Experimental validation of IoT image encryption scheme based on a 5-D fractional hyperchaotic system and Numba JIT compiler

D Clemente-López, JM Munoz-Pacheco… - Internet of Things, 2024 - Elsevier
In the realm of Internet of Things (IoT) systems, the interconnectivity of physical hardware
devices is a fundamental aspect, and as a result, data exchange assumes a critical role in …

Shrinkable Cryptographic Technique Using Involutory Function for Image Encryption

M Karmakar, A Priya, K Sinha, M Verma - International Conference on …, 2022 - Springer
Cryptography is the technique of hiding and transmitting confidential information via the
internet. There are various traditional cryptographic approaches have been presented by …

The Detection of SQL Injection on Blockchain-Based Database

K Sinha, M Verma - … Applications of Blockchain-Enabled Privacy and …, 2021 - igi-global.com
In today's world, the storage of data needs a huge amount of space. Meanwhile, cloud and
distributed environments provide sufficient storage space for the data. One of the …

Voice-Based Speaker Identification and Verification

K Sinha, RS Hameed, P Paul… - Handbook of Research on …, 2021 - igi-global.com
In recent years, the advancement in voice-based authentication leads in the field of
numerous forensic voice authentication technology. For verification, the speech reference …

[PDF][PDF] An Efficient Diffusion Approach for Chaos-Based Image Encryption and DNA Sequences

GK Shraida, HA Younis - Iraqi Journal for Electrical and Electronic …, 2022 - iasj.net
Experts and researchers in the field of information security have placed a high value on the
security of image data in the last few years. They have presented several image encryption …

A Study on Supervised Machine Learning Technique to Detect Anomalies in Networks

K Sinha - Handbook of Research on Library Response to the …, 2021 - igi-global.com
During this time, COVID-19 has affected the lifestyles of many individuals; in the meantime,
an enormous amount of users are connected with the internet. This will also increase the …

An Efficient Approach for Sending Identification Bit With the Help of Blowfish-RC6

K Patidar, DP Tiwari, P Sharma… - … of Research on …, 2023 - igi-global.com
This chapter used an efficient mechanism based on blowfish and the RC6 (BRC6) algorithm
for better security against cross-site scripting (XSS) attacks. The data types covered in this …

Novel Library Innovations and Advancements After the COVID-19 Pandemic Era

K Jain, A Agarwal - Handbook of Research on Advancements of …, 2023 - igi-global.com
This chapter investigates and reviews novel library innovations and advancements after the
COVID-19 pandemic era. It draws attention to several ways that the pandemic is forcing …