Modified blind source separation for securing end-to-end mobile voice calls

OALA Ridha, GN Jawad… - IEEE Communications …, 2018 - ieeexplore.ieee.org
This letter proposes a novel method of a highly secured time domain cryptosystem to
provide security for mobile voice calls. Using a modified version of blind source separation …

Joint compression and encryption of visual data using orthogonal parametric transforms

D Puchala, MM Yatsymirskyy - Bulletin of the Polish Academy of Sciences …, 2016 - infona.pl
In this paper, we introduce a novel method of joint compression and encryption of visual
data. In the proposed approach the compression stage is based on block quantization while …

An efficient and effective lossless symmetric key cryptography algorithm for an image

N Kumar, S Agrawal - 2014 International Conference on …, 2014 - ieeexplore.ieee.org
Modern era is fully dependent on internet communication. Through internet we can transfer
data anywhere in the world. The Internet was born of academic efforts to share information; it …

Application of residue number system (RNS) to image processing using orthogonal transformation

GK Armah, E Ahene - 2015 IEEE International Conference on …, 2015 - ieeexplore.ieee.org
Several techniques for image encryption have been proposed over the years with significant
consideration of basic cryptographic goals such as authentication, integrity and …

Architecture of instant messaging systems for secure data transmision

ZJ Florez, RC Logreira, M Muñoz… - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
The use of online messaging systems to exchange information has changed due to the
ability to share text, video and pictures almost immediately. Also it has become an excellent …

Multimodal biometric recognition using iris and face features

S Alshebli, F Kurugollu, M Shafik - Advances in Manufacturing …, 2021 - ebooks.iospress.nl
Multimodal biometrics has recently gained interest over single biometric modalities. This
interest stems from the fact that this technique offers improvements in recognition and more …

A Revocable Attribute-based Cloud Security for Data Access using Encryption and Biometric Identification.

MS Nejad, MV Malakooti, NH Taba - International Journal of Digital …, 2019 - go.gale.com
Cloud computing is an emerging technology in which it has been used to provide an efficient
solution for the affordable, trustable, and fastest storage and retrieval of the information. The …

Design and Implementation of Dual Channel Speech Signal Transceiver System Based on FPGA

T Yang, S Shi - International Conference on 5G for Future Wireless …, 2022 - Springer
Real-time speech information has always been the main way of information transmission,
but there are still problems in transmission. Firstly, while speech signals are easy to transmit …

[图书][B] Multimodal biometric systems for personal identification and authentication using machine and deep learning classifiers

S Alshebli - 2022 - search.proquest.com
Multimodal biometrics, using machine and deep learning, has recently gained interest over
single biometric modalities. This interest stems from the fact that this technique improves …

[PDF][PDF] A Novel Method for Secure Image Delivery over Mobile Networks Based on Orthogonal Transforms and Scrambling Algorithms

We have presented a novel method for secure image delivery over the mobile networks. Our
method is based an Orthogonal Transform, Malakooti Orthogonal Transform (MOT), as well …