… will affect people's daily life, affect the image of the government, … Therefore, how to protect the informationsecurity of the … Based on the experience and comparativestudy, this paper …
… transmit various types of data such as audio, video, image and … cryptography includes various aspects in datasecurity like … of the algorithm in comparison with standard LSB algorithm. …
… the security performance of the AES algorithm,encryption … and other aspects of the study,Finally,a comparativeanalysis … informationsecurity,finally,the model is analyzed and …
X Zhang, J Di - Available at SSRN 4605007 - papers.ssrn.com
… , this paper proposes an imageencryptionalgorithm based on a … algorithms in a comparative analysis. This paper uses the … journal of InformationSecurity and Applications. 50: 102428. …
… ciphers, block ciphers play an important role in protecting informationsecurity; today’s mainstream block cipher algorithms include DES, AES, SMS4 and otherencryption algorithms. As …
SA Hussein, MR Kareem - 西南交通大学学报, 2019 - researchgate.net
… authors provided a comparativeanalysis of data yielded by a … algorithm to extract text from text images, which reduced a lot … Design a new encryptionalgorithm that differs from ours to …
… In addition, our proposed security threat is applied to an image copy detection method … method based on homomorphic encryption. In our method, homomorphic comparison is a key …
… scheme has better performance in information entropy and resistance to differential attacks, and comparing the results of related references. 3.A new color imageencryption scheme is …
… , called an encryption sequence, on the secret image into m … The second method of our scheme utilizes a comparison and … gray level image,” The 14th InformationSecurity Conference, …