[PDF][PDF] A novel encryption method for image security
MAF Al-Husainy - International Journal of Security and Its …, 2012 - academia.edu
Image encryption is one of the most methods of information hiding. A novel secure
encryption method for image hiding is presented in this paper. The proposed method …
encryption method for image hiding is presented in this paper. The proposed method …
MAC address as a key for data encryption
DMAF Al-Husainy - arxiv preprint arxiv:1311.3821, 2013 - arxiv.org
In computer networking, the Media Access Control (MAC) address is a unique value
associated with a network adapter. MAC addresses are also known as hardware addresses …
associated with a network adapter. MAC addresses are also known as hardware addresses …
Security analysis of a three‐dimensional rotation‐based image encryption
B Nini, C Lemmouchi - IET Image Processing, 2015 - Wiley Online Library
This study presents an analysis of the basis of a new method presented recently in the
image encryption domain. The method might use different schemes of bits projection where …
image encryption domain. The method might use different schemes of bits projection where …
[PDF][PDF] Genetic Algorithm: Tool to Encrypt Image.
F Al-Husainy, M Abbas - International Journal of Advanced …, 2012 - researchgate.net
Security is an important issue when digital images are transmitted through the internet and
cellular phones, as well as being important in encryption of the satellite images, and image …
cellular phones, as well as being important in encryption of the satellite images, and image …
[PDF][PDF] Bit-projection based color image encryption using a virtual rotated view
B Nini - Informatica, 2013 - informatica.si
It becomes commonly known that any important data exchange, mainly through a network,
should be subject to a previous encryption in order to avoid its misuse. The particular case of …
should be subject to a previous encryption in order to avoid its misuse. The particular case of …
[PDF][PDF] A Novel Gray Image Encryption Algorithm Based on Modified Transcendental Equation.
L Tu, Y Wang, N Li, S Guo - J. Softw., 2013 - jsoftware.us
In this paper a modified transcendental equation is proposed, and we analyzed its chaotic
characteristics and periodic. It is a simple non-linear mode, l but it has complex dynam ics …
characteristics and periodic. It is a simple non-linear mode, l but it has complex dynam ics …
[PDF][PDF] A Survey on Security of Permutation for only Image Encryption Schemes
N Aparna, M Kavyashree - scholar.archive.org
The improved technology has provided a facility for multimedia transmission (like images,
data, videos) over the open internet network but there are more chances of insecurity in this …
data, videos) over the open internet network but there are more chances of insecurity in this …
Proposed Technique for Encryption JPG and BMP Images
The technique of chaotic system is considered one of the applications for high security
encryption, where a color images sent is encrypted for the purpose of preserving from …
encryption, where a color images sent is encrypted for the purpose of preserving from …
[PDF][PDF] Exchanging Encrypted Documents Through Fax Machines
ELZ Mohamed, E Othman - Journal of the ACS, 2011 - asc.journals.ekb.eg
Even in this age of the Internet, the fax machine has remained an indispensable means of
communication because of its speed, simplicity and reliability. Faxes are also virtually …
communication because of its speed, simplicity and reliability. Faxes are also virtually …