Zobrazeno 1 - 10
of 1 326
pro vyhledávání: '"Plain text"'
Autor:
Jialu Lv
Publikováno v:
EURASIP Journal on Information Security, Vol 2024, Iss 1, Pp 1-13 (2024)
Abstract Personalized medical data privacy and secure storage protection face serious challenges, especially in terms of data security and storage efficiency. Traditional encryption and storage solutions cannot meet the needs of modern medical data p
Externí odkaz:
https://doaj.org/article/716befbc83f14d66ad0fc37b46443f4b
Publikováno v:
Genome Biology, Vol 24, Iss 1, Pp 1-32 (2023)
Abstract We propose a polynomial algorithm computing a minimum plain-text representation of k-mer sets, as well as an efficient near-minimum greedy heuristic. When compressing read sets of large model organisms or bacterial pangenomes, with only a mi
Externí odkaz:
https://doaj.org/article/a58fe2d18cc44bdfa56a3c93873dd863
Publikováno v:
Jisuanji kexue, Vol 49, Iss 1, Pp 345-352 (2022)
Plain text information hiding is vulnerable to active attacks such as deletion and change,which makes the embedded secret information damaged.Blockchain is characterized by non-tampering,non-forgery,anonymity and node information synchronization,maki
Externí odkaz:
https://doaj.org/article/1e0f59f1a0ea41c389b3751abff9ae49
Publikováno v:
Journal of Applied Sciences and Environmental Management, Vol 27, Iss 1 (2023)
Cryptography system gives security services ability to protect information from people who are authorized to use it. This research introduces elevated information security system via hybrid of new expand Rivest Shamir Adleman (RSA) and data encryptio
Externí odkaz:
https://doaj.org/article/88dc2c82982349f1861a385ddec6235d
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE Access, Vol 7, Pp 72696-72702 (2019)
Inter-block shuffle has been proved to be able to enhance the security for JPEG image encryption. However, it does not change the numbers of non-zero coefficients in 8*8 blocks. This leads to information leakage. In this paper, the defects of inter-b
Externí odkaz:
https://doaj.org/article/791003a3104c4ea6988d7fcf5e9964c8
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Materials Today: Proceedings. 81:848-852
The use of the internet in this modern era is increased many fold. The communications between different peers take place in digital form. While sharing the messages between different recipients, the confidentiality of the messages is very important.
Publikováno v:
IEEE Access, Vol 6, Pp 67095-67107 (2018)
In this paper, a novel image compression–encryption hybrid algorithm is proposed. First, a Gauss random matrix and a random scrambling matrix are generated by using Chebyshev mapping and Logistic mapping, respectively. Then, based on the principle
Externí odkaz:
https://doaj.org/article/440fbdd7b0534fe4be08256adf39e8f3
Publikováno v:
Mathematics, Vol 9, Iss 21, p 2778 (2021)
Chaos systems have been widely used in image encryption algorithms. In this article, we introduce an LB (Logistic-Baker) compound chaotic map that can greatly improve the complexity of original Logistic map and Baker map, as well as the generated seq
Externí odkaz:
https://doaj.org/article/54b04f4198174d82ad5f6875079b2d85