[HTML][HTML] A hybrid approach to secure and compress data streams in cloud computing environment

A Abdo, TS Karamany, A Yakoub - … of King Saud University-Computer and …, 2024‏ - Elsevier
Cloud computing has revolutionized the way businesses and individuals manage and utilize
computing resources, providing significant benefits such as scalability, flexibility, and cost …

Deep convolutional neural network-based system for fish classification

A Al Smadi, A Mehmood, A Abugabah… - … Journal of Electrical …, 2022‏ - zuscholars.zu.ac.ae
In computer vision, image classification is one of the potential image processing tasks.
Nowadays, fish classification is a wide considered issue within the areas of machine …

A Comprehensive analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges

D Ramakrishna, MA Shaik - IEEE Access, 2024‏ - ieeexplore.ieee.org
Cryptographic techniques are reviewed in this literature review, with particular attention paid
to their applicability, importance, contributions, and field strengths. These algorithms include …

[PDF][PDF] Best S-box amongst differently sized S-boxes based on the avalanche effect in‎ the advance encryption standard algorithm

HM Taher, SQ Abd Al-Rahman… - International Journal of …, 2022‏ - researchgate.net
Substitution boxes are essential nonlinear modules that are popular in block cipher
algorithms. They also play a significant role in the security area because of their robustness …

Data Security Using Crypto Bipartite Graph Theory with Modified Diffie–Hellman Algorithm

VH Shastri, C Pragathi - Wireless Personal Communications, 2024‏ - Springer
Sharing confidential information over an unprotected channel is prone to privacy breaches
since unauthorized parties can steal the data. Therefore, develo** a cryptosystem that …

[PDF][PDF] Exploring Steganographic Techniques for Enhanced Data Protection in Digital Files

R Din, AH Shakir, SH Ali, AJQ Almaliki… - International Journal of …‏ - researchgate.net
This article delves into the intricate field of digital steganography, a pivotal method for
ensuring the confidentiality and integrity of hidden data within digital files. As digital …

[PDF][PDF] Steganography Traditional Methods and M2PAM in Social Media Environments: A Survey

OA Najm, A Nori - Al-Rafidain Journal of Computer Sciences and …, 2024‏ - iasj.net
Steganography is considered as one of the most important topics in the field of data security.
This is because of the exponential progress and secret communication of prospective …

New Block Cipher Encryption Based On OTP Algorithm

J Al-Nemri, M Naser - 2022 International Conference on …, 2022‏ - ieeexplore.ieee.org
The current world revolves around encryption. Every time a mobile phone call is made, a
credit card is used in a store or on the Internet, or to withdraw cash from an ATM, encryption …

Enhanced Data Security and Storage Efficiency in Cloud Computing: A Survey of Data Compression and Encryption techniques

A Abdo, T Salem Karamany… - النشرة المعلوماتية في …, 2024‏ - journals.ekb.eg
Cloud computing is the most recent technology to emerge in the last several decades. Which
has gained significant popularity across various organizations because of the benefits it …

Improving Web Performance with Lazy Loading and Minification Algorithms

S Iddrisu, D Asenso, W Asiedu - Journal of Web Development and …, 2025‏ - matjournals.net
In this rapidly evolving digital landscape, web performance optimization has become an
indispensable element in facilitating user contentment and engagement. This article …