Modified Caesar Cipher and Card Deck Shuffle Rearrangement Algorithm for Image Encryption
D Veera, R Mangrulkar, C Bhadane… - Journal of Information …, 2024 - Taylor & Francis
In today's social networking era, information security breaches are at an all-time high,
especially when it comes to texts and images, which should come as no surprise. Integrity is …
especially when it comes to texts and images, which should come as no surprise. Integrity is …
[PDF][PDF] Modifikasi Algoritma Caesar Cipher pada Kode ASCII dalam Meningkatkan Keamanan Pesan Teks
HD Purnomo, I Sembiring - Journal of Information …, 2022 - journal.shantibhuana.ac.id
Theft of personal data is a criminal act and violates the law in the field of information
technology. Therefore, the security of personal data must have a higher level of security …
technology. Therefore, the security of personal data must have a higher level of security …
An Algorithm for Color-Based Password Authentication to Increase Security Level
SR Selamat, SY Cai, NH Hassan… - Innovation in Research of …, 2024 - jurnal.unsil.ac.id
Security level in authentication is essential to decrease the possibility of an account being
guessed. Several authentication methods are widely used nowadays, covering digital …
guessed. Several authentication methods are widely used nowadays, covering digital …
Optimization of the gronsfeld cipher key using okamoto-uchiyama public-key cryptosystem for data security
All aspects of life requires security, including in computer. Cryptography is one of the
methods continually developed in computer security. Combining ciphers is an effort to …
methods continually developed in computer security. Combining ciphers is an effort to …
Une approche cryptographique pour l'authentification de données multimédia dans l'Internet des Objets basée sur les blockchains
BT Asare - 2022 - theses.hal.science
Les cyberattaques hautement sophistiquées et les occurrences de failles de sécurité sur
l'IoT (Internet des Objets) croissent de jour en jour. La technologie des blockchains de par …
l'IoT (Internet des Objets) croissent de jour en jour. La technologie des blockchains de par …
An approach to Improving Columnar Permutation Cipher for Wills in Distributed Systems of Law Firms
E Nwokedi, O Adeniyi Ojerinde, J Ojeniyi… - Proceedings of the 5th …, 2021 - dl.acm.org
With the evolution of cryptography in the twentieth century, classical ciphers (transposition
ciphers) are gradually being pushed out because it now possesses low security ratings …
ciphers) are gradually being pushed out because it now possesses low security ratings …
A Novel Way of Decrypting Single Columnar Transposition Ciphers
NM Adyapak, B Vineetha… - … Conference on Smart …, 2022 - ieeexplore.ieee.org
Single columnar transposition is an encryption technique used in text encryption to produce
cipher text which is a permutation of its original text. In this study, cryptanalysis of Single …
cipher text which is a permutation of its original text. In this study, cryptanalysis of Single …
A Novel Hybrid Cipher Using Cipher Squares for Better Security
AV Jayanthi - … Intelligence and Cognitive Informatics: Proceedings of …, 2021 - Springer
Cryptography uses encryption and decryption to secure information. In the field of
Information Security, many algorithms have been devised to encrypt and decrypt the …
Information Security, many algorithms have been devised to encrypt and decrypt the …
Alternatives to Huffman Coding by Comparison to Other Algorithms
M Gupta - 2021 Innovations in Power and Advanced Computing …, 2021 - ieeexplore.ieee.org
With advancements in technology and the Data Boom due to the Internet of things (IoT), the
world now generates considerable amounts of data. Take the example of self-driving cars …
world now generates considerable amounts of data. Take the example of self-driving cars …
Implementation of Steganography Modified Least Significant Bit using the Columnar Transposition Cipher and Caesar Cipher Algorithm in Image Insertion
JT Tarigan, DI Putra - Journal of Physics: Conference Series, 2021 - iopscience.iop.org
Steganography technique is a technique to hide data or information into other media such
as digital images, text, sound, or video. One of the simplest methods of Steganography in the …
as digital images, text, sound, or video. One of the simplest methods of Steganography in the …