International Journal of Information Technology, Journal Year: 2024, Volume and Issue: unknown
Published: Nov. 21, 2024
Language: Английский
International Journal of Information Technology, Journal Year: 2024, Volume and Issue: unknown
Published: Nov. 21, 2024
Language: Английский
International Journal of Information Technology, Journal Year: 2024, Volume and Issue: unknown
Published: June 21, 2024
Abstract Advances in digital technology and communication are reducing the popularity of physical or paper-based documents, particularly official academic field. Many institutions have shifted from documents to electronic formats. However, with availability document-editing photo-editing software, an adversary can illegally modify original suit their needs. Therefore, it is essential that receivers these must verify authenticity detect forgery documents. In this study, a cryptographic hash function, which concerned data integrity, used modifications Experiments were conducted evaluate correctness speed document verification. The proposed system was compared other conventional methods such as signature-based, convolutional neural network, blockchain-based methods. Our study shows efficiently forged 100% accuracy verification 0.352 ms, considerably faster than current network technologies. function-based method provides another way help
Language: Английский
Citations
4International Journal of Information Technology, Journal Year: 2025, Volume and Issue: unknown
Published: March 17, 2025
Language: Английский
Citations
0Franklin Open, Journal Year: 2025, Volume and Issue: unknown, P. 100256 - 100256
Published: March 1, 2025
Language: Английский
Citations
0International Journal of Information Technology, Journal Year: 2025, Volume and Issue: unknown
Published: April 10, 2025
Language: Английский
Citations
0International Journal of Information Technology, Journal Year: 2024, Volume and Issue: 16(6), P. 3691 - 3701
Published: June 22, 2024
Language: Английский
Citations
3International Journal of Information Technology, Journal Year: 2025, Volume and Issue: unknown
Published: March 9, 2025
Language: Английский
Citations
0Security and Privacy, Journal Year: 2025, Volume and Issue: 8(3)
Published: April 17, 2025
ABSTRACT The agriculture industry has embraced recent technological advancements to ensure sustainable farming methods, increase resource efficiency, and boost productivity. Nonetheless, merging these technologies raised new security concerns, particularly protecting personal data preserving device communication integrity. We propose a lightweight stream cipher address challenges facilitate secure in smart environments. innovation lies the key‐generating block, which utilizes 128‐bit key 64‐bit Initialization Vector (IV) produce an 80‐bit keystream through iterative round functions. This process involves integration of dynamic nonlinear logic module robust state update mechanism, ensuring high entropy resistance against cryptanalytic attacks. In second phase, is initialized feedback shift register (NLFSR), where it undergoes additional transformations using specialized filter output functions generate final encryption keystream. two‐phase design not only ensures but also adapts effectively constraints systems. Comprehensive comparative evaluations demonstrate that proposed outperforms state‐of‐the‐art ciphers multiple benchmarks, such as Grain v1, Grain‐128, Trivium, Logic. suggested achieves higher throughput, ideal Shannon values, faster decryption times. It exhibits robustness with near‐zero correlation coefficients, passes all 16 NIST randomness tests, efficient memory usage, low power consumption, strong cryptographic makes solution tailored unique needs
Language: Английский
Citations
0International Research Journal on Advanced Science Hub, Journal Year: 2024, Volume and Issue: 6(06), P. 135 - 143
Published: June 5, 2024
Healthcare data has been moving to cloud platforms in recent years, which increased accessibility and scalability but also raised security issues. Ensuring integrity safeguarding private health information from unwanted access are critical. This paper presents a comprehensive strategy integrate effective Elliptic Curve Cryptography ECC-AES with steganography techniques improve the of healthcare cloud. is especially well-suited for situations limited resources since it provides strong reduced key sizes. Confidentiality guaranteed by encrypting using ECC- AES before storage, reducing possibility breaches. Steganography integrated against skilled adversaries adding an extra degree obfuscation concealing encrypted inside innocuous files or images. Strict management procedures, control systems, frequent audits important components proposed system that ensure adherence Health Insurance Portability Accountability Act (HIPAA) General Data Protection Regulation (GDPR) compliance requirements pertaining protection. The multilayer on environment than other existing systems.
Language: Английский
Citations
1International Journal of Information Technology, Journal Year: 2024, Volume and Issue: unknown
Published: July 29, 2024
Language: Английский
Citations
1International Journal of Information Technology, Journal Year: 2024, Volume and Issue: unknown
Published: July 22, 2024
Language: Английский
Citations
1