This article proposes a novel multiple-image encryption algorithm (MIEA) that utilizes parallel processing. The proposed MIEA combines multiple plain images, forming a plain image cube. The proposed MIEA is based on t...
详细信息
Vehicle-to-vehicle communication is one of the new paradigms of networking, which should be secure, fast, and efficient. In this paper, we propose a framework that implements the pseudonym-based authentication scheme ...
详细信息
In the digital era, image encryption security is a focus. Facing security risks such as the irrelevance of plaintext and ciphertext and the independence of the disarrangement and diffusion steps, a new algorithm combi...
详细信息
In order to ensure the security of communication information under attack, a research on secure encrypted communication method for unmanned aerial vehicle systems based on hybrid encryption algorithm is proposed. Afte...
详细信息
With the rapid development of the internet and information technology, the traditional encryption methods suffer from drawbacks such as poor processing capacity and low security, making them vulnerable to attacks. Thi...
详细信息
This study focuses on development of a secure and efficient image cryptosystem optimized for IoT devices. The proposed technique addresses the and resource constraints of IoT devices, it introduces a hybrid encryption...
详细信息
The increasing necessity for secure communication in resource-constrained platforms those found in the Internet of Things (IoT), has drawn to a key spike in demand for lightweight symmetric cyphers. However, a number ...
详细信息
With the rapid advancement of cloud computing, significant security concerns regarding data storage have been continuously raised. When the encrypted images are stored in the cloud, reversible data hiding in encrypted...
详细信息
This paper introduces a new encryption technique which bases its operations on advanced bivariate mathematical functions and uses a genetic algorithm to optimize these along with random key generation techniques. This...
详细信息
Patterns are key to decrypting messages. Language is composed of repeat groupings of symbols encoded in words and the syntax of a language. Patterns bleed through encryption since all encryption algorithms can be repl...
详细信息
暂无评论