Rotation left digits to enhance the security level of message blocks cryptography
Due to the availability of several social media platforms and their use in sending text
messages, it is necessary to provide an easy and safe way to protect messages from being …
messages, it is necessary to provide an easy and safe way to protect messages from being …
Generating powerful encryption keys for image cryptography with chaotic maps by incorporating collatz conjecture
In recent years, the chaotic logistic map key (CLMK) has been widely used for image
encryption due to its ability to generate random and unpredictable sequences of numbers …
encryption due to its ability to generate random and unpredictable sequences of numbers …
CASDC: a cryptographically secure data system based on two private key images
Colored digital images are one of the most important types of digital data to be used in many
vital applications, which require a safe way to protect them from hacking operations and the …
vital applications, which require a safe way to protect them from hacking operations and the …
Protecting digital images using keys enhanced by 2D chaotic logistic maps
This research paper presents a novel digital color image encryption approach that ensures
high-level security while remaining simple and efficient. The proposed method utilizes a …
high-level security while remaining simple and efficient. The proposed method utilizes a …
[PDF][PDF] Improving Average and Median Filters
Average and median filters are the most popular filters used to reduce the negative effects of
salt and pepper noise affected gray and color images, these filters work good when the …
salt and pepper noise affected gray and color images, these filters work good when the …
[PDF][PDF] A Novel Approach to Extract Color Image Features using Image Thinning
M Abu-Faraj, Z Alqadi, B Al-Ahmad… - Applied …, 2022 - naturalspublishing.com
Color digital image recognition systems require discrimination processes that have high
efficiency and speed to make the appropriate decision. Since the size of most digital color …
efficiency and speed to make the appropriate decision. Since the size of most digital color …
Matrix encryption walks for lightweight cryptography
A Dunmore, J Samandari, J Jang-Jaccard - Cryptography, 2023 - mdpi.com
In this paper, we propose a new symmetric stream cipher encryption algorithm based on
Graph Walks and 2-dimensional matrices, called Matrix Encryption Walks (MEW). We offer …
Graph Walks and 2-dimensional matrices, called Matrix Encryption Walks (MEW). We offer …
[PDF][PDF] Long Messages Segmentation for Efficient Message Cryptography
Protecting LSB method of data steganography is a vital issue. In this paper research a
secure LSB method will be introduced. The method will use a private key to divide a …
secure LSB method will be introduced. The method will use a private key to divide a …
[PDF][PDF] SPEECH FILES CRYPTOGRAPHY USING IMAGE KEY AND INDICES KEY
Protecting speech files from being hacked is a vital issue. In this paper's research, a new
and simple method of speech files cryptography will be introduced. The method will simplify …
and simple method of speech files cryptography will be introduced. The method will simplify …
[PDF][PDF] Improving the efficiency of median filters using special generated windows
Digital images of various types, gray and color, are used in many vital applications,
necessitating the need to rid them of the noise that can infect them during the messaging …
necessitating the need to rid them of the noise that can infect them during the messaging …