Design a system for an approved video copyright over cloud based on biometric iris and random walk generator using watermark technique

RA Azeez, MK Abdul-Hussein, MS Mahdi… - … of Engineering and …, 2021 - pen.ius.edu.ba
Copyright is a tool for preventing anyone forged to copy an electronic work from another
person and claim that electronic work is referred to him. Since the identity of the person is …

A survey on stream ciphers for constrained environments

SA Jassim, AK Farhan - 2021 1st Babylon International …, 2021 - ieeexplore.ieee.org
Lightweight ciphers are defined as symmetric ciphers. They could be categorized into
stream and block ciphers. A stream cipher is faster and less complex than block ciphers so it …

Cyber Security for Medical Image Encryption using Circular Blockchain Technology Based on Modify DES Algorithm.

AS Jamil, AMS Rahma - International Journal of Online & …, 2023 - search.ebscohost.com
Recently, with the requirement for protecting the privacy of images transferred over the
internet and media networks. The need to protect these images from hacking by …

[PDF][PDF] An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments.

AS Jamil, RA Azeez, NF Hassan - International Journal of Online & …, 2023 - researchgate.net
Cyber security is a term utilized for describing a collection of technologies, procedures, and
practices that try protecting an online environment of a user or an organization. For medical …

The Emerging Challenges of Wearable Biometric Cryptosystems

KA Ajlan, T Alsboui, O Alshaikh, I Inuwa-Dute, S Khan… - Cryptography, 2024 - mdpi.com
Cryptographic key generation and data encryption and decryption using wearable biometric
technologies is an emerging research area with significant potential for authentication and …

[PDF][PDF] Multibiometric System with Runs Bits Permutation for Creating Cryptographic key Generation Technique

AS Jamil, RA Azeez, A Al-Adhami, NF Hassan - Iraqi Journal of Science, 2023 - iasj.net
The context of multibiometric plays a pivotal role in enhancing an identification system, since
a biometric system is now the most physical way of identifying and verifying individuals. The …

Advanced Encryption Standard (AES) acceleration and analysis using graphical processing unit (GPU)

HT Assafli, IA Hashim, AA Naser - Applied Nanoscience, 2021 - Springer
Graphics processing units (GPUs) have become the target for high-speed and high-
throughput computing in the last decade. The device provides excellent capabilities in …

Lightweight Image Encryption Based on A Hybrid Approach

AAJ Altaay, JN Hasoon, HK Albahadily - JOIV: International Journal on …, 2024 - joiv.org
A secure image could be achieved by encryption, a technique for securing images over
different media transmission lines with privacy and keeping them safe for the receiver. This …

[PDF][PDF] A Proposed Algorithm for Hiding a Text in an Image Using QR Code

HS Wdhayeh, RA Azeez, AJ Mohammed - IRAQI JOURNAL OF …, 2023 - iasj.net
In this paper, an algorithm to hide information in an image using QR code technology is
presented. QR Code “QUICK RESPONSE CODE” is a two-dimensional array that can …

Pembangkitan Kunci Berdasarkan Pengenalan Wajah Menggunakan Algoritma Kanade-Lucas-Tomasi

F Ramadhanti, B Prakoso - Info Kripto, 2024 - infokripto.poltekssn.ac.id
Sistem biometrik menawarkan keunggulan yaitu memiliki keunikan yang berbeda pada
setiap manusia. Biometrik juga memiliki keunggulan yaitu bersifat permanen, sulit …