: the Jigsaw transform, Langton's ant, and a novel way to add deterministic noise.  ...  Hayat and Azam [22] proposed a two-phase image encryption method by constructing S-boxes and pseudo-random numbers using a total order on an elliptic curve over a prime field.  ... 
doi:10.3390/axioms10030215 fatcat:o2ulelsup5anbejm5mcltykpgm

Efficient Image Encryption Approach Based on Chaos Technique

Muzhir Shaban Al-Ani
2017 IOSR Journal of Electrical and Electronics Engineering  
There are big numbers of encryption techniques including chaos-based schemes, some of them utilize one-dimensional chaotic maps for encryption, and other using two-dimensional or more dimensions chaotic  ...  This approach achieve a good encrypted image, in addition the retrieved image will be at high performance.  ...  introduced a novel image security approach using elliptic curve cryptography based on DNA encoding.  ... 
doi:10.9790/1676-1203025460 fatcat:gw545k3cp5h6pphnyz7ldvb4ka
« Previous Showing results 1 — 15 out of 81 results