نتائج البحث

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
تم إضافة الكتاب إلى الرف الخاص بك!
عرض الكتب الموجودة على الرف الخاص بك .
وجه الفتاة! هناك خطأ ما.
وجه الفتاة! هناك خطأ ما.
أثناء محاولة إضافة العنوان إلى الرف ، حدث خطأ ما :( يرجى إعادة المحاولة لاحقًا!
هل أنت متأكد أنك تريد إزالة الكتاب من الرف؟
{{itemTitle}}
{{itemTitle}}
وجه الفتاة! هناك خطأ ما.
وجه الفتاة! هناك خطأ ما.
أثناء محاولة إزالة العنوان من الرف ، حدث خطأ ما :( يرجى إعادة المحاولة لاحقًا!
    منجز
    مرشحات
    إعادة تعيين
  • الضبط
      الضبط
      امسح الكل
      الضبط
  • مُحَكَّمة
      مُحَكَّمة
      امسح الكل
      مُحَكَّمة
  • نوع العنصر
      نوع العنصر
      امسح الكل
      نوع العنصر
  • الموضوع
      الموضوع
      امسح الكل
      الموضوع
  • السنة
      السنة
      امسح الكل
      من:
      -
      إلى:
  • المزيد من المرشحات
      المزيد من المرشحات
      امسح الكل
      المزيد من المرشحات
      المصدر
    • اللغة
480 نتائج ل "encryption and decryption"
صنف حسب:
Analytical Study of Hybrid Techniques for Image Encryption and Decryption
The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption and decryption. This paper propose an analysis for performing image encryption and decryption by hybridization of Elliptic Curve Cryptography (ECC) with Hill Cipher (HC), ECC with Advanced Encryption Standard (AES) and ElGamal with Double Playfair Cipher (DPC). This analysis is based on the following parameters: (i) Encryption and decryption time, (ii) entropy of encrypted image, (iii) loss in intensity of the decrypted image, (iv) Peak Signal to Noise Ratio (PSNR), (v) Number of Pixels Change Rate (NPCR), and (vi) Unified Average Changing Intensity (UACI). The hybrid process involves the speed and ease of implementation from symmetric algorithms, as well as improved security from asymmetric algorithms. ECC and ElGamal cryptosystems provide asymmetric key cryptography, while HC, AES, and DPC are symmetric key algorithms. ECC with AES are perfect for remote or private communications with smaller image sizes based on the amount of time needed for encryption and decryption. The metric measurement with test cases finds that ECC and HC have a good overall solution for image encryption.
Photoresponsive Luminescent Polymeric Hydrogels for Reversible Information Encryption and Decryption
Conventional luminescent information is usually visible under either ambient or UV light, hampering their potential application in smart confidential information protection. In order to address this challenge, herein, light‐triggered luminescence ON‐OFF switchable hybrid hydrogels are successfully constructed through in situ copolymerization of acrylamide, lanthanide complex, and diarylethene photochromic unit. The open‐close behavior of the diarylethene ring in the polymer could be controlled by UV and visible light irradiation, where the close form of the ring features fluorescence resonance energy transfer with the lanthanide complex. The hydrogel‐based blocks with tunable emission colors are then employed to construct 3D information codes, which can be read out under a 254 nm UV lamp. The exposure to 300 nm UV light leads to the luminescence quenching of the hydrogels, thus erasing the encoded information. Under visible light (>450 nm) irradiation, the luminescence is recovered to make the confidential information readable again. Thus, by simply alternating the exposure to UV and visible lights, the luminescence signals could become invisible and visible reversibly, allowing for reversible multiple information encryption and decryption. Light‐triggered luminescence ON‐OFF switchable hybrid hydrogels are synthesized through in situ copolymerization. The hydrogel‐based blocks with tunable emission colors are then employed to construct 3D information codes, allowing for reversible multiple information encryption and decryption.
An Integrated Channel Coding and Cryptography Framework for Secure and Energy-Efficient Wireless Energy Data Transmission
This paper proposes a secure and energy-efficient wireless energy data transmission framework that integrates channel coding algorithms with cryptographic techniques. The framework employs LDPC codes, Turbo codes, and polar codes for channel coding, combined with AES, RSA, ECC, PRESENT, and SIMON cryptographic algorithms to address interference, information monitoring, and energy constraints in wireless environments. A dynamic power control strategy based on a greedy algorithm and a channel adaptive coding scheme are designed to optimize energy consumption and transmission reliability. Experiments were conducted using the NS3 simulation platform (with 50 nodes in a grid topology, simulated over 1000 seconds) and a small-scale field test. Key parameters included noise levels set at -90dBm to -60dBm, packet sizes of 512 bytes (AES/RSA) and 256 bytes (PRESENT/SIMON), and initial node energy levels of 1000mJ. Results show that compared with conventional algorithms, the proposed framework reduces the bit error rate by 15.3% (baseline: traditional channel coding without encryption) and energy consumption by 8.7% (baseline: standard WSN routing protocols). Specifically, it achieves a 44.6% lower energy consumption, 30.8% shorter transmission delay, and 73.3% lower bit error rate than traditional models, demonstrating superior performance in secure and efficient energy data transmission.
An efficient medical image encryption scheme for (WBAN) based on adaptive DNA and modern multi chaotic map
A Wireless Body Area Network (WBAN) is a network of wireless sensor nodes that can be installed inside or outside of the human body. This network is crucial in medical problems. Due to storage, battery power, and computational resource limitations, the security of medical information such as medical photographs or other information is a major concern in (WBAN). This work proposes an image encryption approach that addresses these constraints by utilizing adaptive DNA code bases and a new multi chaotic map architecture. DNA coding is used to enhances computing efficiency and gives great data transfer capabilities and the new multi chaotic map was formed by Combining Henon, Gaussian and Logistic map (HGL) To generate more chaotic pseudo-random sequences. Numerous analyses were conducted to test the proposed scheme, such as brute force, statistical, differential assaults and noise added analysis. Results indicated that this scheme has a strong level of security.
A plaintext-related image encryption algorithm based on chaos
A symmetric key image cryptosystem based on the piecewise linear map is presented in this paper. In this cryptosystem, the encryption process and the decryption process are exactly same. They both include the same operations of plaintext-related scrambling once, diffusion twice and matrix rotating of 180 degrees four times. The length of secret key in the system is 64d where d is a positive integer. The proposed system can fight against the chosen/known plaintext attacks due to the using of plaintext-related scrambling. The simulate results and comparison analysis show that the proposed system has many merits such as high encryption/decryption speed, large key space, strong key sensitivity, strong plaintext sensitivity, strong cipher-text sensitivity, good statistical properties of cipher images, and large cipher-text information entropy. So the proposed system can be applied to actual communications.
Adaptive Attribute-Based Honey Encryption: A Novel Solution for Cloud Data Security
A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built-in security measures, even though it can effectively handle and store enormous datasets using the Hadoop Distributed File System (HDFS). The increasing number of data breaches emphasizes how urgently creative encryption techniques are needed in cloud-based big data settings. This paper presents Adaptive Attribute-Based Honey Encryption (AABHE), a state-of-the-art technique that combines honey encryption with Ciphertext-Policy Attribute-Based Encryption (CP-ABE) to provide improved data security. Even if intercepted, AABHE makes sure that sensitive data cannot be accessed by unauthorized parties. With a focus on protecting huge files in HDFS, the suggested approach achieves 98% security robustness and 95% encryption efficiency, outperforming other encryption methods including Ciphertext-Policy Attribute-Based Encryption (CP-ABE), Key-Policy Attribute-Based Encryption (KB-ABE), and Advanced Encryption Standard combined with Attribute-Based Encryption (AES+ABE). By fixing Hadoop’s security flaws, AABHE fortifies its protections against data breaches and enhances Hadoop’s dependability as a platform for processing and storing massive amounts of data.
High-Contrast Visualization Chemiluminescence Based on AIE-Active and Base-Sensitive Emitters
Peroxyoxalate chemiluminescence (PO-CL) is one of the most popular cold light sources, yet the drawback of aggregation-caused quenching limits their use. Here, we report a new kind of efficient bifunctional emitter derived from salicylic acid, which not only exhibits typical aggregation-induced emission (AIE) character but also has the ability to catalyze the CL process under basic conditions based on base sensitivity. By taking advantage of these unique features, we successfully confine the CL process on the surface of solid bases and provide a high-contrast visualization of CL emission. This method allows most of the common basic salts like sodium carbonate to be invisible encryption information ink and PO-CL solution to be a decryption tool to visualize the hidden information. The current study opens up an appealing way for the development of multifunction CL emitters for information encryption and decryption applications.
Color Image Encryption Algorithm Based on a Chaotic Model Using the Modular Discrete Derivative and Langton’s Ant
In this work, a color image encryption and decryption algorithm for digital images is presented. It is based on the modular discrete derivative (MDD), a novel technique to encrypt images and efficiently hide visual information. In addition, Langton’s ant, which is a two-dimensional universal Turing machine with a high key space, is used. Moreover, a deterministic noise technique that adds security to the MDD is utilized. The proposed hybrid scheme exploits the advantages of MDD and Langton’s ant, generating a very secure and reliable encryption algorithm. In this proposal, if the key is known, the original image is recovered without loss. The method has demonstrated high performance through various tests, including statistical analysis (histograms and correlation distributions), entropy, texture analysis, encryption quality, key space assessment, key sensitivity analysis, and robustness to differential attack. The proposed method highlights obtaining chi-square values between 233.951 and 281.687, entropy values between 7.9999225223 and 7.9999355791, PSNR values (in the original and encrypted images) between 8.134 and 9.957, the number of pixel change rate (NPCR) values between 99.60851796% and 99.61054611%, unified average changing intensity (UACI) values between 33.44672377% and 33.47430379%, and a vast range of possible keys >5.8459×1072. On the other hand, an analysis of the sensitivity of the key shows that slight changes to the key do not generate any additional information to decrypt the image. In addition, the proposed method shows a competitive performance against recent works found in the literature.
Blockchain-based data management mechanism for virtual power plants
With the gradual deepening of power-related research and the expansion of power data volume, power data-oriented research and applications have fully entered the era of big data and cloud storage. The huge amount of heterogeneous data samples also bring a huge impact on traditional data processing methods. Therefore, let each virtual power plant participate in the electricity market externally as a unified power plant, and build a blockchain structure of multiple virtual power plants in the form of a slice. The structured data such as the basic information of the account is stored in the enterprise database in a relational data model and managed through an identity verification policy. The mechanism of off-chain negotiation and on-chain settlement is used to manage the transaction data. The management mechanism is further improved by combining an encryption scheme and a security evaluation method. After the practical test of the management mechanism, the time consumed for one and two parallel operations reaches 23 seconds and 8 seconds, and 4 seconds and 9 seconds or less for three and four times, respectively. In the case of nine users’ data distortion, the root means the square value of the blockchain data management mechanism is only 0.82, which is significantly less than 1. It shows that the blockchain-based data management mechanism, as a new generation of power data management means, can not only effectively integrate the power grid information data and relieve the pressure of the power grid system, but also avoid data leakage and strengthen power security.