Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Mohammed Abbas Fadhil Al-Husainy"'
Publikováno v:
Journal of Information and Organizational Sciences, Vol 47, Iss 2, Pp 333-354 (2023)
In the digital world, information is exposed anytime, anywhere, to everybody, hence its privacy is a crucial matter. No matter how complicated the encryption algorithm is, it requires a strong and hard-to-break encryption key. Since the three-dimensi
Externí odkaz:
https://doaj.org/article/5181d901d2804cffa13223f7b22d646f
Publikováno v:
International Journal of Technology, Vol 10, Iss 4, Pp 731-740 (2019)
With the wide range use of digital communication technologies, the Internet has been commonly used as a channel for transmitting various images. Steganography practises have been implemented for achieving such secure transmission. The main focus o
Externí odkaz:
https://doaj.org/article/823122366eef4934bd85ff5dce8685d5
Publikováno v:
International Journal of Computing and Digital Systems. 12:823-836
Publikováno v:
International Journal of Advanced Trends in Computer Science and Engineering. 9:1840-1847
The need for a reliable and fast encryption algorithm to encrypt medical data for patients is an extremely important topic to be considered especially during pandemic times such as the pandemic COVID-19. This pandemic forced governments and healthcar
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::31285bf6177371bc9f6755c81251d3c2
https://zenodo.org/record/5773553
https://zenodo.org/record/5773553
Publikováno v:
International Journal of Advanced Science and Technology. 130:21-32
Publikováno v:
International Journal of Information and Computer Security. 1:1
Publikováno v:
Journal of Computer Science. 14:753-763
Due to the vast interchange of images over the internet, exchanging secret message hidden in these images would be encouraged and the technique is referred to as image steganography. Hiding the secret data into the least significant bits of the image
Publikováno v:
Computers and Electrical Engineering. 95:107418
Many lightweight encryption algorithms have been developed for tackling the limitations of resources on the Internet of Things (IoT) devices. Such devices have limited processing capabilities in terms of speed, storage, and memory. In this paper, we
Publikováno v:
RAIRO - Theoretical Informatics and Applications. 50:241-249
In the digital era, most types of transmitted data over the Internet are images. These images may carry secret information. So, it became necessary to have an effective encryption system to hide information inside these images. The use of random and