Encryption and Anti-tampering Technology of Buddhist Digital Archives DOI
Qing Zhang

2021 7th Annual International Conference on Network and Information Systems for Computers (ICNISC), Год журнала: 2023, Номер unknown

Опубликована: Окт. 27, 2023

Язык: Английский

Analytical Approach for Data Encryption Standard Algorithm DOI Open Access
Obaida M. Al-hazaimeh, Moy’awiah A. Al-Shannaq, Mohammed J. Bawaneh

и другие.

International Journal of Interactive Mobile Technologies (iJIM), Год журнала: 2023, Номер 17(14), С. 126 - 143

Опубликована: Авг. 1, 2023

Although it was first developed and studied in the late 1970s early 1977s, Data Encryption Standard (DES) algorithm has grown popularity. There are two causes for this occurrence. First, DES algorithm's complex mathematical structure allows to serve as theoretical foundation a wide variety of applications. Second, encryption technique works quite well practice applications when implemented correctly. In paper, we undertake thorough practical review aspects sort demonstrate how they have been by executing multiple configurations.

Язык: Английский

Процитировано

5

An Efficient Image Encryption Scheme for Medical Image Security DOI Creative Commons

Zeenath,

K. Durgadevi,

John W Carey M

и другие.

International Journal of Electrical and Electronics Research, Год журнала: 2024, Номер 12(3), С. 964 - 976

Опубликована: Авг. 20, 2024

In the contemporary landscape of digital healthcare, confidentiality and integrity medical images have become paramount concerns, necessitating development robust security measures. This research endeavors to address these concerns by proposing an innovative image encryption scheme tailored specifically for enhancing security. The proposed integrates a sophisticated blend symmetric asymmetric techniques, complemented novel key management system, fortify protection data against unauthorized access malicious tampering. DNA-based algorithm leverages unique properties DNA encoding securely scramble data, providing added layer protection. By utilizing sequences in decryption processes, achieves high level confusion diffusion, significantly efficacy is validated through comprehensive experimental evaluations, which demonstrate its proficiency ensuring while maintaining computational efficiency. scheme's compatibility with existing imaging systems also examined, affirming seamless integration into healthcare infrastructures. contributes advancement efficient that strikes balance between stringent requirements practical implementation considerations. primary contributions include both enhance images. safeguarding images, empowers providers uphold patient privacy trust age. Experimental results show this approach ensures without compromising quality, making it suitable sensitive applications.

Язык: Английский

Процитировано

0

AES-Driven Image Encryption: Overcoming Security and Transmission Challenges DOI

Harshil Bodat,

Harshil Patel, Monika Arora

и другие.

Опубликована: Ноя. 21, 2024

Язык: Английский

Процитировано

0

A Smart Image Encryption Technology via Applying Personal Information and Speaker-Verification System DOI Creative Commons
Shih-Yu Li,

Chun-Hung Lee,

Lap-Mou Tam

и другие.

Sensors, Год журнала: 2023, Номер 23(13), С. 5906 - 5906

Опубликована: Июнь 26, 2023

In this paper, a framework for authorization and personal image protection that applies user accounts, passwords, I-vectors as the keys ciphering content was developed connected. There were two main systems in framework. The first involved speaker verification system, wherein entered their account information password to log into system provided short voice sample identification, then algorithm transferred user's (biometric) features, along with details, second encryption system. For process, name presented by applied produce initial conditions hyper-chaotic generate private image-shuffling ciphering. final stage, biometric features also protect of image, so technology would be more robust. results acceptable, lower correlation obtained cipher images. database we Pitch Tracking Database from Graz University Technology (PTDB-TUG), which microphone laryngoscope signals 20 native English speakers. processing, four standard testing images Southern California-Signal Image Processing Institute (USC-SIPI), including Lena, F-16, Mandrill, Peppers, further demonstrate effectiveness efficiency smart algorithm.

Язык: Английский

Процитировано

1

A Comprehensive Analysis of Anti-Image Manipulation Techniques: Advancements and Challenges DOI

A Ilavendhan,

N Vignesh

Опубликована: Дек. 11, 2023

Every individual relies on technology either directly or indirectly. Living in an Information Era means that even one's birthday is known to others who haven't been seen for years, via social media. This possible because of the data media extracts from user and keeping it securely their database as information. Even with assurance given by companies about information they store, many us still refuse share personal online factors like Data Breaches, phishing, etc. if access granted, images posted undergo unsightly alterations through various AI modification techniques employed certain individuals. With these image ranging subtle enhancements sophisticated forgeries, need robust solutions detect mitigate manipulations has become very crucial. research study based a novel approach traverse approaches preventing getting altered AI.

Язык: Английский

Процитировано

0

Encryption and Anti-tampering Technology of Buddhist Digital Archives DOI
Qing Zhang

2021 7th Annual International Conference on Network and Information Systems for Computers (ICNISC), Год журнала: 2023, Номер unknown

Опубликована: Окт. 27, 2023

Язык: Английский

Процитировано

0