Security Control and Data Planes of SDN: A Comprehensive Review of Traditional, AI and MTD Approaches to Security Solutions
Software-Defined Networking (SDN) is a groundbreaking technology that has transformed
network management significantly. By integrating data and control, SDN offers unparalleled …
network management significantly. By integrating data and control, SDN offers unparalleled …
ECC based novel color image encryption methodology using primitive polynomial
With the increasing use of digital images, there is a growing need for secure and efficient
image encryption algorithms to ensure their confidentiality during transmission. In this paper …
image encryption algorithms to ensure their confidentiality during transmission. In this paper …
[PDF][PDF] Theoretical Background of Cryptography
RM Al-Amri, DN Hamood, AK Farhan - Mesopotamian Journal of …, 2023 - iasj.net
Cryptography is the practice of secure communication and the study of secure
communication techniques. The theoretical foundations of cryptography include concepts …
communication techniques. The theoretical foundations of cryptography include concepts …
An image autonomous selection encryption algorithm based on the delay exponential logistic chaotic model
W Xu, L Liu - Nonlinear Dynamics, 2024 - Springer
In recent decades, many excellent holistic image encryption schemes have been proposed.
However, considering the practical application environment, only specific content in the …
However, considering the practical application environment, only specific content in the …
Design and implementation of real-time image acquisition chip based on triple-hybrid encryption system
J Li, Y Luo, F Wang, W Gao - Electronics, 2022 - mdpi.com
With the improved hardware storage capabilities and the rapid development of artificial
intelligence image recognition technology, information is becoming image-oriented …
intelligence image recognition technology, information is becoming image-oriented …
Optimized 3-D Chaotic Map for Compressed Image Encryption for Secure Communication
A Tiwari, P Diwan, TD Diwan - 2024 - researchsquare.com
In today's digital world, there is a significant increase in data transfer online especially in
multimedia form. This online transmission faces many cyber threats such as denial-of …
multimedia form. This online transmission faces many cyber threats such as denial-of …
Securing Image using Triple Data Encryption Standard
MG Rao, D Cenitta, RV Arjunan… - 2024 3rd International …, 2024 - ieeexplore.ieee.org
This study explores the efficacy of securing images through the implementation of the Triple
Data Encryption Standard (TDES). TDES, a symmetric-key block cipher, is examined for its …
Data Encryption Standard (TDES). TDES, a symmetric-key block cipher, is examined for its …
RAINBOW: Resilient Asymmetric Imaging Non-linear Bit-level Ordering with Hyperchaotic Operation for Color image Encryption
W Zhang - Transactions on Computer Science and Intelligent …, 2024 - wepub.org
Hyperchaotic encryption, known for its high level of unpredictability and complexity, is widely
used in the field of image encryption. However, current hyperchaotic image encryption tech …
used in the field of image encryption. However, current hyperchaotic image encryption tech …
[PDF][PDF] IoMT Preserving Patients' Privacy
Y Elkhawass - 2023 - researchgate.net
The continuous advancement in technology has resulted in the Internet of Things (IoT)
becoming more powerful in collecting data and simplifying real-life applications, particularly …
becoming more powerful in collecting data and simplifying real-life applications, particularly …
Görüntü Şifrelemede Kullanılan Kaotik Haritaların Incelenmesi ve Hibrit bir Yöntem Önerisi
D Güvenoğlu - 2023 - search.proquest.com
Günümüz teknolojileri göz önüne alındığında günlük yaşantımızda en çok paylaşımda
bulunulan verilerin multimedya verileri olduğu görülmektedir. Ağ üzerinden multimedya …
bulunulan verilerin multimedya verileri olduğu görülmektedir. Ağ üzerinden multimedya …