Showing 1 - 20 results of 35 for search 'encrypted reaching algorithm', query time: 0.11s Refine Results
  1. 1

    Development AES Algorithm to Encryption Images and Sounds Files by Mohammed Al-Zubaidy

    Published 2012-07-01
    “…In this research, the Advanced Encryption Standard (AES) algorithm was developed, the AES is used for encryption and decryption the images and sounds files by expanding the block size of data to reach the maximum size of 512 bit instead 128 bit/cycle, by using the Thread API techniques, which is a break off CPU working for increasing times taken the inline encrypt or decrypt operations. …”
    Get full text
    Article
  2. 2

    A Hyperchaotic Lorenz and DNA-Encoded Image Encryption Algorithm by Shuangyuan Li, Mengfan Li

    Published 2024-01-01
    “…In order to solve the problem that images are easy to leak and tamper during transmission and enhance the safety of image encryption, an image encryption algorithm based on deoxyribonucleic acid (DNA) coding and hyperchaotic Lorenz system is proposed. …”
    Get full text
    Article
  3. 3

    An Image Encryption Algorithm Based on Hyperchaotic System and Variable-Step Josephus Problem by Xuncai Zhang, Lingfei Wang, Yanfeng Wang, Ying Niu, Yinhua Li

    Published 2020-01-01
    “…In this paper, an image encryption algorithm based on a hyperchaotic system and variable-step Josephus problem is proposed. …”
    Get full text
    Article
  4. 4

    A new video image encryption algorithm based on improved composite mapping by Tu Li, Liu Zhen, Wang Yan, Yang Gelan

    Published 2025-01-01
    “…The simulation results show that: the histogram of the encrypted image is uniformly distributed, the encryption algorithm is very sensitive to the initial key, and the initial value sensitivity performance reaches10-13, it takes only 7.9 seconds to encrypt a 328 frame video by using this algorithm, and it takes only 5.4 seconds to decrypt this video. …”
    Get full text
    Article
  5. 5

    A Novel Image Encryption Algorithm Based on Chaotic Sequences and Cross-Diffusion of Bits by Geng Shengtao, Wu Tao, Wang Shida, Zhang Xuncai, Niu Ying

    Published 2021-01-01
    “…To protect image information security, we propose an encryption algorithm based on chaotic sequences and bits' cross-diffusion. …”
    Get full text
    Article
  6. 6

    Secure Data Collection Method Based on Quantum Encryption Algorithm for Power IoT Gateway by ZHANG Jingxin, CHEN Chao, ZHANG Ping

    Published 2025-06-01
    “…Based on the quantum encryption algorithm, the original quantum key is obtained by selecting the two-dimensional Henon chaotic mapping method through the feature vector. …”
    Get full text
    Article
  7. 7

    Color Image Encryption Based on Five-Dimensional Continuous Hyperchaotic System and Optimized Arnold Algorithm by Zhenju Wang, Cong Wang, Ping Ma, Yue Meng, Hongli Zhang

    Published 2025-06-01
    “…This paper introduces a novel color image encryption algorithm based on a five-dimensional continuous memristor hyperchaotic system (5D-MHS), combined with a two-dimensional Salomon map and an optimized Arnold transform. …”
    Get full text
    Article
  8. 8

    Attribute encryption access control method of high dimensional medical data based on fuzzy algorithm. by Yonggang Huang, Teng Teng, Yuanyuan Li, Minghao Zhang

    Published 2025-01-01
    “…Consequently, a high-dimensional medical data attribute encryption access control method based on fuzzy algorithm is proposed. …”
    Get full text
    Article
  9. 9
  10. 10

    Lightweight Image Encryption Algorithm Using 4D-NDS: Compound Dynamic Diffusion and Single-Round Efficiency by Yunlong Liao, Yiting Lin, Qiutong Li, Zheng Xing, Xiaochen Yuan

    Published 2025-01-01
    “…Additionally, the single-round composite double-diffusion system significantly improves the security and reliability of the algorithm, with the information entropy of the encrypted image reaching 7.9994. …”
    Get full text
    Article
  11. 11

    Adaptive encryption method of sensitive data in data center database based on big data cross-mapping fusion algorithm by Dingwen Zhang, Shuang Yang, Ming Chen, Lei Zheng, Jiashu Fan, Aidi Dong

    Published 2025-08-01
    “…This approach transforms the serial operation structure of the AES algorithm into a parallel operation structure, enabling adaptive encryption of fusion sensitive data. …”
    Get full text
    Article
  12. 12

    A sector fast encryption algorithm for color images based on one-dimensional composite sinusoidal chaos map. by Ye Tao, Wenhua Cui, Shanshan Wang, Yayun Wang

    Published 2025-01-01
    “…Based on previous various chaotic image fast encryption algorithms, this paper proposes a color image sector fast encryption algorithm based on one-dimensional composite sinusoidal chaotic mapping. …”
    Get full text
    Article
  13. 13

    Encrypted traffic identification method based on deep residual capsule network with attention mechanism by Guozhen SHI, Kunyang LI, Yao LIU, Yongjian YANG

    Published 2023-02-01
    “…With the improvement of users’ security awareness and the development of encryption technology, encrypted traffic has become an important part of network traffic, and identifying encrypted traffic has become an important part of network traffic supervision.The encrypted traffic identification method based on the traditional deep learning model has problems such as poor effect and long model training time.To address these problems, the encrypted traffic identification method based on a deep residual capsule network (DRCN) was proposed.However, the original capsule network was stacked in the form of full connection, which lead to a small model coupling coefficient and it was impossible to build a deep network model.The DRCN model adopted the dynamic routing algorithm based on the three-dimensional convolutional algorithm (3DCNN) instead of the fully-connected dynamic routing algorithm, to reduce the parameters passed between each capsule layer, decrease the complexity of operations, and then build the deep capsule network to improve the accuracy and efficiency of recognition.The channel attention mechanism was introduced to assign different weights to different features, and then the influence of useless features on the recognition results was reduced.The introduction of the residual network into the capsule network layer and the construction of the residual capsule network module alleviated the gradient disappearance problem of the deep capsule network.In terms of data pre-processing, the first 784byte of the intercepted packets was converted into images as input of the DRCN model, to avoid manual feature extraction and reduce the labor cost of encrypted traffic recognition.The experimental results on the ISCXVPN2016 dataset show that the accuracy of the DRCN model is improved by 5.54% and the training time of the model is reduced by 232s compared with the BLSTM model with the best performance.In addition, the accuracy of the DRCN model reaches 94.3% on the small dataset.The above experimental results prove that the proposed recognition scheme has high recognition rate, good performance and applicability.…”
    Get full text
    Article
  14. 14

    Image encryption scheme based on thorp shuffle and pseudo dequeue by Shengtao Geng, Danlei Guo, Xuncai Zhang, Yanfeng Wang, Ying Niu

    Published 2025-04-01
    “…The results show that the algorithm proposed in this paper has high encryption efficiency and security and performs excellently in terms of anti-attack performance.…”
    Get full text
    Article
  15. 15

    A study of massive multidimensional data sharing and interaction algorithms based on cloud-edge collaboration by Xiaodong Zhang, Jing Wang, Ke Yang

    Published 2025-03-01
    “…Therefore, this article proposes a massive multi-dimensional data sharing and interaction algorithm based on cloud edge collaboration. In the edge layer and cloud layer, data from sensors and nodes undergo re-encryption through proxies during the collection process. …”
    Get full text
    Article
  16. 16

    Fuzzy Encryption Search Scheme and Data Verification Mechanism Based on Blockchain by Kuan Li

    Published 2025-04-01
    “…First, privacy protection of the raw data is achieved through a hierarchical Mini Batch K-Means clustering algorithm and locally sensitive hash functions. Second, the study proposes a blockchain data verification mechanism that employs a fuzzy encryption search scheme, in conjunction with cloud storage and a fuzzy encryption algorithm. …”
    Get full text
    Article
  17. 17

    A New Asymmetric Fully Homomorphic Encryption Scheme for Cloud Banking Data by Zana Thalage Omar, Fadhil Salman Abed, Shaimaa Khamees Ahmed

    Published 2021-01-01
    “…Our current research provides a new algorithm for a publicly-keyed encryption system to keep bank data from tampering and theft when stored on the cloud computing platform, and our new system achieves fully Homomorphic Encryption, which allows mathematical operations to be performed on the encrypted text without the need for the original text. …”
    Get full text
    Article
  18. 18

    An Audio Steganography to Protect data in Text, Images and Audio with Hybrid Encryption Techniques by Thuraka Srinivasa Padmaja, Srinivasa Padmaja thuraka

    Published 2025-07-01
    “…The method begins with strong AES encryption, which is then followed by a clever scrambling algorithm inspired by the Rubik’s Cube. …”
    Get full text
    Article
  19. 19

    A Dynamic Hill Cipher with Arnold Scrambling Technique for Medical Images Encryption by Yuzhou Xi, Yu Ning, Jie Jin, Fei Yu

    Published 2024-12-01
    “…Moreover, the Peak Signal to Noise Ratio (PSNR) and Number of Pixel Change Rate (NPCR) of the proposed DHCAST algorithm reach 9.51 and 99.74%, respectively, which effectively validates its excellent encryption quality and attack prevention ability.…”
    Get full text
    Article
  20. 20

    High capacity reversible hiding in encrypted domain based on cipher-feedback secret sharing by Minqing ZHANG, Chao JIANG, Fuqiang DI, Zongbao JIANG, Xiong ZHANG

    Published 2023-09-01
    “…To improve the security, robustness and embedding rate of reversible hiding in encrypted domain in the distributed environment, a multiple embedding algorithm based on cipher-feedback secret sharing was proposed.Firstly, the additional data were embedded into the polynomial coefficients redundancy generated in the process of secret image sharing.Secondly, the extra secrets were embedded by using the additive homomorphism of secret sharing.Experimental results demonstrate that a better security and robustness has been obtained by improving the diffusion characteristic of secret sharing using the feedback mechanism.In the (3,4) and (3,5) threshold, the embedding rates can reach 6.00 bit per pixel and 4.80 bit per pixel respectively.The proposed algorithm can not only maintain the strong security and separability, but also obtain a better embedding capacity.Meanwhile, the embedding rate of the scheme is not affected by the carrier image and is only related to the selection of algorithm parameters.…”
    Get full text
    Article