SA Jassim, AK Farhan - 2021 1st Babylon International …, 2021 - ieeexplore.ieee.org
Lightweight ciphers are defined as symmetric ciphers. They could be categorized into stream and block ciphers. A stream cipher is faster and less complex than block ciphers so it …
AS Jamil, AMS Rahma - International Journal of Online & …, 2023 - search.ebscohost.com
Recently, with the requirement for protecting the privacy of images transferred over the internet and media networks. The need to protect these images from hacking by …
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical …
Cryptographic key generation and data encryption and decryption using wearable biometric technologies is an emerging research area with significant potential for authentication and …
The context of multibiometric plays a pivotal role in enhancing an identification system, since a biometric system is now the most physical way of identifying and verifying individuals. The …
HT Assafli, IA Hashim, AA Naser - Applied Nanoscience, 2021 - Springer
Graphics processing units (GPUs) have become the target for high-speed and high- throughput computing in the last decade. The device provides excellent capabilities in …
A secure image could be achieved by encryption, a technique for securing images over different media transmission lines with privacy and keeping them safe for the receiver. This …
HS Wdhayeh, RA Azeez, AJ Mohammed - IRAQI JOURNAL OF …, 2023 - iasj.net
In this paper, an algorithm to hide information in an image using QR code technology is presented. QR Code “QUICK RESPONSE CODE” is a two-dimensional array that can …
F Ramadhanti, B Prakoso - Info Kripto, 2024 - infokripto.poltekssn.ac.id
Sistem biometrik menawarkan keunggulan yaitu memiliki keunikan yang berbeda pada setiap manusia. Biometrik juga memiliki keunggulan yaitu bersifat permanen, sulit …