A comparative review on non-chaotic and chaotic image encryption techniques
In the new era, multimedia technology is used extensively. Multimedia data transfers over
the Internet are not adequately stable. Data protection is needed for digital images transfer …
the Internet are not adequately stable. Data protection is needed for digital images transfer …
Assessment of hybrid cryptographic algorithm for secure sharing of textual and pictorial content
Nowadays, networks have become global in scope, and information has assumed a digital
shape. Due to the volume of data transmitted over the internet, data security has become a …
shape. Due to the volume of data transmitted over the internet, data security has become a …
Secure framework enhancing AES algorithm in cloud computing
The tremendous growth of computational clouds has attracted and enabled intensive
computation on resource‐constrained client devices. Predominantly, smart mobiles are …
computation on resource‐constrained client devices. Predominantly, smart mobiles are …
[PDF][PDF] Securing Transmitted Color Images Using Zero Watermarking and Advanced Encryption Standard on Raspberry Pi.
Image authentication techniques have recently received a lot of attention for protecting
images against unauthorized access. Due to the wide use of the Internet nowadays, the …
images against unauthorized access. Due to the wide use of the Internet nowadays, the …
[PDF][PDF] Hybrid cryptography with a one–time stamp to secure contact tracing for covid–19 infection
The COVID-19 pandemic changed the lives of millions of citizens worldwide in the manner
they live and work to the so-called new norm in social standards. In addition to the …
they live and work to the so-called new norm in social standards. In addition to the …
Hybrid Cryptographic Approach: For Secure Data Communication using Block Cipher Techniques
A Gour, SS Malhi, G Singh, G Kaur - E3S Web of Conferences, 2024 - e3s-conferences.org
In our rapidly evolving digital age, where data is the lifeblood of businesses and individuals
alike, safeguarding sensitive information and ensuring secure communication channels has …
alike, safeguarding sensitive information and ensuring secure communication channels has …
[PDF][PDF] Performance evaluation of hybrid cryptography algorithm for secure sharing of text & images
Nowadays, the networks have gone global and information has taken the digital form. Since,
large amount of data transferred over the internet, data security becomes challenging issue …
large amount of data transferred over the internet, data security becomes challenging issue …
A payload scrambling technique for secure image steganography
S Rathor, V Rawal, K Chhavi - Advances in Data and Information Sciences …, 2022 - Springer
Communication is the basic need of everyone. It may be in the form of text, image or video.
No one wants to public his/her message to everyone. Therefore, such a technique is …
No one wants to public his/her message to everyone. Therefore, such a technique is …
A novel permutation based encryption using tree traversal approach
Background: In 21st century one of the emerging issues is to secure the information stored
and communicated in digital form. There is no assurance that the data we have sent may be …
and communicated in digital form. There is no assurance that the data we have sent may be …
Performance of Secure Framework AES Algorithm using Cloud Computing
R Rani, RK Bathla - Journal of Scientific Research, 2024 - banglajol.info
The conventional advanced encryption standard (AES) method requires improvement to
accommodate modern security hazards in cloud computing. Outsourcing private and secret …
accommodate modern security hazards in cloud computing. Outsourcing private and secret …