Catalogue Search | MBRL
نتائج البحث
MBRLSearchResults
وجه الفتاة! هناك خطأ ما.
أثناء محاولة إضافة العنوان إلى الرف ، حدث خطأ ما :( يرجى إعادة المحاولة لاحقًا!
-
الضبطالضبط
-
مُحَكَّمةمُحَكَّمة
-
نوع العنصرنوع العنصر
-
الموضوعالموضوع
-
السنةمن:-إلى:
-
المزيد من المرشحاتالمزيد من المرشحاتالمصدراللغة
منجز
مرشحات
إعادة تعيين
480
نتائج ل
"encryption and decryption"
صنف حسب:
Analytical Study of Hybrid Techniques for Image Encryption and Decryption
بواسطة
Chowdhary, Chiranji Lal
,
Attique, Muhammad
,
Ijaz, Muhammad Fazal
في
advanced encryption standard
,
cryptography algorithm
,
double playfair cipher
2020
The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption and decryption. This paper propose an analysis for performing image encryption and decryption by hybridization of Elliptic Curve Cryptography (ECC) with Hill Cipher (HC), ECC with Advanced Encryption Standard (AES) and ElGamal with Double Playfair Cipher (DPC). This analysis is based on the following parameters: (i) Encryption and decryption time, (ii) entropy of encrypted image, (iii) loss in intensity of the decrypted image, (iv) Peak Signal to Noise Ratio (PSNR), (v) Number of Pixels Change Rate (NPCR), and (vi) Unified Average Changing Intensity (UACI). The hybrid process involves the speed and ease of implementation from symmetric algorithms, as well as improved security from asymmetric algorithms. ECC and ElGamal cryptosystems provide asymmetric key cryptography, while HC, AES, and DPC are symmetric key algorithms. ECC with AES are perfect for remote or private communications with smaller image sizes based on the amount of time needed for encryption and decryption. The metric measurement with test cases finds that ECC and HC have a good overall solution for image encryption.
Journal Article
Photoresponsive Luminescent Polymeric Hydrogels for Reversible Information Encryption and Decryption
2019
Conventional luminescent information is usually visible under either ambient or UV light, hampering their potential application in smart confidential information protection. In order to address this challenge, herein, light‐triggered luminescence ON‐OFF switchable hybrid hydrogels are successfully constructed through in situ copolymerization of acrylamide, lanthanide complex, and diarylethene photochromic unit. The open‐close behavior of the diarylethene ring in the polymer could be controlled by UV and visible light irradiation, where the close form of the ring features fluorescence resonance energy transfer with the lanthanide complex. The hydrogel‐based blocks with tunable emission colors are then employed to construct 3D information codes, which can be read out under a 254 nm UV lamp. The exposure to 300 nm UV light leads to the luminescence quenching of the hydrogels, thus erasing the encoded information. Under visible light (>450 nm) irradiation, the luminescence is recovered to make the confidential information readable again. Thus, by simply alternating the exposure to UV and visible lights, the luminescence signals could become invisible and visible reversibly, allowing for reversible multiple information encryption and decryption. Light‐triggered luminescence ON‐OFF switchable hybrid hydrogels are synthesized through in situ copolymerization. The hydrogel‐based blocks with tunable emission colors are then employed to construct 3D information codes, allowing for reversible multiple information encryption and decryption.
Journal Article
An Integrated Channel Coding and Cryptography Framework for Secure and Energy-Efficient Wireless Energy Data Transmission
2025
This paper proposes a secure and energy-efficient wireless energy data transmission framework that integrates channel coding algorithms with cryptographic techniques. The framework employs LDPC codes, Turbo codes, and polar codes for channel coding, combined with AES, RSA, ECC, PRESENT, and SIMON cryptographic algorithms to address interference, information monitoring, and energy constraints in wireless environments. A dynamic power control strategy based on a greedy algorithm and a channel adaptive coding scheme are designed to optimize energy consumption and transmission reliability. Experiments were conducted using the NS3 simulation platform (with 50 nodes in a grid topology, simulated over 1000 seconds) and a small-scale field test. Key parameters included noise levels set at -90dBm to -60dBm, packet sizes of 512 bytes (AES/RSA) and 256 bytes (PRESENT/SIMON), and initial node energy levels of 1000mJ. Results show that compared with conventional algorithms, the proposed framework reduces the bit error rate by 15.3% (baseline: traditional channel coding without encryption) and energy consumption by 8.7% (baseline: standard WSN routing protocols). Specifically, it achieves a 44.6% lower energy consumption, 30.8% shorter transmission delay, and 73.3% lower bit error rate than traditional models, demonstrating superior performance in secure and efficient energy data transmission.
Journal Article
An efficient medical image encryption scheme for (WBAN) based on adaptive DNA and modern multi chaotic map
بواسطة
Abdelfatah, Roayat Ismail
,
Nasr, Mohamed E
,
Saqr, Hager Mohamed
في
Algorithms
,
Body area networks
,
Chaos theory
2023
A Wireless Body Area Network (WBAN) is a network of wireless sensor nodes that can be installed inside or outside of the human body. This network is crucial in medical problems. Due to storage, battery power, and computational resource limitations, the security of medical information such as medical photographs or other information is a major concern in (WBAN). This work proposes an image encryption approach that addresses these constraints by utilizing adaptive DNA code bases and a new multi chaotic map architecture. DNA coding is used to enhances computing efficiency and gives great data transfer capabilities and the new multi chaotic map was formed by Combining Henon, Gaussian and Logistic map (HGL) To generate more chaotic pseudo-random sequences. Numerous analyses were conducted to test the proposed scheme, such as brute force, statistical, differential assaults and noise added analysis. Results indicated that this scheme has a strong level of security.
Journal Article
A plaintext-related image encryption algorithm based on chaos
2018
A symmetric key image cryptosystem based on the piecewise linear map is presented in this paper. In this cryptosystem, the encryption process and the decryption process are exactly same. They both include the same operations of plaintext-related scrambling once, diffusion twice and matrix rotating of 180 degrees four times. The length of secret key in the system is 64d where d is a positive integer. The proposed system can fight against the chosen/known plaintext attacks due to the using of plaintext-related scrambling. The simulate results and comparison analysis show that the proposed system has many merits such as high encryption/decryption speed, large key space, strong key sensitivity, strong plaintext sensitivity, strong cipher-text sensitivity, good statistical properties of cipher images, and large cipher-text information entropy. So the proposed system can be applied to actual communications.
Journal Article
Adaptive Attribute-Based Honey Encryption: A Novel Solution for Cloud Data Security
بواسطة
Asim, Muhammad
,
Alnashwan, Rana
,
Iftikhar, Sundas
في
Big Data
,
Data integrity
,
Encryption
2025
A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built-in security measures, even though it can effectively handle and store enormous datasets using the Hadoop Distributed File System (HDFS). The increasing number of data breaches emphasizes how urgently creative encryption techniques are needed in cloud-based big data settings. This paper presents Adaptive Attribute-Based Honey Encryption (AABHE), a state-of-the-art technique that combines honey encryption with Ciphertext-Policy Attribute-Based Encryption (CP-ABE) to provide improved data security. Even if intercepted, AABHE makes sure that sensitive data cannot be accessed by unauthorized parties. With a focus on protecting huge files in HDFS, the suggested approach achieves 98% security robustness and 95% encryption efficiency, outperforming other encryption methods including Ciphertext-Policy Attribute-Based Encryption (CP-ABE), Key-Policy Attribute-Based Encryption (KB-ABE), and Advanced Encryption Standard combined with Attribute-Based Encryption (AES+ABE). By fixing Hadoop’s security flaws, AABHE fortifies its protections against data breaches and enhances Hadoop’s dependability as a platform for processing and storing massive amounts of data.
Journal Article
High-Contrast Visualization Chemiluminescence Based on AIE-Active and Base-Sensitive Emitters
بواسطة
Zhang, Xiao-Wen
,
Chen, Xu-Lin
,
Lu, Can-Zhong
في
Acids
,
aggregation-induced emission
,
base-sensitive
2023
Peroxyoxalate chemiluminescence (PO-CL) is one of the most popular cold light sources, yet the drawback of aggregation-caused quenching limits their use. Here, we report a new kind of efficient bifunctional emitter derived from salicylic acid, which not only exhibits typical aggregation-induced emission (AIE) character but also has the ability to catalyze the CL process under basic conditions based on base sensitivity. By taking advantage of these unique features, we successfully confine the CL process on the surface of solid bases and provide a high-contrast visualization of CL emission. This method allows most of the common basic salts like sodium carbonate to be invisible encryption information ink and PO-CL solution to be a decryption tool to visualize the hidden information. The current study opens up an appealing way for the development of multifunction CL emitters for information encryption and decryption applications.
Journal Article
Color Image Encryption Algorithm Based on a Chaotic Model Using the Modular Discrete Derivative and Langton’s Ant
بواسطة
Romero-Arellano, Andrés
,
Moya-Albor, Ernesto
,
Brieva, Jorge
في
Algorithms
,
Analysis
,
Blockchain
2023
In this work, a color image encryption and decryption algorithm for digital images is presented. It is based on the modular discrete derivative (MDD), a novel technique to encrypt images and efficiently hide visual information. In addition, Langton’s ant, which is a two-dimensional universal Turing machine with a high key space, is used. Moreover, a deterministic noise technique that adds security to the MDD is utilized. The proposed hybrid scheme exploits the advantages of MDD and Langton’s ant, generating a very secure and reliable encryption algorithm. In this proposal, if the key is known, the original image is recovered without loss. The method has demonstrated high performance through various tests, including statistical analysis (histograms and correlation distributions), entropy, texture analysis, encryption quality, key space assessment, key sensitivity analysis, and robustness to differential attack. The proposed method highlights obtaining chi-square values between 233.951 and 281.687, entropy values between 7.9999225223 and 7.9999355791, PSNR values (in the original and encrypted images) between 8.134 and 9.957, the number of pixel change rate (NPCR) values between 99.60851796% and 99.61054611%, unified average changing intensity (UACI) values between 33.44672377% and 33.47430379%, and a vast range of possible keys >5.8459×1072. On the other hand, an analysis of the sensitivity of the key shows that slight changes to the key do not generate any additional information to decrypt the image. In addition, the proposed method shows a competitive performance against recent works found in the literature.
Journal Article
Blockchain-based data management mechanism for virtual power plants
2024
With the gradual deepening of power-related research and the expansion of power data volume, power data-oriented research and applications have fully entered the era of big data and cloud storage. The huge amount of heterogeneous data samples also bring a huge impact on traditional data processing methods. Therefore, let each virtual power plant participate in the electricity market externally as a unified power plant, and build a blockchain structure of multiple virtual power plants in the form of a slice. The structured data such as the basic information of the account is stored in the enterprise database in a relational data model and managed through an identity verification policy. The mechanism of off-chain negotiation and on-chain settlement is used to manage the transaction data. The management mechanism is further improved by combining an encryption scheme and a security evaluation method. After the practical test of the management mechanism, the time consumed for one and two parallel operations reaches 23 seconds and 8 seconds, and 4 seconds and 9 seconds or less for three and four times, respectively. In the case of nine users’ data distortion, the root means the square value of the blockchain data management mechanism is only 0.82, which is significantly less than 1. It shows that the blockchain-based data management mechanism, as a new generation of power data management means, can not only effectively integrate the power grid information data and relieve the pressure of the power grid system, but also avoid data leakage and strengthen power security.
Journal Article