• No results found

Encryption Techniques

A survey on Existing Image Encryption Techniques

A survey on Existing Image Encryption Techniques

... system encryption techniques are most widely in ...of encryption scheme for some selected type of data so that it can be efficient and more ...

5

Using Different Encryption Techniques for Balancing with Cluster-Based Storage

Using Different Encryption Techniques for Balancing with Cluster-Based Storage

... different encryption techniques and cluster based storage are ...these techniques, they not only reduces the load from the server, but it also shows which server takes less time to fulfill any ...

7

Analysis of Image Compression & Encryption Techniques

Analysis of Image Compression & Encryption Techniques

... Abstract: The continuous growth of mobile, desktop and wired and wireless digital communication technologies has made the extensive use of the images unavoidable. The basic characteristics of image like transmission ...

9

A Review on Classical and Modern Encryption Techniques

A Review on Classical and Modern Encryption Techniques

... procedural techniques and abidance of laws to achieve the desired ...modern encryption techniques has carried ...of encryption techniques has ...

5

Survey on CHAOS Based Image Encryption Techniques

Survey on CHAOS Based Image Encryption Techniques

... Abstract— Now a days exchange of data over the network is keep on increasing, we using the for data exchange like open networks and internet. In data exchange security of the data is one of the major concern. We can ...

7

Comparative Study of Video Encryption Techniques for HEVC

Comparative Study of Video Encryption Techniques for HEVC

... different Encryption techniques focuses on newly video codec which is high efficiency video codec ...the encryption of such a large multimedia is very much cumbersome for that reason we summarize and ...

8

Different Text to Image Encryption Techniques: A Survey

Different Text to Image Encryption Techniques: A Survey

... text encryption techniques and decryption techniques in the span of years ....Those encryption techniques are studied and analyzed well to promote the performance of the ...

5

Encryption techniques-Study & Comparison

Encryption techniques-Study & Comparison

... various encryption techniques which are used for secure transmission of confidential data over the ...specific encryption technique, it depends on the application area where we are using the ...

5

An Overview of Image Encryption Techniques

An Overview of Image Encryption Techniques

... images. Encryption is one of the ways to ensure high ...provides techniques to protect information and protect multimedia ...years, encryption technology has it developed rapidly and many image ...

6

A Comparative Study of Encryption Techniques in Cloud Computing

A Comparative Study of Encryption Techniques in Cloud Computing

... privacy. Encryption is one of the most important ways for secure transmission of data over the ...sturdiest techniques which is developed and is evolving to include capabilities that ensure increase in ...

5

A Survey on Image Encryption Techniques

A Survey on Image Encryption Techniques

... image encryption is to transmit the image securely over the network so that no unauthorized user can be able to decrypt the ...many techniques exist which are Image encryption, video ...

6

ENCRYPTION TECHNIQUES FOR SECURITY OF IMAGES

ENCRYPTION TECHNIQUES FOR SECURITY OF IMAGES

... With the proliferation in technology and advent of internet the data has been digitized, so more emphasis is required for security while transmission and storage to save from unauthorized users. Protecting data in a safe ...

6

Attribute Based Encryption Techniques and its Applications.

Attribute Based Encryption Techniques and its Applications.

... identity-based encryption,” introduced the concept of Fuzzy Identity Based Encryption, which allows for error-tolerancebetween the identity of a private key and the public key used to encrypt a cipher ...of ...

6

A Survey On Security Using Encryption Techniques In Cloud

A Survey On Security Using Encryption Techniques In Cloud

... Abstract— Cloud computing (CC) is an emerging area of computer technology that benefits from the processing power and the computing resources of many connected, geographically distanced computers connected via Internet. ...

6

Network Security Using Encryption Techniques

Network Security Using Encryption Techniques

... the encryption, decryption and complexity are high in NTRU, the RSA provides the highest security to the business ...common encryption algorithms ...standard encryption algorithm? AES showed poor ...

5

A Review on Digital Image Scrambling Encryption Techniques

A Review on Digital Image Scrambling Encryption Techniques

... H. B. Kekre, Tanuja Sarode, Pallavi Halarnkar [11] introduced an image scrambling algorithm using R- prime shuffle technique for digital images and extended over the blocks of digital image. In this work the method is ...

10

Privacy Protection in Personalised Web Search

Privacy Protection in Personalised Web Search

... Abstract: Nowadays everyone find information on internet. Whatever they want to search they search it on search engine. But not every time user gets information he is looking for, sometime user get information similar to ...

6

Image Encryption Using Different Techniques: A Review

Image Encryption Using Different Techniques: A Review

... and encryption is one the ways to ensure security. Image encryption techniques try to convert original image to another image that is hard to understand; to keep the image confidential between users, ...

5

A Survey on Security of Web Services and its Implementations

A Survey on Security of Web Services and its Implementations

... using encryption techniques are implemented in web services for key generation and encryption of the messages in SOAP and RESTful Services, to provide more secure communication between two electronic ...

8

Faster  Secure  Arithmetic  Computation  Using  Switchable  Homomorphic  Encryption

Faster Secure Arithmetic Computation Using Switchable Homomorphic Encryption

... computation techniques, such as fully homomorphic encryption (FHE) and somewhat homomorphic encryption (SWH), have prohibitive performance and/or storage costs for the majority of practical ...

25

Show all 10000 documents...

Related subjects