Image encryption based on AES and RSA algorithms

DM Alsaffar, AS Almutiri, B Alqahtani… - 2020 3rd …, 2020 - ieeexplore.ieee.org
Cryptography is the science that concern of protecting data by transforming its
comprehensible form into incomprehensible one. This study aims to compare between …

[PDF][PDF] Analysis of cryptographic algorithms for network security

K Acharya, M Sajwan, S Bhargava - International Journal of …, 2013 - academia.edu
Cryptography plays a major role in securing data. It is used to ensure that the contents of a
message are confidentially transmitted and would not be altered. Network security is most …

[PDF][PDF] Image encryption based on AES algorithm and XOR operation

VA Saeed, BH Sadiq - Academic Journal of Nawroz University, 2023 - researchgate.net
Sending digital pictures across open networks has emerged as a major privacy risk in recent
years. Despite the environment's adaptability and the many benefits it offers, there are …

Secure Content Protection Schemes for Industrial IoT with SRAM PUF-Based One-Time Use Cryptographic Keys

S Jain, AR Korenda, B Cambou, C Lucero - Science and Information …, 2024 - Springer
This paper outlines our primary objectives, which revolved around devising a robust and
lightweight solution for safeguarding industrial Internet of Things (IoT) device's content. Our …

[PDF][PDF] Cryptography: The Sciene of Secure Communication

JSKM Anusha, A Vijaykumar, M Kavya - IJCSNS, 2016 - researchgate.net
Day by day network and internet applications is becoming very popular. Sensitive
information requires security and safety measures. Security is the most challenging aspect in …

[PDF][PDF] Hiding the message using cryptography in video steganography

R Bansal, N Badal - Int J Sci Technol Res, 2020 - academia.edu
These instructions give you In modern world Internet is an important medium to transfer the
information or data (text, image, video, audio) from one place to another place. But sometime …

[PDF][PDF] DATA ENCRYPTION STANDARD BASED AES ALGORITHM IN INTERNET OF THINGS ENVIRONMENT

PR Lingam, R Mishra - romanpub.com
Encrypting information so that it cannot be read plaintext is the focus of the field of study
known as cryptography. The most popular and widely-used kind of symmetric encryption …

A new Symmetric Approach to Cryptography

A Sohail - International Journal of Technology and Research, 2017 - search.proquest.com
Today data transmission is very important through different network. Need of Network
security comes to secure data transformation from one network to another network. As the …

[PDF][PDF] A New Approach to Segmentation of On-Line Persian Cursive Words

MR Golestani, M Khademi, A Moeini - Citeseer
Segmentation approaches, as processes that divide word into smaller parts which contain
one letter at most, have important effect on cursive word recognition. While online cursive …

[引用][C] Implementation of Lime Framework for Data Provenance

U Rani - MAYFEB Journal of Electrical and Computer …, 2017 - mayfeb.com
Security is the important component during the data transfer through the network. Secure
transmission of confidential data is a challenging issue. The data can be accessed by the …