PAN Agbedemnab, EY Baagyere… - 2019 IEEE …, 2019 - ieeexplore.ieee.org
The security of digital images has attracted serious attention lately. In this paper, we present a novel three-layered image encryption and decryption scheme capable of encrypting and …
MA Usman, OL Usman… - TASUED Journal of Pure …, 2023 - journals.tasued.edu.ng
Recently, there has been some interest in the development of a homomorphic privacy- preserving classification method for neuroimages based on the residue number system …
This paper proposes an algorithm that enhances the speed of transmission and secure images that are transmitted over internet or a network. The proposed cryptosystem uses a …
This study harnesses the useful number properties of the residue number system (RNS) to minimise energy consumption in a wireless sensor network. In a traditional cluster-based …
In recent times, there has been an increasing attention in designing a homomorphic privacy- preserving classification method for neuro-images based on the residue number system …
In this paper, we propose a perceptual video encryption algorithm that utilizes rotation matrix and unit anti-diagonal matrix to visually degrade video data with varying perceptibility …
BA Nathaniel - Computing & Information Systems, 2019 - search.ebscohost.com
Purpose: This paper presents a methodology for an image cryptosystem to ameliorate the problems of many existing digital image cryptosystems. The cryptosystem is based on a gray …
In this paper, the properties of rotation matrices are employed to construct special orthogonal matrices that are used to encrypt and decrypt video with varying perceptibility …
DD Popoola, K Alagbe - 2022 - africanscholarpublications.com
Secure communication across a digital medium is ensured by data security. The data should be guided against availability by unrecognised users and communicated to the right …