Adaptive optimal multi key based encryption for digital image security
暂无分享,去创建一个
Ashish Khanna | Victor Hugo C. de Albuquerque | Deepak Gupta | S. K. Lakshmanaprabu | Kartik Shankar | V. Albuquerque | S. Lakshmanaprabu | K. Shankar | Ashish Khanna | Deepak Gupta
[1] Kartik Shankar,et al. Sharing a Secret Image with Encapsulated Shares in Visual Cryptography , 2015 .
[2] Xiaonan Luo,et al. Integrated chaotic systems for image encryption , 2018, Signal Process..
[3] Jenny Torres,et al. RSA encryption algorithm optimization to improve performance and security level of network messages , 2016 .
[4] K. Shankar,et al. A new k out of n secret image sharing scheme in visual cryptography , 2016, 2016 10th International Conference on Intelligent Systems and Control (ISCO).
[5] W. Puech,et al. Image Encryption and Compression for Medical Image Security , 2008, 2008 First Workshops on Image Processing Theory, Tools and Applications.
[6] Zhihua Gan,et al. A new chaos-based image encryption algorithm with dynamic key selection mechanisms , 2016, Multimedia Tools and Applications.
[7] I-Ling Yen,et al. An Efficient Homomorphic Encryption Protocol for Multi-User Systems , 2012, IACR Cryptol. ePrint Arch..
[8] Kalpna Sagar,et al. A critical analysis of a hierarchy based Usability Model , 2014, 2014 International Conference on Contemporary Computing and Informatics (IC3I).
[9] Andino Maseleno,et al. Optimal feature-based multi-kernel SVM approach for thyroid disease classification , 2018, The Journal of Supercomputing.
[10] Rajeev Anand Sahu,et al. Multi-party (Leveled) Homomorphic Encryption on Identity-Based and Attribute-Based Settings , 2017, ICISC.
[11] Deepak Gupta,et al. Taxonomy of GUM and usability prediction using GUM multistage fuzzy expert system , 2019, Int. Arab J. Inf. Technol..
[12] Jian An,et al. An Efficient Secret Key Homomorphic Encryption Used in Image Processing Service , 2017, Secur. Commun. Networks.
[13] Andino Maseleno,et al. Nur algorithm on data encryption and decryption , 2018 .
[14] Deepak Gupta,et al. Unique Identification System , 2010 .
[15] Mohamed Abdel-Basset,et al. A comprehensive review of quadratic assignment problem: variants, hybrids and applications , 2018, Journal of Ambient Intelligence and Humanized Computing.
[16] Shafali Agarwal,et al. Image Encryption Techniques Using Fractal Function:A Review , 2017 .
[17] Mohamed Elhoseny,et al. A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption , 2016, J. King Saud Univ. Comput. Inf. Sci..
[18] Yannis Avrithis,et al. Regions of interest for accurate object detection , 2008, 2008 International Workshop on Content-Based Multimedia Indexing.
[19] Deepak Gupta,et al. Usability Determination Using Multistage Fuzzy System , 2016 .
[20] Mai Mohamed,et al. RETRACTED: The role of single valued neutrosophic sets and rough sets in smart city: Imperfect and incomplete information systems , 2018, Measurement.
[21] Joel J. P. C. Rodrigues,et al. Ranking Analysis for Online Customer Reviews of Products Using Opinion Mining with Clustering , 2018, Complex..
[22] Kwok-Wo Wong,et al. On the Security of a Class of Diffusion Mechanisms for Image Encryption , 2015, IEEE Transactions on Cybernetics.
[23] Nitesh Naik,et al. Image security using image encryption and image stitching , 2017, 2017 International Conference on Computing Methodologies and Communication (ICCMC).
[24] Mohamed Abdel-Basset,et al. 2-Levels of clustering strategy to detect and locate copy-move forgery in digital images , 2018, Multimedia Tools and Applications.
[25] Saleh Mesbah,et al. Efficiency and Security of Some Image Encryption Algorithms , 2008 .
[26] Kartik Shankar,et al. Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm , 2018 .
[27] Deepak Gupta,et al. Usability Prediction of ‘Live Auction’ Using Multistage Fuzzy System , 2017 .
[28] Seyed Mohammad Mirjalili,et al. Whale optimization approaches for wrapper feature selection , 2018, Appl. Soft Comput..
[29] Kalpna Sagar,et al. Usability Prediction & Ranking of SDLC Models Using Fuzzy Hierarchical Usability Model , 2017 .
[30] K. Shankar,et al. RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography , 2017, China Communications.
[31] Khumanthem Manglem Singh,et al. Image Encryption using Elliptic Curve Cryptography , 2015 .
[32] N. Sasikaladevi,et al. An Efficient Homomorphic Medical Image Encryption Algorithm For Cloud Storage Security , 2017 .
[33] S. Ramakrishnan,et al. Chaotic Image Encryption with Hash Keying as Key Generator , 2017 .
[34] Mohamed Abdel-Basset,et al. A hybrid whale optimization algorithm based on local search strategy for the permutation flow shop scheduling problem , 2018, Future Gener. Comput. Syst..
[35] Deepak Gupta,et al. Usability Feature Optimization Using MWOA , 2019 .
[36] Frederik Vercauteren,et al. Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes , 2010, Public Key Cryptography.
[37] Jian Weng,et al. Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC , 2017, Secur. Commun. Networks.
[38] Deepak Gupta,et al. Usability feature selection via MBBAT: A novel approach , 2017, J. Comput. Sci..
[39] Victor I. Chang,et al. NMCDA: A framework for evaluating cloud computing services , 2018, Future Gener. Comput. Syst..
[40] Jiantao Zhou,et al. A Review of Compressive Sensing in Information Security Field , 2016, IEEE Access.
[41] Deepak Gupta,et al. Software usability datasets , 2017 .
[42] Deepak Gupta,et al. Remote File Synchronization Single-Round Algorithms , 2010 .
[43] P. Eswaran,et al. RGB-Based Secure Share Creation in Visual Cryptography Using Optimal Elliptic Curve Cryptography Technique , 2016, J. Circuits Syst. Comput..
[44] Peijia Zheng,et al. An efficient image homomorphic encryption scheme with small ciphertext expansion , 2013, ACM Multimedia.
[45] Lisheng Xu,et al. Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compression , 2018 .
[46] Joel J. P. C. Rodrigues,et al. Usability feature extraction using modified crow search algorithm: a novel approach , 2018, Neural Computing and Applications.
[47] Mohamed Abdel-Basset,et al. An improved nature inspired meta-heuristic algorithm for 1-D bin packing problems , 2018, Personal and Ubiquitous Computing.