A comparative survey of symmetric and asymmetric key cryptography

S Chandra, S Paira, SS Alam… - … conference on electronics …, 2014 - ieeexplore.ieee.org
Network security is an important aspect of information sharing. Attempts have been made to
remove various insecurities over internet. For this, many technological implementations and …

A property-based testing framework for encryption programs

C Sun, Z Wang, G Wang - Frontiers of Computer Science, 2014 - Springer
In recent years, a variety of encryption algorithms were proposed to enhance the security of
software and systems. Validating whether encryption algorithms are correctly implemented …

Privacy protection of biometric traits using modified hill cipher with involutory key and robust cryptosystem

B Acharya, MD Sharma, S Tiwari, VK Minz - Procedia Computer Science, 2010 - Elsevier
In this paper we have proposed a technique for securing biometric traits using the modified
Hill Cipher with an involutory key and a robust cryptosystem. The Modified Hill Cipher solves …

Iris template protection based on Enhanced Hill cipher

ET Khalaf, MN Mohammed, N Sulaiman - Proceedings of the 2016 …, 2016 - dl.acm.org
Biometric is uses to identify authorized person based on specific physiological or behavioral
features. Template protection is a crucial requirement when designing an authentication …

Cryptography and digital image steganography techniques

DK Sarmah, AJ Kulkarni, A Abraham… - Optimization Models in …, 2020 - Springer
Exchange of secure information between the sender and receiver draws the attention of
several researchers due to its importance in various fields ranging from national security …

One-Time Involutory Matrix-Based Hill Cipher Modification.

A Chefranov, E Dukhnich… - Journal of Information …, 2020 - search.ebscohost.com
Hill cipher needs inverse of the key-matrix for decryption. To avoid inversion, involutory
matrices can be used. Known Hill cipher variants with involutory matrices have memory and …

Encryption and decryption of informative image by key image using modified Hill cipher technique based on non-invertible matrices

B Acharya, N Thomas, DRK Arasu… - Proceedings of the 2011 …, 2011 - dl.acm.org
Data security is the science and study of methods of protecting data in computer and
communication system from disclosure to unauthorized users. The main aim of encoding is …

Digital image security using Matrix and non-linear Pixel Transformation

JMK Mastan, GA Sathishkumar… - 2011 International …, 2011 - ieeexplore.ieee.org
With the increased use of digital images in numerous fields, especially sensitive ones like
medicine and military where confidentiality is extremely important, their encryption has …

[PDF][PDF] Proposed AES for Image Steganography in Different Medias

Y Goyal, M Sharma - … Journal of Research in Engineering and …, 2014 - academia.edu
In this paper, the author presents an enhanced version of modified AES for image-audio
steganography technique. The proposed technique improves the security level of encryption …

A Modification of the Hill Cipher Based on Doubly Periodic Encryption and Length Variation

T Thongjunthug, J Jantarima - KKU Science Journal, 2017 - ph01.tci-thaijo.org
In this research, we propose a modification of the Hill cipher using doubly periodic
encryption, which requires two types of keys with different periodicity when encrypting each …