Search

Showing total 1,583 results
1,583 results

Search Results

1. Fast edge integration based active contours for color images

2. A comparative analysis of chaos theory based medical image steganography to enhance data security.

3. Optimized steganography techniques based on PVDS and genetic algorithm.

4. Sharing secrets in stego images with authentication

5. Orbit design of satellite quantum key distribution constellations in different ground stations networks.

6. New constructions of balanced Boolean functions with the maximum possible Walsh supports.

7. Investigation of crypto-algorithms for Stability Assessment.

8. Efficient color image steganography based on new adapted chaotic dynamical system with discrete orthogonal moment transforms.

9. Encoder-Decoder Architecture for Image Steganography using Skip Connections.

10. Efficient hardware implementations of lightweight Simeck Cipher for resource-constrained applications.

11. Event-triggered impulsive cluster synchronization of coupled reaction–diffusion neural networks and its application to image encryption.

12. An improvement of both security and reliability for AES implementations.

13. A multi-image hiding technique in dilated video regions based on cooperative game-theoretic approach.

14. An improved lightweight and privacy preserving authentication scheme for smart grid communication.

15. A multi-level random key cryptosystem based on DNA encoding and state-changing mealy machine.

16. An easy-to-implement construction for [formula omitted]-threshold progressive visual secret sharing schemes.

17. A unified construction of weightwise perfectly balanced Boolean functions.

18. Robust watermarking method for securing color medical images using Slant-SVD-QFT transforms and OTP encryption.

19. On the use of dynamical systems in cryptography.

20. Temporal action segmentation for video encryption.

21. A survey on Deep-Learning-based image steganography.

22. Cryptanalysis of an image encryption scheme using variant Hill cipher and chaos.

23. Deep learning for steganalysis of diverse data types: A review of methods, taxonomy, challenges and future directions.

24. Nonlinear analysis, circuit implementation, and application in image encryption of a four-dimensional multi-scroll hyper-chaotic system.

25. Cryptography and trust

26. Security Implementation on IoT using CoAP and Elliptical Curve Cryptography.

27. Chosen ciphertext correlation power analysis on Kyber.

28. Nonlinearity of Many-Valued Logic Component Functions of Modern Cryptographic Algorithms S-boxes.

29. Reversible Data Hiding Scheme for Images Using Gray Code Pixel Value Optimization.

30. Glimpses are forever in RC4 amidst the spectre of biases.

31. Internet of things and ransomware: Evolution, mitigation and prevention.

32. A review of coverless steganography.

33. Exploring the future application of UAVs: Face image privacy protection scheme based on chaos and DNA cryptography.

34. A multiple-image encryption algorithm based on orthogonal arrays with strength 3.

35. PNAS: A privacy preserving framework for neural architecture search services.

36. Community oriented socio-behavioural PentaPlicative Cipher Technique.

37. The number of affine equivalent classes and extended affine equivalent classes of vectorial Boolean functions.

38. Security analysis and enhancements of an image cryptosystem based on hyperchaotic system.

39. Quantum algorithm for the multicollision problem.

40. On the number of roots of some linearized polynomials.

41. Cryptographic hardness under projections for time-bounded Kolmogorov complexity.

42. Structural consensus in networks with directed topologies and its cryptographic implementation.

43. Several classes of PcN power functions over finite fields.

44. Compact hardware accelerator for field multipliers suitable for use in ultra-low power IoT edge devices.

45. Anti-attacks encryption algorithm based on DNA computing and data encryption standard.

46. Hiding patients' medical reports using an enhanced wavelet steganography algorithm in DICOM images.

47. Analysing RSA and PAILLIER homomorphic Property for security in Cloud.

48. Systematic literature review and analysis for Arabic text steganography method practically.

49. Provably throttling SQLI using an enciphering query and secure matching.

50. Using easy coefficients conjecture for rotation symmetric Boolean functions.