International Journal of Information Technology, Год журнала: 2024, Номер unknown
Опубликована: Ноя. 21, 2024
Язык: Английский
International Journal of Information Technology, Год журнала: 2024, Номер unknown
Опубликована: Ноя. 21, 2024
Язык: Английский
International Journal of Information Technology, Год журнала: 2024, Номер unknown
Опубликована: Июнь 21, 2024
Abstract Advances in digital technology and communication are reducing the popularity of physical or paper-based documents, particularly official academic field. Many institutions have shifted from documents to electronic formats. However, with availability document-editing photo-editing software, an adversary can illegally modify original suit their needs. Therefore, it is essential that receivers these must verify authenticity detect forgery documents. In this study, a cryptographic hash function, which concerned data integrity, used modifications Experiments were conducted evaluate correctness speed document verification. The proposed system was compared other conventional methods such as signature-based, convolutional neural network, blockchain-based methods. Our study shows efficiently forged 100% accuracy verification 0.352 ms, considerably faster than current network technologies. function-based method provides another way help
Язык: Английский
Процитировано
5International Journal of Information Technology, Год журнала: 2025, Номер unknown
Опубликована: Март 9, 2025
Язык: Английский
Процитировано
0International Journal of Information Technology, Год журнала: 2025, Номер unknown
Опубликована: Март 17, 2025
Язык: Английский
Процитировано
0Franklin Open, Год журнала: 2025, Номер unknown, С. 100256 - 100256
Опубликована: Март 1, 2025
Язык: Английский
Процитировано
0International Journal of Information Technology, Год журнала: 2025, Номер unknown
Опубликована: Апрель 10, 2025
Язык: Английский
Процитировано
0Security and Privacy, Год журнала: 2025, Номер 8(3)
Опубликована: Апрель 17, 2025
ABSTRACT The agriculture industry has embraced recent technological advancements to ensure sustainable farming methods, increase resource efficiency, and boost productivity. Nonetheless, merging these technologies raised new security concerns, particularly protecting personal data preserving device communication integrity. We propose a lightweight stream cipher address challenges facilitate secure in smart environments. innovation lies the key‐generating block, which utilizes 128‐bit key 64‐bit Initialization Vector (IV) produce an 80‐bit keystream through iterative round functions. This process involves integration of dynamic nonlinear logic module robust state update mechanism, ensuring high entropy resistance against cryptanalytic attacks. In second phase, is initialized feedback shift register (NLFSR), where it undergoes additional transformations using specialized filter output functions generate final encryption keystream. two‐phase design not only ensures but also adapts effectively constraints systems. Comprehensive comparative evaluations demonstrate that proposed outperforms state‐of‐the‐art ciphers multiple benchmarks, such as Grain v1, Grain‐128, Trivium, Logic. suggested achieves higher throughput, ideal Shannon values, faster decryption times. It exhibits robustness with near‐zero correlation coefficients, passes all 16 NIST randomness tests, efficient memory usage, low power consumption, strong cryptographic makes solution tailored unique needs
Язык: Английский
Процитировано
0International Journal of Information Technology, Год журнала: 2024, Номер 16(6), С. 3691 - 3701
Опубликована: Июнь 22, 2024
Язык: Английский
Процитировано
3International Research Journal on Advanced Science Hub, Год журнала: 2024, Номер 6(06), С. 135 - 143
Опубликована: Июнь 5, 2024
Healthcare data has been moving to cloud platforms in recent years, which increased accessibility and scalability but also raised security issues. Ensuring integrity safeguarding private health information from unwanted access are critical. This paper presents a comprehensive strategy integrate effective Elliptic Curve Cryptography ECC-AES with steganography techniques improve the of healthcare cloud. is especially well-suited for situations limited resources since it provides strong reduced key sizes. Confidentiality guaranteed by encrypting using ECC- AES before storage, reducing possibility breaches. Steganography integrated against skilled adversaries adding an extra degree obfuscation concealing encrypted inside innocuous files or images. Strict management procedures, control systems, frequent audits important components proposed system that ensure adherence Health Insurance Portability Accountability Act (HIPAA) General Data Protection Regulation (GDPR) compliance requirements pertaining protection. The multilayer on environment than other existing systems.
Язык: Английский
Процитировано
1International Journal of Information Technology, Год журнала: 2024, Номер unknown
Опубликована: Июль 22, 2024
Язык: Английский
Процитировано
1International Journal of Information Technology, Год журнала: 2024, Номер unknown
Опубликована: Июль 29, 2024
Язык: Английский
Процитировано
1