Showing 101 - 120 results of 213 for search '(optical OR optimal) encryption algorithm', query time: 0.13s Refine Results
  1. 101

    Reversible Data Hiding in Encrypted Images Based on Edge-Directed Prediction and Multi-MSB Self-Prediction by Yingqiang Qiu

    Published 2025-01-01
    “…After being losslessly compressed using the Joint Bi-level Image Experts Group (JBIG) algorithm, the location maps are embedded into the encrypted image as auxiliary data, thereby creating ample room for embedding additional data. …”
    Get full text
    Article
  2. 102

    Hybrid Cryptographic End-to-End Encryption Method for Protecting IoT Devices Against MitM Attacks by N. Karmous, M. Hizem, Y. Ben Dhiab, M. Ould-Elhassen Aoueileyine, R. Bouallegue, N. Youssef

    Published 2024-12-01
    “…Additionally, through a comparison of RSA, AES, and ChaCha20 algorithms, AES-256 emerges as the optimal encryption choice, demonstrating the fastest encryption and decryption times for publishing 0.2758 ms and 0.1781 ms, respectively and for subscribing, with encryption at 0.2542 ms and decryption at 0.1577 ms. …”
    Get full text
    Article
  3. 103

    Research on Lightweight Dynamic Security Protocol for Intelligent In-Vehicle CAN Bus by Yuanhao Wang, Yinan Xu, Zhiquan Liu, Suya Liu, Yujing Wu

    Published 2025-05-01
    “…To address these issues, we propose an improved dynamic compression algorithm that achieves higher compression rates and efficiency by optimizing header information processing during data reorganization. …”
    Get full text
    Article
  4. 104

    Deep convolutional neural network based archimedes optimization algorithm for heart disease prediction based on secured IoT enabled health care monitoring system by Sureshkumar S, Santhosh Babu A. V, Joseph James S, Maranco M

    Published 2025-07-01
    “…Finally, the Deep Convolutional Neural Network-based Archimedes Optimization (DCNN-AO) algorithm classifies the normal and abnormal classes of heart disease. …”
    Get full text
    Article
  5. 105

    Symmetric Cryptography With Shift 2<sup>n-1</sup>, Hash Transformation, Optimization-Based Controller for Medical Image Infosecurity: Case Study in Mammographic Image by Pi-Yun Chen, Jian-Xing Wu, Chien-Ming Li, Chao-Lin Kuo, Neng-Sheng Pai, Chia-Hung Lin

    Published 2020-01-01
    “…Then, swarm optimization-based controllers, which are based on particle swarm optimization (PSO) and firefly algorithm (FA), are implemented to search the decryption key parameters. …”
    Get full text
    Article
  6. 106

    Constructing resource-efficient quantum circuits for AES by Liao-Liang Jiang, Liao-Liang Jiang, Bin-Bin Cai, Fei Gao, Fei Gao, Fei Gao, Su-Juan Qin, Su-Juan Qin, Su-Juan Qin, Zheng-Ping Jin, Zheng-Ping Jin, Zheng-Ping Jin, Qiao-Yan Wen, Qiao-Yan Wen, Qiao-Yan Wen

    Published 2025-04-01
    “…An efficient quantum implementation of the advanced encryption standard (AES) is crucial for reducing the complexity of implementing an exhaustive key search through Grover’s algorithm. …”
    Get full text
    Article
  7. 107

    Separable Reversible Data Hiding in Encrypted 3D Mesh Models Based on Spatial Clustering and Multi-MSB Prediction by Y. Mao, Y. Xu

    Published 2025-07-01
    “…Input model vertices are partitioned into exclusive clusters through spatial clustering, ensuring close proximity within each cluster. An optimal reference vertex search algorithm is then used to identify the best reference vertex in each cluster to maximize embeddable capacity, and multi-MSB prediction determines the embedding length for each embeddable vertex. …”
    Get full text
    Article
  8. 108

    A Secure COVID Affected CT Scan Image Encryption Scheme Using Hybrid MLSCM for IoMT Environment by Sasmita Padhy, Sachikanta Dash, Naween Kumar, Gyanendra Kumar

    Published 2025-01-01
    “…In this study, we presented an encryption system for COVID-19 CT images to address this problem. …”
    Get full text
    Article
  9. 109

    Pseudorandom Number Generator Based on Three Kinds of Four-Wing Memristive Hyperchaotic System and Its Application in Image Encryption by Xi Chen, Shuai Qian, Fei Yu, Zinan Zhang, Hui Shen, Yuanyuan Huang, Shuo Cai, Zelin Deng, Yi Li, Sichun Du

    Published 2020-01-01
    “…In addition, PRNG has passed the NIST 800.22 and ENT test, which shows that PRNG has good statistical characteristics. Finally, an image encryption algorithm based on PRNG is adopted. In the encryption algorithm, the optimized Arnold matrix scrambling method and the diffusion processing based on XOR are used to obtain the final encrypted image. …”
    Get full text
    Article
  10. 110

    A Hybrid Approach to Cloud Data Security Using ChaCha20 and ECDH for Secure Encryption and Key Exchange by Rebwar Khalid Muhammed, Zryan Najat Rashid, Shaida Jumaah Saydah

    Published 2025-03-01
    “…This research proposes a hybrid encryption model that combines the high-speed ChaCha20 algorithm for data encryption with the Elliptic Curve Diffie-Hellman (ECDH) protocol for secure key exchange. …”
    Get full text
    Article
  11. 111
  12. 112

    QuantumGS-Box—A Key-Dependent GA and QRNG-Based S-Box for High-Speed Cloud-Based Storage Encryption by Anish Saini, Athanasios Tsokanos, Raimund Kirner

    Published 2024-12-01
    “…In this paper, we propose the QuantumGS-box, which is a dynamic S-box for high-speed cloud-based storage encryption generated by bit shuffling with a genetic algorithm and a quantum random number generator (QRNG). …”
    Get full text
    Article
  13. 113

    A deep learning based intrusion detection system for CAN vehicle based on combination of triple attention mechanism and GGO algorithm by Hongwei Yang, Mehdi Effatparvar

    Published 2025-06-01
    “…The current work utilizes a novel Greylag Goose Optimization algorithm for optimal selection of the network hyperparameters. …”
    Get full text
    Article
  14. 114

    Boosting Cyberattack Detection Using Binary Metaheuristics With Deep Learning on Cyber-Physical System Environment by Alanoud Al Mazroa, Fahad R. Albogamy, Mohamad Khairi Ishak, Samih M. Mostafa

    Published 2025-01-01
    “…Furthermore, the Archimedes Optimization Algorithm (AOA) model is employed to select the optimum hyperparameter for the EESNN model. …”
    Get full text
    Article
  15. 115

    A Secure and Reliable Fog-Enabled Architecture Using Blockchain With Functional Biased Elliptic Curve Cryptography Algorithm for Healthcare Services by charu awasthi, Satya Prakash, Prashant Kumar Mishra

    Published 2024-12-01
    “…We propose a Functional Biased Elliptic Curve Cryptography Algorithm (FB-ECC) to encrypt the data. The optimization is performed using Galactic Bee Colony Optimization Algorithm (GBCOA) to enhance the procedure of encryption. …”
    Get full text
    Article
  16. 116

    Distributed and efficient identity authentication based on consortium blockchain by Yao Ying, Yan Yong, Guo Shaoyong, Xiong Ao, Zhang Wang

    Published 2022-03-01
    “…The experimental results show that the blockchain-based authentication mechanism and optimized PBFT algorithm improve the reliability of the authentication system and ensure its efficiency.…”
    Get full text
    Article
  17. 117

    Facial Expression Recognition and Digital Images Infosecurity for Prevention Care System Application in Sudden Infant Death Syndrome Monitoring by Chih-Te Tsai, Chia-Hung Lin, Hsiang-Yueh Lai, Yu-En Cheng, Ping-Tzan Huang, Neng-Sheng Pai, Chien-Ming Li

    Published 2025-01-01
    “…The stochastic gradient descent (SGD) algorithm was employed to optimize the classifier&#x2019;s model parameters for further enhancing accuracy for the intended purposes. …”
    Get full text
    Article
  18. 118

    TAQNet: Traffic-Aware Minimum-Cost Quantum Communication Network Planning by Ilora Maity, Junaid ur Rehman, Symeon Chatzinotas

    Published 2025-01-01
    “…In addition, we propose a genetic algorithm-based solution to optimally distribute the end-to-end QKD requests over the QCI. …”
    Get full text
    Article
  19. 119

    Impossible differential distinguisher analysis of GRANULE and MANTRA algorithm by Xiaonian WU, Yingxin LI, Yongzhuang WEI, Yaping SUN

    Published 2020-01-01
    “…The lightweight block cipher algorithms called GRANULE and MANTRA have a simple structure,fast encryption speed,and they can be easy implemented in software and hardware.Two algorithms are especially suitable for resource-constrained environments.To analyze the security of two algorithms,an automatic search method of impossible differential distinguishers was proposed.Based on the structural characteristics of the GRANALE and MANTRA,the S-box differential characteristics were obtained by analyzing the S-box differential distribution table,and then the idea of intermediate encounter was used to traverse from the difference path obtained from the encryption/decryption direction seperately to select the optimal differential path with probability 0.The analysis results show that there are 144 different 7-round impossible differential distinguishers in the GRANULE,and 52 different 9-round impossible differential distinguishers in the MANTRA.Compared with the existing results,the rounds of the proposed distinguisher is currently the highest.…”
    Get full text
    Article
  20. 120

    Secret Key Generation Protocol for Optical OFDM Systems in Indoor VLC Networks by Yahya Mohammed Al-Moliki, Mohammed Thamer Alresheedi, Yahya Al-Harthi

    Published 2017-01-01
    “…Nevertheless, the common keys generation algorithms can be very complex and costly in many setups. …”
    Get full text
    Article