Results for 'Data Encryption'

976 found
Order:
  1.  23
    Clouded data: Privacy and the promise of encryption.Liam Magee, Tsvetelina Hristova & Luke Munn - 2019 - Big Data and Society 6 (1).
    Personal data is highly vulnerable to security exploits, spurring moves to lock it down through encryption, to cryptographically ‘cloud’ it. But personal data is also highly valuable to corporations and states, triggering moves to unlock its insights by relocating it in the cloud. We characterise this twinned condition as ‘clouded data’. Clouded data constructs a political and technological notion of privacy that operates through the intersection of corporate power, computational resources and the ability to obfuscate, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  25
    Health data privacy through homomorphic encryption and distributed ledger computing: an ethical-legal qualitative expert assessment study.Effy Vayena, Marcello Ienca & James Scheibner - 2022 - BMC Medical Ethics 23 (1):1-13.
    BackgroundIncreasingly, hospitals and research institutes are developing technical solutions for sharing patient data in a privacy preserving manner. Two of these technical solutions are homomorphic encryption and distributed ledger technology. Homomorphic encryption allows computations to be performed on data without this data ever being decrypted. Therefore, homomorphic encryption represents a potential solution for conducting feasibility studies on cohorts of sensitive patient data stored in distributed locations. Distributed ledger technology provides a permanent record on (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  3.  29
    Encryption of Data Streams using Pauli spins ½ matrices.D. Sravana Kurmar, C. H. Suneetha & A. Chandra Sekhar - 2010 - In Giselle Walker & Elisabeth Leedham-Green, Identity. New York: Cambridge University Press. pp. 10--01.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  4.  45
    Synergistic Information Processing Encrypts Strategic Reasoning in Poker.Seth Frey, Dominic K. Albino & Paul L. Williams - 2018 - Cognitive Science 42 (5):1457-1476.
    There is a tendency in decision‐making research to treat uncertainty only as a problem to be overcome. But it is also a feature that can be leveraged, particularly in social interaction. Comparing the behavior of profitable and unprofitable poker players, we reveal a strategic use of information processing that keeps decision makers unpredictable. To win at poker, a player must exploit public signals from others. But using public inputs makes it easier for an observer to reconstruct that player's strategy and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  5. Efficient Privacy-Preserving Protocol for k-NN Search over Encrypted Data in Location-Based Service.Huijuan Lian, Weidong Qiu, Zheng di YanHuang & Jie Guo - 2017 - Complexity:1-14.
    With the development of mobile communication technology, location-based services are booming prosperously. Meanwhile privacy protection has become the main obstacle for the further development of LBS. The k-nearest neighbor search is one of the most common types of LBS. In this paper, we propose an efficient private circular query protocol with high accuracy rate and low computation and communication cost. We adopt the Moore curve to convert two-dimensional spatial data into one-dimensional sequence and encrypt the points of interest information (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  6.  38
    Encrypting human rights: The intertwining of resistant voices in the UK state surveillance debate.James Allen-Robertson & Amy Stevens - 2021 - Big Data and Society 8 (1).
    The Snowden revelations in 2013 redrew the lines of debate surrounding surveillance, exposing the extent of state surveillance across multiple nations and triggering legislative reform in many. In the UK, this was in the form of the Investigatory Powers Act. As a contribution to understanding resistance to expanding state surveillance activities, this article reveals the intertwining of diverse interests and voices which speak in opposition to UK state surveillance. Through a computational topic modelling-based mixed methods analysis of the submissions made (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  7. Offline privacy preserving proxy re-encryption in mobile cloud computing.Yaping Lin & Voundi Koe Arthur Sandor - 2019 - Pervasive and Mobile Computing 59.
    This paper addresses the always online behavior of the data owner in proxy re- encryption schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext policy attribute based encryption techniques to type-based proxy re-encryption to build our solution. As a result, user authentication and user authorization are moved to the cloud server which does not require further interaction with the data owner, data owner and data users identities are hidden from the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  8.  21
    HWCD: A hybrid approach for image compression using wavelet, encryption using confusion, and decryption using diffusion scheme.Alagarswamy Ramaprasath & Heggere Rangaswamaiah Latha - 2023 - Journal of Intelligent Systems 32 (1).
    Image data play important role in various real-time online and offline applications. Biomedical field has adopted the imaging system to detect, diagnose, and prevent several types of diseases and abnormalities. The biomedical imaging data contain huge information which requires huge storage space. Moreover, currently telemedicine and IoT based remote health monitoring systems are widely developed where data is transmitted from one place to another. Transmission of this type of huge data consumes more bandwidth. Along with this, (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  9.  20
    A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map.Adel R. Alharbi, Jawad Ahmad, Undefined Arshad, Sajjad Shaukat Jamal, Fawad Masood, Yazeed Yasin Ghadi, Nikolaos Pitropakis & William J. Buchanan - 2022 - Complexity 2022:1-15.
    With the increasing volume of data transmission through insecure communication channels, big data security has become one of the important concerns in the cybersecurity domain. To address these concerns and keep data safe, a robust privacy-preserving cryptosystem is necessary. Such a solution relies on chaos encryption algorithms over standard cryptographic methods that possess multistage encryption levels, including high speed, high security, low compute overheads, and procedural power, among other characteristics. In this work, a secure image (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10.  86
    A Novel Security Methodology for Smart Grids: A Case Study of Microcomputer-Based Encryption for PMU Devices.Metin Varan, Akif Akgul, Fatih Kurugollu, Ahmet Sansli & Kim Smith - 2021 - Complexity 2021:1-15.
    Coordination of a power system with the phasor measurement devices in real time on the load and generation sides is carried out within the context of smart grid studies. Power systems equipped with information systems in a smart grid pace with external security threats. Developing a smart grid which can resist against cyber threats is considered indispensable for the uninterrupted operation. In this study, a two-way secure communication methodology underpinned by a chaos-based encryption algorithm for PMU devices is proposed. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11.  33
    Prosody in spontaneous humor: Evidence for encryption.Thomas Flamson, Gregory A. Bryant & H. Clark Barrett - 2011 - Pragmatics and Cognition 19 (2):248-267.
    The study of conversational humor has received relatively little empirical attention with almost no examinations of the role of vocal signals in spontaneous humor production. Here we report an analysis of spontaneous humorous speech in a rural Brazilian collective farm. The sample was collected over the course of ethnographic fieldwork in northeastern Brazil, and is drawn specifically from the monthly communal business meetings conducted in Portuguese. Our analyses focused on humorous utterances identified by the subsequent presence of laughter. Acoustic features (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  12.  36
    Towards data justice? The ambiguity of anti-surveillance resistance in political activism.Jonathan Cable, Arne Hintz & Lina Dencik - 2016 - Big Data and Society 3 (2).
    The Snowden leaks, first published in June 2013, provided unprecedented insights into the operations of state-corporate surveillance, highlighting the extent to which everyday communication is integrated into an extensive regime of control that relies on the ‘datafication’ of social life. Whilst such data-driven forms of governance have significant implications for citizenship and society, resistance to surveillance in the wake of the Snowden leaks has predominantly centred on techno-legal responses relating to the development and use of encryption and policy (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   17 citations  
  13.  65
    Trusting third-party storage providers for holding personal information. A context-based approach to protect identity-related data in untrusted domains.Giulio Galiero & Gabriele Giammatteo - 2009 - Identity in the Information Society 2 (2):99-114.
    The never ending growth of digital information and the availability of low-cost storage facilities and networks capacity is leading users towards moving their data to remote storage resources. Since users’ data often holds identity-related information, several privacy issues arise when data can be stored in untrusted domains. In addition digital identity management is becoming extremely complicated due to the identity replicas proliferation necessary to get authentication in different domains. GMail and Amazon Web Services, for instance, are two (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  14.  50
    Cryptography, data retention, and the panopticon society (abstract).Jean-François Blanchette & Deborah G. Johnson - 1998 - Acm Sigcas Computers and Society 28 (2):1-2.
    As we move our social institutions from paper and ink based operations to the electronic medium, we invisibly create a type of surveillance society, a panopticon society. It is not the traditional surveillance society in which government officials follow citizens around because they are concerned about threats to the political order. Instead it is piecemeal surveillance by public and private organizations. Piecemeal though it is, It creates the potential for the old kind of surveillance on an even grander scale. The (...)
    No categories
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  15.  54
    Knowledge and practice of confidential data handling in the Welsh Deanery: a brief report.L. E. Jackson & M. W. Lim - 2011 - Journal of Medical Ethics 37 (1):58-60.
    Recent large-scale personal data loss incidents highlighted the need for public bodies to more securely handle confidential data. We surveyed trainees from all specialties in the Welsh Deanery for their knowledge and practice. All registered trainees were invited to participate in an online anonymised survey. There were 880 completed and non-duplicated responses (52.9% response rate). Responses were analysed using Microsoft Access. Over 40% (388/880 (44.1%)) did not use formal guidelines on storage or disposal of confidential data. The (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  16.  37
    Pitfalls in computer housekeeping by doctors and nurses in KwaZulu-Natal: No malicious intent.Caron Jack, Yashik Singh & Maurice Mars - 2013 - BMC Medical Ethics 14 (S1):S8.
    IntroductionInformation and communication technologies are becoming an integral part of medical practice, research and administration and their use will grow as telemedicine and electronic medical record use become part of routine practice. Security in maintaining patient data is important and there is a statuary obligation to do so, but few health professionals have been trained on how to achieve this. There is no information on the use of computers and email by doctors and nurses in South Africa in the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  17.  30
    (2 other versions)A concise introduction to pure mathematics.M. W. Liebeck - 2006 - Boca Raton: Chapman & Hall/CRC.
    Written in a relaxed, readable style, A Concise Introduction to Pure Mathematics leads students gently but firmly into the world of higher mathematics. It provides beginning undergraduates with a rigourous grounding in the basic tools and techniques of the discipline and prepares them for further more advanced studies in analysis, differential equations, and algebra. This edition contains additional material on secret codes, permutations, and prime numbers. It features more than 200 exercises, with many completely new. The text is organized into (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  18.  13
    Research on the Key Issues of Big Data Quality Management, Evaluation, and Testing for Automotive Application Scenarios.Yingzi Wang, Ce Yu, Jue Hou, Yongjia Zhang, Xiangyi Fang & Shuyue Wu - 2021 - Complexity 2021:1-10.
    This paper provides an in-depth analysis and discussion of the key issues of quality management, evaluation, and detection contained in big data for automotive application scenarios. A generalized big data quality management model and programming framework are proposed, and a series of data quality detection and repair interfaces are built to express the processing semantics of various data quality issues. Through this data quality management model and detection and repair interfaces, users can quickly build custom (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  3
    Applied Algebra: Codes, Ciphers and Discrete Algorithms, Second Edition.Darel W. Hardy, Fred Richman & Carol L. Walker - 2009 - Crc Press.
    Using mathematical tools from number theory and finite fields, Applied Algebra: Codes, Ciphers, and Discrete Algorithms, Second Edition presents practical methods for solving problems in data security and data integrity. It is designed for an applied algebra course for students who have had prior classes in abstract or linear algebra. While the content has been reworked and improved, this edition continues to cover many algorithms that arise in cryptography and error-control codes. New to the Second Edition A CD-ROM (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  20.  20
    Security in advanced metering infrastructures: Lightweight cryptography.Luis Hernández-Álvarez, Juan José Bullón Pérez & Araceli Queiruga-Dios - forthcoming - Logic Journal of the IGPL.
    Smart grids are designed to revolutionize the energy sector by creating a smarter, more efficient and reliable power supply network. The rise of smart grids is a response to the need for a more comprehensive and sophisticated energy system that caters to the needs of homes and businesses. Key features of smart grids include the integration of renewable energy sources, decentralized generation and advanced distribution networks. At the heart of smart grids is a sophisticated metering system, consisting of intelligent electronic (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21.  62
    Averting Eavesdrop Intrusion in Industrial Wireless Sensor Networks.Arul Selvan M. - 2016 - International Journal of Innovative Research in Computer Science and Engineering (Ijircse) 2 (1):8-13.
    —Industrial networks are increasingly based on open protocols and platforms that are also employed in the IT industry and Internet background. Most of the industries use wireless networks for communicating information and data, due to high cable cost. Since, the wireless networks are insecure, it is essential to secure the critical information and data during transmission. The data that transmitted is intercepted by eavesdropper can be predicted by secrecy capacity. The secrecy capacity is the difference between channel (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   62 citations  
  22.  14
    Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications.Mohammad Kamrul Hasan, Muhammad Shafiq, Shayla Islam, Bishwajeet Pandey, Yousef A. Baker El-Ebiary, Nazmus Shaker Nafi, R. Ciro Rodriguez & Doris Esenarro Vargas - 2021 - Complexity 2021:1-13.
    As the world keeps advancing, the need for automated interconnected devices has started to gain significance; to cater to the condition, a new concept Internet of Things has been introduced that revolves around smart devicesʼ conception. These smart devices using IoT can communicate with each other through a network to attain particular objectives, i.e., automation and intelligent decision making. IoT has enabled the users to divide their household burden with machines as these complex machines look after the environment variables and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23. Does CTCF mediate between nuclear organization and gene expression?Rolf Ohlsson, Victor Lobanenkov & Elena Klenova - 2010 - Bioessays 32 (1):37-50.
    The multifunctional zinc‐finger protein CCCTC‐binding factor (CTCF) is a very strong candidate for the role of coordinating the expression level of coding sequences with their three‐dimensional position in the nucleus, apparently responding to a “code” in the DNA itself. Dynamic interactions between chromatin fibers in the context of nuclear architecture have been implicated in various aspects of genome functions. However, the molecular basis of these interactions still remains elusive and is a subject of intense debate. Here we discuss the nature (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  24.  29
    Digital Face Forgery and the Role of Digital Forensics.Manotar Tampubolon - 2024 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 37 (3):753-767.
    Advancements in digital technology have made it easy to alter faces using editing software, posing challenges for industries in verifying photograph authenticity. Digital image forensics, a scientific method, is employed to gather data and determine the veracity of faces. This study assesses the effectiveness of digital image forensics in detecting fake digital faces using tools such as Foto Forensics, Forensically Beta, and Opanda IExif. Foto Forensics analyzes JPEG picture compression levels to detect image edits, revealing metadata differences compared to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25.  40
    Researching the Mexico-US border: a tale of dataveillance.Mitxy Mabel Meneses Gutierrez - 2023 - Journal of Global Ethics 19 (3):347-358.
    The Mexico-U.S. border is a space considered `smart´ due to the amount of surveillance technology used for national security purposes. The technological ecology consists of integrated fixed towers, remote video surveillance systems, mobile video surveillance systems, Predator B surveillance drones, mobile X-ray units, automated license plate readers, cell phone tracking towers, implanted motion sensors, biometric data collection, and DNA sampling (Aizeki et al. Citation2021). Whilst these instruments are usually linked to irregular border crossers, transborder commuters, who physically cross the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  31
    DWT-SVD Based Watermarking for High-Resolution Medical Holographic Images.Fahrettin Horasan, Muhammed Ali Pala, Ali Durdu, Akif Akgül, Ömer Faruk Akmeşe & Mustafa Zahid Yıldız - 2022 - Complexity 2022:1-21.
    Watermarking is one of the most common techniques used to protect data’s authenticity, integrity, and security. The obfuscation in the frequency domain used in the watermarking method makes the watermarking stronger than the obfuscation in the spatial domain. It occupies an important place in watermarking works in imperceptibility, capacity, and robustness. Finding the optimal location to hide the watermarking is one of the most challenging tasks in these methods and affects the method’s performance. In this article, sample identification information (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27.  6
    The Quantum Panopticon: A Theory of Surveillance for the Quantum Era.Erik Olsson & Carl Öhman - 2025 - Minds and Machines 35 (2):1-22.
    The advent of quantum computing will compromise current asymmetric cryptography. Awaiting this moment, global superpowers are routinely collecting and storing encrypted data, so as to later decrypt it once sufficiently strong quantum computers are in place. We argue that this situation gives rise to a new mode of global surveillance that we refer to as a _quantum panopticon._ Unlike traditional forms of panoptic surveillance, the quantum panopticon introduces a _temporal axis_, whereby data subjects’ future pasts can be monitored (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  35
    Hybrid Real-Time Protection System for Online Social Networks.Muneer Bani Yassein, Shadi Aljawarneh & Yarub Wahsheh - 2020 - Foundations of Science 25 (4):1095-1124.
    The impact of Online Social Networks on human lives is foreseen to be very large with unprecedented amount of data and users. OSN users share their ideas, photos, daily life events, feelings and news. Since OSNs’ security and privacy challenges are more potential than ever before, it is necessary to enhance the protection and filtering approaches of OSNs contents. This paper explores OSNs’ threats and challenges, and categorize them into: account-based, URL-based and content-based threats. In addition, we analyze the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29.  45
    Privacy for the weak, transparency for the powerful: the cypherpunk ethics of Julian Assange.Patrick D. Anderson - 2020 - Ethics and Information Technology 23 (3):295-308.
    WikiLeaks is among the most controversial institutions of the last decade, and this essay contributes to an understanding of WikiLeaks by revealing the philosophical paradigm at the foundation of Julian Assange’s worldview: cypherpunk ethics. The cypherpunk movement emerged in the early-1990s, advocating the widespread use of strong cryptography as the best means for defending individual privacy and resisting authoritarian governments in the digital age. For the cypherpunks, censorship and surveillance were the twin evils of the computer age, but they viewed (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  30.  16
    Professional values and ethical ideology: Perceptions of nursing students.Ebin J. Arries - 2020 - Nursing Ethics 27 (3):726-740.
    Background: Moral philosophical positions and professional values have been shown to influence nurses’ practice behaviours. Understanding nursing students’ professional values and ethical ideologies, therefore, is important as they may help inform evidence-informed curriculum decisions and education strategies to develop students’ professional reflective competencies. However, there is a dearth in current empirical data on Canadian nursing students’ perceptions of professional values and ethical positions. Objectives: This study’s purpose was to examine undergraduate nursing student’s perceptions of professional values and ethical ideology (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  31.  45
    Lockbox: mobility, privacy and values in cloud storage. [REVIEW]Luke Stark & Matt Tierney - 2014 - Ethics and Information Technology 16 (1):1-13.
    This paper examines one particular problem of values in cloud computing: how individuals can take advantage of the cloud to store data without compromising their privacy and autonomy. Through the creation of Lockbox, an encrypted cloud storage application, we explore how designers can use reflection in designing for human values to maintain both privacy and usability in the cloud.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  32. Going dark: anonymising technology in cyberspace.Ross W. Bellaby - 2018 - Ethics and Information Technology 20 (3):189-204.
    Anonymising technologies are cyber-tools that protect people from online surveillance, hiding who they are, what information they have stored and what websites they are looking at. Whether it is anonymising online activity through ‘TOR’ and its onion routing, 256-bit encryption on communications sent or smart phone auto-deletes, the user’s identity and activity is protected from the watchful eyes of the intelligence community. This represents a clear challenge to intelligence actors as it prevents them access to information that many would (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  33.  32
    A Novel Image Encryption Scheme Based on PWLCM and Standard Map.Yucheng Chen, Chunming Tang & Zongxiang Yi - 2020 - Complexity 2020:1-23.
    In the past decades, considerable attention has been paid to the chaos-based image encryption schemes owing to their characteristics such as extreme sensitivity to initial conditions and parameters, pseudo-randomness, and unpredictability. However, some schemes have been proven to be insecure due to using a single chaotic system. To increase the security, this work proposes a novel image encryption scheme based on the piecewise linear chaotic map and the standard map. To the best of our knowledge, it is the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  34.  24
    A Color Image Encryption Technique Based on Bit-Level Permutation and Alternate Logistic Maps.Priyanka Jaroli, Shelza Dua, Mohit Dua & Ankita Bisht - 2019 - Journal of Intelligent Systems 29 (1):1246-1260.
    The paper presents an approach to encrypt the color images using bit-level permutation and alternate logistic map. The proposed method initially segregates the color image into red, green, and blue channels, transposes the segregated channels from the pixel-plane to bit-plane, and scrambles the bit-plane matrix using Arnold cat map (ACM). Finally, the red, blue, and green channels of the scrambled image are confused and diffused by applying alternate logistic map that uses a four-dimensional Lorenz system to generate a pseudorandom number (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  35. Encrypted vanguards and bleeding-edge technologies : signals intelligence, radio drama, and the false transmissions of the special operations executive.James Harding - 2015 - In Kimberly Jannarone, Vanguard performance beyond left and right. Ann Arbor: Univ Of Michigan Press.
     
    Export citation  
     
    Bookmark  
  36.  26
    Encryption of graphic information by means of transformation matrixes for protection against decofing by neural algorithms.Yunak O. M., Stryxaluk B. M. & Yunak O. P. - 2020 - Artificial Intelligence Scientific Journal 25 (2):15-20.
    The article deals with the algorithm of encrypting graphic information using transformation matrixes. It presents the actions that can be done with the image. The article also gives algorithms for forming matrixes that are created with the use of random processes. Examples of matrixes and encryption results are shown. Calculations of the analysis of combinations and conclusions to them are carried out. The article shows the possibilities and advantages of this image encryption algorithm. The proposed algorithm will allow (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37. Computer Ethics: Encryption: No Dogs or Philosophers Allowed.Ken Knisely, Dorothy Denning & Patrick Sullivan - forthcoming - DVD.
    Should all digital communication be accessible to government inspection? Is robust cryptography in the hands of the public a threat to our national security? With Dorothy Denning and Patrick Sullivan.
     
    Export citation  
     
    Bookmark  
  38.  27
    A Simple Image Encryption Based on Binary Image Affine Transformation and Zigzag Process.Adélaïde Nicole Kengnou Telem, Cyrille Feudjio, Balamurali Ramakrishnan, Hilaire Bertrand Fotsin & Karthikeyan Rajagopal - 2022 - Complexity 2022:1-22.
    In this paper, we propose a new and simple method for image encryption. It uses an external secret key of 128 bits long and an internal secret key. The novelties of the proposed encryption process are the methods used to extract an internal key to apply the zigzag process, affine transformation, and substitution-diffusion process. Initially, an original gray-scale image is converted into binary images. An internal secret key is extracted from binary images. The two keys are combined to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  15
    A Color Image Encryption Scheme Based on a Novel 3D Chaotic Mapping.Chunyuan Liu & Qun Ding - 2020 - Complexity 2020:1-20.
    Low-dimensional chaotic mappings are simple functions that have low computation cost and are easy to realize, but applying them in a cryptographic algorithm will lead to security vulnerabilities. To overcome this shortcoming, this paper proposes the coupled chaotic system, which coupled the piecewise and Henon mapping. Simulation results indicate that the novel mapping has better complexity and initial sensitivity and larger key space compared with the original mapping. Then, a new color image encryption algorithm is proposed based on the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  21
    Fast and Robust Image Encryption Scheme Based on Quantum Logistic Map and Hyperchaotic System.Nehal Abd El-Salam Mohamed, Aliaa Youssif & Hala Abdel-Galil El-Sayed - 2022 - Complexity 2022 (1):3676265.
    Topic of quantum chaos has begun to draw increasing attention in recent years. So, to ensure the security of digital image, an image encryption algorithm based on combining a hyperchaotic system and quantum 3D logistic map is proposed. This algorithm is applied in four stages. Initially, the key generator builds upon the foundation of mean for any row or column of the edges of the plain image. Its output value is used to yield initial conditions and parameters of the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41. Computer Ethics: Encryption: Dvd.Ken Knisely & Patrick Sullivan - 2001 - Milk Bottle Productions.
    Should all digital communication be accessible to government inspection? Is robust cryptography in the hands of the public a threat to our national security? With Dorothy Denning and Patrick Sullivan.
     
    Export citation  
     
    Bookmark  
  42.  33
    Pseudorandom Number Generator Based on Three Kinds of Four-Wing Memristive Hyperchaotic System and Its Application in Image Encryption.Xi Chen, Shuai Qian, Fei Yu, Zinan Zhang, Hui Shen, Yuanyuan Huang, Shuo Cai, Zelin Deng, Yi Li & Sichun Du - 2020 - Complexity 2020:1-17.
    In this paper, we propose a method to design the pseudorandom number generator using three kinds of four-wing memristive hyperchaotic systems with different dimensions as multientropy sources. The principle of this method is to obtain pseudorandom numbers with good randomness by coupling XOR operation on the three kinds of FWMHSs with different dimensions. In order to prove its potential application in secure communication, the security of PRNG based on this scheme is analyzed from the perspective of cryptography. In addition, PRNG (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  43.  27
    Performance of the 2D Coupled Map Lattice Model and Its Application in Image Encryption.Zhuo Liu, Jin Yuan Liu, Leo Yu Zhang, Yong Zhao & Xiao Feng Gong - 2022 - Complexity 2022:1-18.
    The two-dimensional coupled map lattice model has been extensively employed as the basis component for designing various schemes in the cryptography system due to its complicated chaotic dynamic behavior. In this study, we analyze the chaotic characteristics of the 2D CML model, such as the Lyapunov exponent, synchronization stability, bifurcation, and ergodicity. We then show that the chaotic sequences generated by the 2D CML model are random according to the NIST testing. Furthermore, we propose an image encryption scheme based (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  24
    An Effective Chaos-Based Image Encryption Scheme Using Imitating Jigsaw Method.Zhen Li, Changgen Peng, Weijie Tan & Liangrong Li - 2021 - Complexity 2021:1-18.
    In this paper, an efficient chaos-based image encryption scheme is proposed, which uses the imitating jigsaw method containing revolving and shifting operations. In this scheme, there are three processes in encryption: preprocessing, encryption process, and postprocessing. In the preprocessing, the original image is partitioned into 64 × 64 pixel image blocks and then randomly revolved and shifted under control sequences which are generated by the hyperchaotic Lorenz system whose initial conditions are calculated by original image and keys. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  45.  37
    Quantum Particle Swarm Optimization Extraction Algorithm Based on Quantum Chaos Encryption.Chao Li, Mengna Shi, Yanqi Zhou & Erfu Wang - 2021 - Complexity 2021:1-21.
    Considering the highly complex structure of quantum chaos and the nonstationary characteristics of speech signals, this paper proposes a quantum chaotic encryption and quantum particle swarm extraction method based on an underdetermined model. The proposed method first uses quantum chaos to encrypt the speech signal and then uses the local mean decomposition method to construct a virtual receiving array and convert the underdetermined model to a positive definite model. Finally, the signal is extracted using the Levi flight strategy based (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46.  35
    A protocol to encrypt digital images using chaotic maps and memory cellular automata.A. M. del Rey, G. R. Sanchez & A. de la Villa Cuenca - 2015 - Logic Journal of the IGPL 23 (3):485-494.
    Direct download  
     
    Export citation  
     
    Bookmark  
  47.  22
    Privacy and the encryption debate.Adam Moore - 2000 - Knowledge, Technology & Policy 12 (4):72-84.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  48.  23
    A New Fractional-Order Map with Infinite Number of Equilibria and Its Encryption Application.Ahlem Gasri, Amina-Aicha Khennaoui, Adel Ouannas, Giuseppe Grassi, Apostolos Iatropoulos, Lazaros Moysis & Christos Volos - 2022 - Complexity 2022:1-18.
    The study of the chaotic dynamics in fractional-order discrete-time systems has received great attention over the last years. Some efforts have been also devoted to analyze fractional maps with special features. This paper makes a contribution to the topic by introducing a new fractional map that is characterized by both particular dynamic behaviors and specific properties related to the system equilibria. In particular, the conceived one dimensional map is algebraically simpler than all the proposed fractional maps in the literature. Using (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49.  15
    A Three-Dimensional Autonomous System with a Parabolic Equilibrium: Dynamical Analysis, Adaptive Synchronization via Relay Coupling, and Applications to Steganography and Chaos Encryption.Janarthanan Ramadoss, Romanic Kengne, Dianorré Tokoue Ngatcha, Victor Kamdoum Tamba, Karthikeyan Rajagopal & Marceline Motchongom Tingue - 2022 - Complexity 2022:1-12.
    This paper is reporting on electronic implementation of a three-dimensional autonomous system with infinite equilibrium point belonging to a parabola. Performance analysis of an adaptive synchronization via relay coupling and a hybrid steganography chaos encryption application are provided. Besides striking parabolic equilibrium, the proposed three-dimensional autonomous system also exhibits hidden chaotic oscillations as well as hidden chaotic bursting oscillations. Electronic implementation of the hidden chaotic behaviors is done to confirm their physical existence. A good qualitative agreement is shown between (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  17
    A New Algorithm Based on Magic Square and a Novel Chaotic System for Image Encryption.Sadiq A. Mehdi & Rageed Hussein Al-Hashemy - 2019 - Journal of Intelligent Systems 29 (1):1202-1215.
    This article introduces a simple and effective new algorithm for image encryption using a chaotic system which is based on the magic squares. This novel 3D chaotic system is invoked to generate a random key to encrypt any color image. A number of chaotic keys equal to the size of the image are generated by this chaotic system and arranged into a matrix then divided into non-overlapped submatrices. The image to be encrypted is also divided into sub-images, and each (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 976