Showing 81 - 100 results of 187 for search 'optimal encryption algorithm', query time: 0.06s Refine Results
  1. 81

    Reversible Data Hiding in Encrypted Images Based on Edge-Directed Prediction and Multi-MSB Self-Prediction by Yingqiang Qiu

    Published 2025-01-01
    “…After being losslessly compressed using the Joint Bi-level Image Experts Group (JBIG) algorithm, the location maps are embedded into the encrypted image as auxiliary data, thereby creating ample room for embedding additional data. …”
    Get full text
    Article
  2. 82

    Hybrid Cryptographic End-to-End Encryption Method for Protecting IoT Devices Against MitM Attacks by N. Karmous, M. Hizem, Y. Ben Dhiab, M. Ould-Elhassen Aoueileyine, R. Bouallegue, N. Youssef

    Published 2024-12-01
    “…Additionally, through a comparison of RSA, AES, and ChaCha20 algorithms, AES-256 emerges as the optimal encryption choice, demonstrating the fastest encryption and decryption times for publishing 0.2758 ms and 0.1781 ms, respectively and for subscribing, with encryption at 0.2542 ms and decryption at 0.1577 ms. …”
    Get full text
    Article
  3. 83

    Research on Lightweight Dynamic Security Protocol for Intelligent In-Vehicle CAN Bus by Yuanhao Wang, Yinan Xu, Zhiquan Liu, Suya Liu, Yujing Wu

    Published 2025-05-01
    “…To address these issues, we propose an improved dynamic compression algorithm that achieves higher compression rates and efficiency by optimizing header information processing during data reorganization. …”
    Get full text
    Article
  4. 84

    Deep convolutional neural network based archimedes optimization algorithm for heart disease prediction based on secured IoT enabled health care monitoring system by Sureshkumar S, Santhosh Babu A. V, Joseph James S, Maranco M

    Published 2025-07-01
    “…Finally, the Deep Convolutional Neural Network-based Archimedes Optimization (DCNN-AO) algorithm classifies the normal and abnormal classes of heart disease. …”
    Get full text
    Article
  5. 85

    Symmetric Cryptography With Shift 2<sup>n-1</sup>, Hash Transformation, Optimization-Based Controller for Medical Image Infosecurity: Case Study in Mammographic Image by Pi-Yun Chen, Jian-Xing Wu, Chien-Ming Li, Chao-Lin Kuo, Neng-Sheng Pai, Chia-Hung Lin

    Published 2020-01-01
    “…Then, swarm optimization-based controllers, which are based on particle swarm optimization (PSO) and firefly algorithm (FA), are implemented to search the decryption key parameters. …”
    Get full text
    Article
  6. 86

    Constructing resource-efficient quantum circuits for AES by Liao-Liang Jiang, Liao-Liang Jiang, Bin-Bin Cai, Fei Gao, Fei Gao, Fei Gao, Su-Juan Qin, Su-Juan Qin, Su-Juan Qin, Zheng-Ping Jin, Zheng-Ping Jin, Zheng-Ping Jin, Qiao-Yan Wen, Qiao-Yan Wen, Qiao-Yan Wen

    Published 2025-04-01
    “…An efficient quantum implementation of the advanced encryption standard (AES) is crucial for reducing the complexity of implementing an exhaustive key search through Grover’s algorithm. …”
    Get full text
    Article
  7. 87

    Separable Reversible Data Hiding in Encrypted 3D Mesh Models Based on Spatial Clustering and Multi-MSB Prediction by Y. Mao, Y. Xu

    Published 2025-07-01
    “…Input model vertices are partitioned into exclusive clusters through spatial clustering, ensuring close proximity within each cluster. An optimal reference vertex search algorithm is then used to identify the best reference vertex in each cluster to maximize embeddable capacity, and multi-MSB prediction determines the embedding length for each embeddable vertex. …”
    Get full text
    Article
  8. 88

    A Secure COVID Affected CT Scan Image Encryption Scheme Using Hybrid MLSCM for IoMT Environment by Sasmita Padhy, Sachikanta Dash, Naween Kumar, Gyanendra Kumar

    Published 2025-01-01
    “…In this study, we presented an encryption system for COVID-19 CT images to address this problem. …”
    Get full text
    Article
  9. 89

    Pseudorandom Number Generator Based on Three Kinds of Four-Wing Memristive Hyperchaotic System and Its Application in Image Encryption by Xi Chen, Shuai Qian, Fei Yu, Zinan Zhang, Hui Shen, Yuanyuan Huang, Shuo Cai, Zelin Deng, Yi Li, Sichun Du

    Published 2020-01-01
    “…In addition, PRNG has passed the NIST 800.22 and ENT test, which shows that PRNG has good statistical characteristics. Finally, an image encryption algorithm based on PRNG is adopted. In the encryption algorithm, the optimized Arnold matrix scrambling method and the diffusion processing based on XOR are used to obtain the final encrypted image. …”
    Get full text
    Article
  10. 90

    A Hybrid Approach to Cloud Data Security Using ChaCha20 and ECDH for Secure Encryption and Key Exchange by Rebwar Khalid Muhammed, Zryan Najat Rashid, Shaida Jumaah Saydah

    Published 2025-03-01
    “…This research proposes a hybrid encryption model that combines the high-speed ChaCha20 algorithm for data encryption with the Elliptic Curve Diffie-Hellman (ECDH) protocol for secure key exchange. …”
    Get full text
    Article
  11. 91
  12. 92

    QuantumGS-Box—A Key-Dependent GA and QRNG-Based S-Box for High-Speed Cloud-Based Storage Encryption by Anish Saini, Athanasios Tsokanos, Raimund Kirner

    Published 2024-12-01
    “…In this paper, we propose the QuantumGS-box, which is a dynamic S-box for high-speed cloud-based storage encryption generated by bit shuffling with a genetic algorithm and a quantum random number generator (QRNG). …”
    Get full text
    Article
  13. 93

    A deep learning based intrusion detection system for CAN vehicle based on combination of triple attention mechanism and GGO algorithm by Hongwei Yang, Mehdi Effatparvar

    Published 2025-06-01
    “…The current work utilizes a novel Greylag Goose Optimization algorithm for optimal selection of the network hyperparameters. …”
    Get full text
    Article
  14. 94

    Boosting Cyberattack Detection Using Binary Metaheuristics With Deep Learning on Cyber-Physical System Environment by Alanoud Al Mazroa, Fahad R. Albogamy, Mohamad Khairi Ishak, Samih M. Mostafa

    Published 2025-01-01
    “…Furthermore, the Archimedes Optimization Algorithm (AOA) model is employed to select the optimum hyperparameter for the EESNN model. …”
    Get full text
    Article
  15. 95

    A Secure and Reliable Fog-Enabled Architecture Using Blockchain With Functional Biased Elliptic Curve Cryptography Algorithm for Healthcare Services by charu awasthi, Satya Prakash, Prashant Kumar Mishra

    Published 2024-12-01
    “…We propose a Functional Biased Elliptic Curve Cryptography Algorithm (FB-ECC) to encrypt the data. The optimization is performed using Galactic Bee Colony Optimization Algorithm (GBCOA) to enhance the procedure of encryption. …”
    Get full text
    Article
  16. 96

    Distributed and efficient identity authentication based on consortium blockchain by Yao Ying, Yan Yong, Guo Shaoyong, Xiong Ao, Zhang Wang

    Published 2022-03-01
    “…The experimental results show that the blockchain-based authentication mechanism and optimized PBFT algorithm improve the reliability of the authentication system and ensure its efficiency.…”
    Get full text
    Article
  17. 97

    Facial Expression Recognition and Digital Images Infosecurity for Prevention Care System Application in Sudden Infant Death Syndrome Monitoring by Chih-Te Tsai, Chia-Hung Lin, Hsiang-Yueh Lai, Yu-En Cheng, Ping-Tzan Huang, Neng-Sheng Pai, Chien-Ming Li

    Published 2025-01-01
    “…The stochastic gradient descent (SGD) algorithm was employed to optimize the classifier&#x2019;s model parameters for further enhancing accuracy for the intended purposes. …”
    Get full text
    Article
  18. 98

    Impossible differential distinguisher analysis of GRANULE and MANTRA algorithm by Xiaonian WU, Yingxin LI, Yongzhuang WEI, Yaping SUN

    Published 2020-01-01
    “…The lightweight block cipher algorithms called GRANULE and MANTRA have a simple structure,fast encryption speed,and they can be easy implemented in software and hardware.Two algorithms are especially suitable for resource-constrained environments.To analyze the security of two algorithms,an automatic search method of impossible differential distinguishers was proposed.Based on the structural characteristics of the GRANALE and MANTRA,the S-box differential characteristics were obtained by analyzing the S-box differential distribution table,and then the idea of intermediate encounter was used to traverse from the difference path obtained from the encryption/decryption direction seperately to select the optimal differential path with probability 0.The analysis results show that there are 144 different 7-round impossible differential distinguishers in the GRANULE,and 52 different 9-round impossible differential distinguishers in the MANTRA.Compared with the existing results,the rounds of the proposed distinguisher is currently the highest.…”
    Get full text
    Article
  19. 99

    Full lifecycle security management scheme for terminal keys under power IoT by Wang Hui, Yuan Jiahui, Shi Zhentong, Fang Mu

    Published 2025-01-01
    “…Firstly, the two-stage key distribution architecture based on the state secret algorithm is adopted in the scheme to achieve secure access authentication of power terminals at different stages. …”
    Get full text
    Article
  20. 100

    Using the Genetic Algorithm in Developing a Method for Steganography by Nadia Mohammed

    Published 2013-12-01
    “…This paper has developed a method for hiding in images, as it was first encrypt the secret message chaoticlly using the chaotic encryption algorithm and secondly execute the steganography in two phases, the first divide the cover image (.BMP, .PNG) to a group of sections (Blocks) with the diagonal sequence and make hiding using the cell of the least Significant Bit (LSB) within (Bytes) of certain randomly, and then using the Genetic Algorithm (GA) and working at the expense of Peak Signal to Noise Ratio(PSNR)  for each section after the steganography and then get the best PSNR value of the optimal section (ie, a better distribution of the random sites). …”
    Get full text
    Article