[引用][C] Review on encryption ciphers of cryptography in network security

G Gupta, R Chawla - International Journal of Advanced Research in …, 2012

[引用][C] An enhanced text to image encryption technique using RGB substitution and AES

S Singh, A Jain - International Journal of Engineering Trends and …, 2013

[Retracted] Application of Data Image Encryption Technology in Computer Network Information Security

L Li - Mathematical Problems in Engineering, 2022 - Wiley Online Library
In order to solve the practical problem that the security of computer network information
cannot be guaranteed, which seriously affects the network performance, the author …

A hybrid network security algorithm based on Diffie Hellman and Text-to-Image Encryption algorithm

A Abusukhon, MN Anwar, Z Mohammad… - Journal of Discrete …, 2019 - Taylor & Francis
Nowadays, the rapid growth of Internet applications open the doors for people to
communicate and do business around the world and thus saving time, efforts and money …

Study of file encryption and decryption system using security key

G Hu - 2010 2nd International Conference on Computer …, 2010 - ieeexplore.ieee.org
The paper tries to have made a study of the security keys of USB, which can achieve these
functions such as data encryption, digital signature, and identity authentication. Based on …

[PDF][PDF] ALGORITHM DESIGN OF SECURE DATA MESSAGE TRANSMISSION BASED ON OPENSSL AND VPN.

SH Zhu - Journal of Theoretical & Applied Information …, 2013 - academia.edu
In order to solve the safety problem that remote or mobile users can perform secure data
transmission among different computers via enterprise internal network, conventional …

[引用][C] A comparative study of performance analysis of various encryption algorithms

G Yadav, A Majare - International Conference On Emanations in Modern …, 2017

[PDF][PDF] Symmetric key generation method using digital image

A Odeh, A Abu-Errub, M Awad - International Journal of Computer …, 2015 - academia.edu
In this paper, the authors propose a new key generation algorithm based on using a binary
image. The proposed algorithm converts 16× 16 binary array representing the digital image …

Image encryption and decryption in public key cryptography based on MR

DIG Amalarethinam, JS Geetha - … International Conference on …, 2015 - ieeexplore.ieee.org
In the past decade, image encryption is given much attention in research of information
security and a lot of image encryption algorithms have been introduced. Due to some …

A novel video encryption algorithm-based on speaker voice as the public key

OM Al-Hazaimeh, N Alhindawi… - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
Advances in the digital content transmission have been extremely increased in the past few
years. In addition, the security and privacy issues of the transmitted data have increasingly …