[HTML][HTML] A hybrid approach to secure and compress data streams in cloud computing environment
Cloud computing has revolutionized the way businesses and individuals manage and utilize
computing resources, providing significant benefits such as scalability, flexibility, and cost …
computing resources, providing significant benefits such as scalability, flexibility, and cost …
Deep convolutional neural network-based system for fish classification
In computer vision, image classification is one of the potential image processing tasks.
Nowadays, fish classification is a wide considered issue within the areas of machine …
Nowadays, fish classification is a wide considered issue within the areas of machine …
A Comprehensive analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges
Cryptographic techniques are reviewed in this literature review, with particular attention paid
to their applicability, importance, contributions, and field strengths. These algorithms include …
to their applicability, importance, contributions, and field strengths. These algorithms include …
[PDF][PDF] Best S-box amongst differently sized S-boxes based on the avalanche effect in the advance encryption standard algorithm
Substitution boxes are essential nonlinear modules that are popular in block cipher
algorithms. They also play a significant role in the security area because of their robustness …
algorithms. They also play a significant role in the security area because of their robustness …
Data Security Using Crypto Bipartite Graph Theory with Modified Diffie–Hellman Algorithm
VH Shastri, C Pragathi - Wireless Personal Communications, 2024 - Springer
Sharing confidential information over an unprotected channel is prone to privacy breaches
since unauthorized parties can steal the data. Therefore, develo** a cryptosystem that …
since unauthorized parties can steal the data. Therefore, develo** a cryptosystem that …
[PDF][PDF] Exploring Steganographic Techniques for Enhanced Data Protection in Digital Files
R Din, AH Shakir, SH Ali, AJQ Almaliki… - International Journal of … - researchgate.net
This article delves into the intricate field of digital steganography, a pivotal method for
ensuring the confidentiality and integrity of hidden data within digital files. As digital …
ensuring the confidentiality and integrity of hidden data within digital files. As digital …
[PDF][PDF] Steganography Traditional Methods and M2PAM in Social Media Environments: A Survey
Steganography is considered as one of the most important topics in the field of data security.
This is because of the exponential progress and secret communication of prospective …
This is because of the exponential progress and secret communication of prospective …
New Block Cipher Encryption Based On OTP Algorithm
The current world revolves around encryption. Every time a mobile phone call is made, a
credit card is used in a store or on the Internet, or to withdraw cash from an ATM, encryption …
credit card is used in a store or on the Internet, or to withdraw cash from an ATM, encryption …
Enhanced Data Security and Storage Efficiency in Cloud Computing: A Survey of Data Compression and Encryption techniques
Cloud computing is the most recent technology to emerge in the last several decades. Which
has gained significant popularity across various organizations because of the benefits it …
has gained significant popularity across various organizations because of the benefits it …
Improving Web Performance with Lazy Loading and Minification Algorithms
S Iddrisu, D Asenso, W Asiedu - Journal of Web Development and …, 2025 - matjournals.net
In this rapidly evolving digital landscape, web performance optimization has become an
indispensable element in facilitating user contentment and engagement. This article …
indispensable element in facilitating user contentment and engagement. This article …