Use of elliptic curve cryptography for multimedia encryption
The unique characteristics of the elliptic curve cryptography (ECC) such as the small key
size, fast computations and bandwidth saving make its use attractive for multimedia …
size, fast computations and bandwidth saving make its use attractive for multimedia …
An efficient image encryption technique based on optimized key generation in ECC using genetic algorithm
Nowadays image encryption has turned into an approach to transmit interactive image
information with utmost confidentiality and authenticity. In order to transmit the secret …
information with utmost confidentiality and authenticity. In order to transmit the secret …
Optimal visual cryptographic scheme with multiple share creation for multimedia applications
The criminal activity of hackers to retrieve the highly secured information on multimedia
application generates major security concerned problems towards the human life. Basically …
application generates major security concerned problems towards the human life. Basically …
[PDF][PDF] Image encryption using logistic-cosine-sine chaos map and elliptic curve cryptography
ABSTRACT A number of image encryption schemes based upon chaotic systems proposed
in the past, have been found to be vulnerable to known-plaintext attack due to the usage of …
in the past, have been found to be vulnerable to known-plaintext attack due to the usage of …
Multiple share creation based visual cryptographic scheme using diffusion method with a combination of chaotic maps for multimedia applications
In the modern years, multimedia security has become a prime agenda for secure
transmission over unsecured channels due to the increase in digitalization of media …
transmission over unsecured channels due to the increase in digitalization of media …
Software application for simulation-based AES, RSA and elliptic-curve algorithms
In this paper we represent a develo** work in an advanced algorithm for image
encryption. First, we have programmed a flexible encrypting algorithms based on AES, RSA …
encryption. First, we have programmed a flexible encrypting algorithms based on AES, RSA …
Performance analysis of elliptic curves for real-time video encryption
The use of real-time video streaming is increasing day-by-day, and its security has become
a serious issue now. Video encryption is a challenging task because of its large frame size …
a serious issue now. Video encryption is a challenging task because of its large frame size …
JPEG mage encryption with Elliptic Curve Cryptography
Nowadays, the topic of multipurpose use of images is thriving in the fields of security
establishment, authentication, watermarking, and etc. Simultaneously, the rise of …
establishment, authentication, watermarking, and etc. Simultaneously, the rise of …
Scalable Anomaly Detection for Large-Scale Heterogeneous Data in Cloud Using Optimal Elliptic Curve Cryptography and Gaussian Kernel Fuzzy -Means …
In most systems, a smart functionality is enabled through an essential vital service such as
detecting anomalies from complex, large-scale and dynamic data. However, ensuring the …
detecting anomalies from complex, large-scale and dynamic data. However, ensuring the …
Map** images over elliptic curve for encryption
The emergence of Elliptic curve cryptography as a preferred cryptographic scheme using
minimal computational resources is quite discernible. Its extension to the domain of image …
minimal computational resources is quite discernible. Its extension to the domain of image …