ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Education
Social Sciences
Literature
Communication
Languages
Research
Architecture and Urbanism
Computing
Technology
Economy
all records (74)

Languages
English
Portuguese
Spanish
French
German

Countries
Brazil
Indonesia
USA
Spain
Ukraine
Chile
Switzerland
Argentina
South Africa
Italy
all records (73)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
44.343  Articles
1 of 4.435 pages  |  10  records  |  more records»
Recently, to conquer most non-plain related chaos-based image cryptosystems’ security flaws that cannot resist the powerful chosen/knownn plain-text attacks or differential attacks efficiently for less plaintext sensitivity, many plain related chaos... see more

This paper discusses the implementation of an online voting system based on image steganography and visual cryptography. The system was implemented in Java EE on a web-based interface, with MySQL database server and Glassfish application server as the bac... see more

Data and information security either those to be sent through the communication network or those to be kept in a device has brought into attention of the user of this information and data. Information and data security is being kept by making the data and... see more

Along with the times, the exchange of information is becoming faster. People now use chat applications as a form of communication. With this application, users can easily exchange messages, whether in the form of text, images, audio, or video, without bei... see more

This work presents and describes a novel method to hide messages in images in a hybrid manner, as steganography is combined with quantum cryptography. Through stimulating and implementing this hybrid approach, the least significant bit (LSB) substitution... see more

The paper presents an secure image using the two dimensional chaotic cat mapping  (2D-CCM) in the Discrete Fourier Transform domain (DFT). The ciphering phase begins by applying the DFT on the plainimage to be encrypted and the resulted Fourier trans... see more

An encryption algorithm for hyperspectral data in fractional Fourier domain is designed. Firstly, the original hyperspectral image is separated into single bands and then each pair of bands are regarded as the real and imaginary part of a complex function... see more

The development of technology at this time allows everyone to exchange information without any limitation of time and distance. The possibility that data leakage will occur during the process of exchanging information is carried out, therefore in sending ... see more

One of the popular challenges that faces the Cloud Computing is the authentication problem. Authentication is a mechanism to establish proof of identities to get access of information in the system. There are several solutions to overcome this issue that ... see more

1 of 4.435 pages  |  10  records  |  more records»