[PDF][PDF] Review of image compression and encryption techniques

E Setyaningsih, R Wardoyo - International journal of …, 2017 - pdfs.semanticscholar.org
In line with a growing need for data and information transmission in a safe and quick
manner, researches on image protection and security through a combination of …

A simultaneous approach for compression and encryption techniques using deoxyribonucleic acid

DA Zebari, H Haron, DQ Zeebaree… - 2019 13th International …, 2019 - ieeexplore.ieee.org
The Data Compression is a creative skill which defined scientific concepts of providing
contents in a compact form. Thus, it has turned into a need in the field of communication as …

A survey on hardware implementations of elliptic curve cryptosystems

B Rashidi - arXiv preprint arXiv:1710.08336, 2017 - arxiv.org
In the past two decades, Elliptic Curve Cryptography (ECC) have become increasingly
advanced. ECC, with much smaller key sizes, offers equivalent security when compared to …

Proposal of a lightweight differential power analysis countermeasure method on elliptic curves for low-cost devices

S Gabsi, Y Kortli, V Beroulle, Y Kieffer… - Multimedia Tools and …, 2024 - Springer
Elliptical curves are dedicated for several security applications including Radio Frequency
Identification (RFID) devices, smart cards, bankcards, etc. To guarantee effective security of …

[图书][B] Statistical trend analysis of physically unclonable functions: An approach via text mining

B Zolfaghari, K Bibak, T Koshiba, HR Nemati, P Mitra - 2021 - taylorfrancis.com
Physically Unclonable Functions (PUFs) translate unavoidable variations in certain
parameters of materials, waves, or devices into random and unique signals. They have …

Design and implementation of FPGA-based systolic array for LZ data compression

AE Salama, AH Khalil - 2007 IEEE International Symposium …, 2007 - ieeexplore.ieee.org
Hardware Implementation of Data compression algorithms is receiving increasing attention
due to exponentially expanding network traffic and digital data storage usage. Among …

Review of image encryption and compression techniques

MK Sandhu, S Singh - AIP Conference Proceedings, 2022 - pubs.aip.org
This paper presents a survey on image encryption and compression techniques. The main
aim of using encryption and compression together is to reduce the size; to ensure a quality …

Efficient utilization of scalable multipliers in parallel to compute GF (p) elliptic curve cryptographic operations

A Gutub - Kuwait Journal of Science & Engineering (KJSE) …, 2007 - eprints.kfupm.edu.sa
This paper presents the design and implementation of an elliptic curve cryptographic core to
realize point scalar multiplication operations used for the GF (p) elliptic curve …

Efficient reconfigurable integrated cryptosystems for cybersecurity protection

AT Abebe, YN Shiferaw, PGVS Kumar - Advances in Cyber Security …, 2020 - Springer
Modern cryptosystems comprise various cryptographic mechanisms designed to defend
cyber-attacks which target different application areas. For successful protection of the …

New compression–encryption algorithm using chaos-based dynamic session key

E Setyaningsih, R Wardoyo, AK Sari - International Journal on Smart …, 2018 - sciendo.com
Abstract This research proposes New Compression–Encryption Algorithm Using Chaos-
Based Dynamic Session Key (CEA-CBDSK) to encrypt image data. CEA-CBDSK consists of …