نتایج جستجو برای: Simultaneous Encryption

تعداد نتایج: 143810  

Watermarking is one of the best solutions for copyright protection and authentication of multimedia contents. In this paper a hybrid scheme is proposed using wavelet and shearlet transforms with singular value decomposition. For better security, Arnold map is used for encryption. Examining the results and comparing with other methods show that this hybrid proposed scheme with simultaneous utili...

2003
Chung-E Wang

This paper describes cryptographic methods for concealing information during data compression processes. These include novel approaches of adding pseudo random shuffles into the processes of dictionary coding (Lampel-Ziv compression), arithmetic coding, and Huffman

Journal: :IACR Cryptology ePrint Archive 2012
Rajeswari Mukesh

Image compression and image encryption are pivotal to proper storage and transmission of images over MANET. Simultaneous image compression and encryption aims at achieving enhanced bandwidth utilization and security at the same time. The Number Theory based Image Compression and Quasigroup Encryption (NTICQE) algorithm employs number theoretic paradigm Chinese Remainder Theorem and Quasigroup E...

Journal: :IACR Cryptology ePrint Archive 2016
Duggirala Meher Krishna Duggirala Ravi

In this paper, algorithms for multivariate public key cryptography and digital signature are described. Plain messages and encrypted messages are arrays, consisting of elements from a fixed finite ring or field. The encryption and decryption algorithms are based on multivariate mappings. The security of the private key depends on the difficulty of solving a system of parametric simultaneous mul...

2014
Daniel Luchaup Kevin P. Dyer Somesh Jha Thomas Ristenpart Thomas Shrimpton

Encryption schemes where the ciphertext must abide by a specified format have diverse applications, ranging from in-place encryption in databases to per-message encryption of network traffic for censorship circumvention. Despite this, a unifying framework for deploying such encryption schemes has not been developed. One consequence of this is that current schemes are ad-hoc; another is a requir...

2013
Ali Farmani Hossein Balazadeh Bahar

This paper describes the implementation of a low power and high-speed encryption algorithm with high throughput for encrypting the image. Therefore, we select a highly secured symmetric key encryption algorithm AES(Advanced Encryption Standard), in order to decrease the power using retiming and glitch and operand isolation techniques in four stages, control unit based on logic gates, optimal de...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید