Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJuly 2024
A hybrid DNA cryptography-based encryption algorithm using the fusion of symmetric key techniques
International Journal of Advanced Intelligence Paradigms (IJAIP), Volume 28, Issue 3-4Pages 340–363https://doi.org/10.1504/ijaip.2024.140095The 21st century, is the era of e-commerce and e-business where information security plays very vital role. The higher data breaching rate has raised a query to the safety of digitalisation scheme. The security approaches which are made for every ...
- research-articleMay 2024
Image and object encryption using multiplicative cipher and K-means clustering algorithm
International Journal of Applied Cryptography (IJACT), Volume 4, Issue 3-4Pages 195–204https://doi.org/10.1504/ijact.2024.138424In recent years, the development of various visual sensing and image analysis techniques has resulted in the creation of images that contain extremely sensitive data. Unauthorised individuals who access this data illegally risk capturing and disclosing ...
- research-articleMay 2024
Functional encryption implementation to protect storage data in the cloud
International Journal of Electronic Security and Digital Forensics (IJESDF), Volume 16, Issue 3Pages 329–343https://doi.org/10.1504/ijesdf.2024.138335Large volumes of electronic data have been created in recent years, and enterprises that require data recovery services may be affected by a variety of natural or man-made disasters, resulting in massive data losses. Encryption is the most reliable ...
- research-articleMarch 2024
An encryption approach to improve the security and performance of data by integrating AES with a modified OTP technique
International Journal of Advanced Intelligence Paradigms (IJAIP), Volume 27, Issue 2Pages 129–149https://doi.org/10.1504/ijaip.2024.137187Maintaining the security and privacy of data is of paramount priority while using the network and communication systems. Cryptography is an art used to solve the sole purpose of data security. Encryption serves as one of the most popular algorithms for ...
- research-articleFebruary 2024
Improving cloud security model for web applications using hybrid encryption techniques
International Journal of Internet Technology and Secured Transactions (IJITST), Volume 13, Issue 3Pages 291–308https://doi.org/10.1504/ijitst.2024.136677The hybrid approach used in this paper aims to improve online application security. Homographic encryption and squirrel search algorithm (SSA) are combined to create this hybrid. The cloud computing model's security improved with the use of this ...
-
- research-articleJanuary 2024
Decryption speed up of RSA by pre-calculation
MICML '23: Proceedings of the 2023 International Conference on Mathematics, Intelligent Computing and Machine LearningPages 11–16https://doi.org/10.1145/3638264.3638269It is easy to increase the encryption speed by using small public exponent in RSA. In this case, private exponent is full sized (on the order of modulus) and so, most of calculation costs are allocated to decryption. Meanwhile, it is not easy to speed up ...
- research-articleMay 2024
Cryptographic algorithm development and application for encryption and decryption
- Rahul Ravindra Pitale,
- Kapil Dinkarrao Tajane,
- Prathamesh Bhagwat Mahajan,
- Nishita Sharad Nehate,
- Apeksha Jagdish Mulimani,
- Devarsh Sandeep Lokhande
ICIMMI '23: Proceedings of the 5th International Conference on Information Management & Machine IntelligenceArticle No.: 27, Pages 1–7https://doi.org/10.1145/3647444.3647853Abstract—Cryptographic algorithms are used to maintain the data confidentiality and integrity. In the era of ubiquitous digital communication and information exchange, the security of sensitive data has become a paramount concern. Cryptographic ...
- research-articleSeptember 2023
An Applied Image Cryptosystem on Moore’s Automaton Operating on δ (qk)/𝔽2
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), Volume 20, Issue 2Article No.: 52, Pages 1–20https://doi.org/10.1145/3614433The volume of multimedia-based image data or video frames in Web 3.0 is constantly increasing, owing to the advancement of real-time data transmission. However, security vulnerabilities frequently impair the performance of real-time applications. Many ...
- ArticleJuly 2023
Secure Mobile Ad Hoc Routing Using Confrontations (SMARUC) and Nodes Communication with CCM (Character Classification Model) - OKE (Optimal Key Exchange) - SSL (Secure Socket Layer) Model
Computational Science and Its Applications – ICCSA 2023 WorkshopsPages 160–173https://doi.org/10.1007/978-3-031-37108-0_11AbstractManet (Mobile Adhoc network) is a dynamic network with no fixed infrastructure. So Data Routing among nodes in a wireless network is pretty complex when compared to traditional centralized network architecture. There is always possibility the ...
- research-articleJanuary 2023
Efficient classification and preservation of log integrity through propagated chain in cloud
Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology (JIFS), Volume 45, Issue 3Pages 4669–4687https://doi.org/10.3233/JIFS-224585Preserving the integrity of log data and using the same for forensic analysis is one of the prime concerns of cloud-oriented applications. Since log data collates sensitive information, providing confidentiality and privacy is of at most importance. For ...
- research-articleJanuary 2023
A privacy preservation data collection and access control using entropy-based conic curve
Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology (JIFS), Volume 44, Issue 5Pages 7629–7642https://doi.org/10.3233/JIFS-223141Because significantly complex crypto procedures such as holomorphic encryption are robotically applied, despite the fact that consumer gadgets under our software circumstances are not, computational overhead is outrageously high. Simply hiding customers ...
- research-articleJanuary 2023
A bio-inspired algorithm for enhancing DNA cryptography
International Journal of Information and Computer Security (IJICS), Volume 21, Issue 3-4Pages 436–456https://doi.org/10.1504/ijics.2023.132779In this era, information security plays a crucial and sensitive task as this data is potentially vulnerable such that different types of attacks may happen and affects the data. This paper presents a new hybrid cryptosystem for DNA cryptography based on ...
- research-articleMay 2023
Absolute Data Security Scheme: An Advanced Approach towards Data Security
ICIMMI '22: Proceedings of the 4th International Conference on Information Management & Machine IntelligenceArticle No.: 41, Pages 1–6https://doi.org/10.1145/3590837.3590953With the exponential increase in the applications of digitalization, the risk of data breach and theft is also rising tremendously. The abrupt increase in the use of digital money, especially after demonetization and then during Corona pandemic, has ...
- research-articleJuly 2022
Optimized video internet of things using elliptic curve cryptography based encryption and decryption
- Bilal S.A. Alhayani,
- Nagham Hamid,
- Firas Husham Almukhtar,
- Omar A. Alkawak,
- Hemant B. Mahajan,
- Ameer Sardar Kwekha-Rashid,
- Haci İlhan,
- Haydar Abdulameer Marhoon,
- Husam Jasim Mohammed,
- Ibrahim Zeghaiton Chaloob,
- Ahmed Alkhayyat
Computers and Electrical Engineering (CENG), Volume 101, Issue Chttps://doi.org/10.1016/j.compeleceng.2022.108022AbstractThe adaptive Joint Photographic Experts Group 2000 (JPEG2000) image compression approach employing the wavelet image transform had proposed with the rise of the optimized Video Internet of Things (VIoT) using image transmission ...
- research-articleJune 2022
Colmade: Collaborative Masking in Auditable Decryption for BFV-based Homomorphic Encryption
IH&MMSec '22: Proceedings of the 2022 ACM Workshop on Information Hiding and Multimedia SecurityPages 129–139https://doi.org/10.1145/3531536.3532952This paper proposes a novel collaborative decryption protocol for the Brakerski-Fan-Vercauteren (BFV) homomorphic encryption scheme in a multiparty distributed setting, and puts it to use in designing a leakage-resilient biometric identification ...
- research-articleMay 2022
Sailfish invasive weed optimization algorithm for multiple image sharing in cloud computing
International Journal of Intelligent Systems (IJIS), Volume 37, Issue 7Pages 4190–4213https://doi.org/10.1002/int.22717AbstractVisual cryptography (VC) is a secret sharing cryptographic technique, which permits visual information that is encrypted in such a way that the decrypted information shows the visual image. Security is the common problem that arises in the general ...
- research-articleJanuary 2022
Finite state transducer based light-weight cryptosystem for data confidentiality in cloud computing
International Journal of Grid and Utility Computing (IJGUC), Volume 13, Issue 6Pages 577–588https://doi.org/10.1504/ijguc.2022.128293Cloud computing is derived from parallel, cluster, grid and distributed computing and is becoming an advanced and growing technology. With the rapid growth of Internet technology and its speed, the number of users for cloud is growing enormously and also ...
- research-articleNovember 2021
A Novel Threshold Secret Sharing Scheme for CP-ABE: A secret sharing approach for CP-ABE
IC3-2021: Proceedings of the 2021 Thirteenth International Conference on Contemporary ComputingPages 92–98https://doi.org/10.1145/3474124.3474137Secret sharing is an integral part of CP-ABE implementation. Currently, Linear Secret Sharing Scheme (LSSS) and Lagrange interpolation are used in existing CP-ABE implementation. Implementation is complex and computational cost is high for generating ...
- research-articleOctober 2020
Encryption and Decryption of Optical Images with Different Algorithms
AIAM2020: Proceedings of the 2nd International Conference on Artificial Intelligence and Advanced ManufacturePages 256–265https://doi.org/10.1145/3421766.3421828While digital images are the most common expression of information on the internet, their security is of great concern, and image encryption technology is a key technology to ensure the security of images. Several kinds of image encryption and ...
- research-articleJuly 2024
Implementation of El-Gamal algorithm for speech signals encryption and decryption
Procedia Computer Science (PROCS), Volume 167, Issue CPages 1028–1037https://doi.org/10.1016/j.procs.2020.03.402AbstractIn the applications of Internet and wireless communication network, information security is one of the most challenging aspects. Cryptography is the best solution that offers the requisite protection from unintended persons. By using encryption ...