A multi-layered data encryption and decryption scheme based on genetic algorithm and residual numbers

EY Baagyere, PAN Agbedemnab, Z Qin… - IEEE …, 2020 - ieeexplore.ieee.org
Over the years, Steganography and Cryptography have been complementary techniques for
enforcing security of digital data. The need for the development of robust multi-layered …

Latin square and machine learning techniques combined algorithm for image encryption

S Patel, V Thanikaiselvan - Circuits, Systems, and Signal Processing, 2023 - Springer
Multimedia data is crucial in the military, medical, forensics, social, etc., to transmit a large
amount of data. Security of this sensitive information is the primary issue. This paper uses …

[PDF][PDF] Features of genetic algorithm for plain text encryption

RB Abduljabbar, OK Hamid, NJ Alhyani - International Journal of …, 2021 - core.ac.uk
The data communication has been growing in present day. Therefore, the data encryption
became very essential in secured data transmission and storage and protecting data …

Efficient Auto key based Encryption and Decryption using GICK and GDCK methods

SK Lakshmanan, L Shakkeera… - 2020 3rd International …, 2020 - ieeexplore.ieee.org
Security services and share information is provided by the computer network. The computer
network is by default there is not security. The Attackers can use this provision to hack and …

Optimization-based pseudo random key generation for fast encryption scheme

SA Shawkat, N Tagougui, M Kherallah - Bulletin of Electrical Engineering …, 2023 - beei.org
Data encryption is being widely employed to secure data in order to provide confidentiality,
authenticity and data privacy. In proposed method a novel method for (encryption …

Encryption Using Residue Number System: Research Trends and Future Challenges

R Shevchuk, I Yakymenko… - 2024 14th International …, 2024 - ieeexplore.ieee.org
This paper presents a comprehensive knowledge mapping and in-depth analysis of the
application of residue number system in encryption technique research to understand better …

[PDF][PDF] Improving cloud data encryption using customized genetic algorithm

MJ Arshad, M Umair, S Munawar… - … Journal of Intelligent …, 2020 - researchgate.net
Data Encryption is widely utilized for ensuring data privacy, integrity, and confidentiality.
Nowadays, a large volume of data is uploaded to the cloud, which increases its vulnerability …

A multi-layer data encryption and decryption mechanism employing cryptography and steganography

T Tabassum, MA Mahmood - 2020 Emerging Technology in …, 2020 - ieeexplore.ieee.org
Information protection is a significant matter for both oneself and companies involved in one
manner of communication or the other, particularly in cyberspace, due to the development of …

[HTML][HTML] A New Image Watermarking Scheme Using Genetic Algorithm and Residual Numbers with Discrete Wavelet Transform

PA Agbedemnab, M Akolgo, MA Agebure - Journal of Information Security, 2023 - scirp.org
Transmission of data over the internet has become a critical issue as a result of the
advancement in technology, since it is possible for pirates to steal the intellectual property of …

Residue Number System-Based Approach to Minimise Energy Consumption in Wireless Sensor Networks

S Abdul-Mumin, A Abdul-Barik… - Asian Journal of …, 2022 - eprint.subtopublish.com
This study harnesses the useful number properties of the residue number system (RNS) to
minimise energy consumption in a wireless sensor network. In a traditional cluster-based …