Preliminary Experiments of a Real-World Authentication Mechanism Based on Facial Recognition and Fully Homomorphic Encryption

G Crihan, L Dumitriu, MV Crăciun - Applied Sciences, 2024 - mdpi.com
In the current context in which user authentication is the first line of defense against
emerging attacks and can be considered a defining element of any security infrastructure …

Holographic encryption algorithm based on the new integrated chaotic system and chaotic mask

Z Liang, L Chen, K Chen, Z Liang, J Zhu, K Wen… - Physica …, 2024 - iopscience.iop.org
Image encryption algorithms based on chaos theory have rapidly developed in recent years,
with many achieving encryption by confusion-diffusion structures. However, the security …

A Super Encryption Approach for Enhancing Digital Security using Column Transposition-Hill Cipher for 3D Image Protection

LB Handoko, C Umam - Kinetik: Game Technology, Information …, 2024 - kinetik.umm.ac.id
Image encryption is an indispensable technique in the realm of information security, serving
as a pivotal mechanism to safeguard visual data against unauthorized access and potential …

Securing Tuberculosis Disease Detection with IoT-Driven Improved AlexNet and RSA Encryption

S Kavitha, HS Nagamani, S Rallapalli… - 2024 International …, 2024 - ieeexplore.ieee.org
This study provides tuberculosis (TB) disease detection method that protects patient data
and is accurate. It uses homomorphic filtering to improve chest X-ray images using the …

Image encryption algorithm based on a memcapacitor‐based hyperchaotic system and DNA coding

BA Belete, DJ Gelmecha, RS Singh - Security and Privacy - Wiley Online Library
In today's digitally connected world, the protection of privacy and data security in open
communication media (OCM) is paramount. As digital devices become more widespread …