Securing the image through the combination of elliptic curve cryptosystem and hill cipher encryption
The advancement of communication technology helps users sharing the images through internet. However, the sharing through unsecure channels may expose the images to certain attack that will compromise their confidentiality. Image encryption is one of the methods that protect against this threat. Hi...
| Main Author: | Sulaiman, Saniah |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2019
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/83854/ http://psasir.upm.edu.my/id/eprint/83854/1/FSKTM%202019%2023%20-%20IR.pdf |
Similar Items
Design and performance evaluation of parallel elliptic curve cryptosystem with GF(P) projective coordinates
by: Hussein Fayiz, Mohammad Al-Khatib
Published: (2012)
by: Hussein Fayiz, Mohammad Al-Khatib
Published: (2012)
A new encryption algorithm over elliptic curve
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
A lightweight and secure algorithm of elliptic curve cryptography scalar multiplication using Q-NAF method in Lopez-Dahab coordinate
by: Abdulraheem, Waleed Khalid Amin
Published: (2019)
by: Abdulraheem, Waleed Khalid Amin
Published: (2019)
New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field
by: Md Yasin, Sharifah
Published: (2011)
by: Md Yasin, Sharifah
Published: (2011)
On the Improvement of Addition Chain in Applications to Elliptic Curve Cryptosystem
Status: Submitted
by: Mohamed, Mohamad Afendee
Published: (2011)
by: Mohamed, Mohamad Afendee
Published: (2011)
Encrypting text data using elliptic curve cryptography
by: Ali, Abas Abdullahi
Published: (2018)
by: Ali, Abas Abdullahi
Published: (2018)
Improving the security and encryption performance of cloud storage by using elliptic curve cryptography
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
Enhancement of {0, 1, 3}-NAF Recoding Algorithm using Block Method Technique for Elliptic Curve Cryptosystem
by: Bafandehkar, Mohsen
Published: (2015)
by: Bafandehkar, Mohsen
Published: (2015)
Improved algorithms of elliptic curve point multiplication over binary and prime fields using elliptic net
by: Muslim, Norliana
Published: (2022)
by: Muslim, Norliana
Published: (2022)
Anabelian geometry of punctured elliptic curves
by: Porowski, Wojciech
Published: (2020)
by: Porowski, Wojciech
Published: (2020)
An improved public key cryptography based on the elliptic curve
by: Al-Daoud, Essam Faleh
Published: (2002)
by: Al-Daoud, Essam Faleh
Published: (2002)
Kolyvagin Derivatives of Modular Points on Elliptic Curves
by: Hatton, Richard
Published: (2020)
by: Hatton, Richard
Published: (2020)
Committal deniable signatures over elliptic curves
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
Security Study and Encryption / Decryption Method
by: Al-Qdah, Majdi Taysir
Published: (2000)
by: Al-Qdah, Majdi Taysir
Published: (2000)
Saturation of Mordell-Weil Groups of Elliptic Curves over Number Fields
by: Prickett, Martin
Published: (2004)
by: Prickett, Martin
Published: (2004)
The vulnerability analysis and the security evaluation of block ciphers
by: Rezaeipour, Davood, et al.
Published: (2010)
by: Rezaeipour, Davood, et al.
Published: (2010)
Hyperspectral image processing system
by: Mahmouei, Sahar Sabbaghi
Published: (2012)
by: Mahmouei, Sahar Sabbaghi
Published: (2012)
Splicing image forgery identification based on artificial neural network approach and texture features
by: Mohd Omar, Nur Fareha Amira
Published: (2019)
by: Mohd Omar, Nur Fareha Amira
Published: (2019)
Data Hiding Techniques In Digital Images
by: Al Thloothi, Salah Ramadan
Published: (2003)
by: Al Thloothi, Salah Ramadan
Published: (2003)
Semantic-based image retrieval for multi-word text queries
by: Zand, Mohsen
Published: (2015)
by: Zand, Mohsen
Published: (2015)
Some statistical simulation results over the 128-bit block cipher CLEFIA
by: Rezaeipour, Davood, et al.
Published: (2009)
by: Rezaeipour, Davood, et al.
Published: (2009)
Visual tracking: detecting and mapping occlusion and camouflage using process-behaviour charts
by: Chandesa, Tissa
Published: (2013)
by: Chandesa, Tissa
Published: (2013)
Development of DNA-based dynamic key-dependent block cipher
by: Saeed, Auday H.
Published: (2015)
by: Saeed, Auday H.
Published: (2015)
Analysis of Secondary Flow Instability and Forced Convection in Fluid Flow through Rectangular and Elliptical Curved Ducts
by: Chandratilleke, Tilak, et al.
Published: (2013)
by: Chandratilleke, Tilak, et al.
Published: (2013)
Improved Algebraic Cryptanalysis of the Reduced-Round Advanced Encryption Standard
by: Rezaeipour, Davood
Published: (2011)
by: Rezaeipour, Davood
Published: (2011)
Improving The Randomness of Output Sequence for The Advanced Encryption Standard Cryptographic Algorithm
by: Abdulbari Ali, Sherif
Published: (2005)
by: Abdulbari Ali, Sherif
Published: (2005)
Image authentication using Zernike moment watermarking
by: Shojanazeri, Hamid
Published: (2013)
by: Shojanazeri, Hamid
Published: (2013)
Modelling of geometric correction and relative radiometric normalization for near equatorial earth observation satellite images
by: Al-Razzaq Abd, Hayder Abd
Published: (2015)
by: Al-Razzaq Abd, Hayder Abd
Published: (2015)
Encryption selection for WLAN IEEE802.11G
by: Ahmad, Zahrol Azam
Published: (2013)
by: Ahmad, Zahrol Azam
Published: (2013)
Performance analysis and improvement of rabin primitive based cryptosystems
by: Mahad, Zahari
Published: (2014)
by: Mahad, Zahari
Published: (2014)
Key Transformation Approach for Rijndael Security
by: Sulong, Mek Rahmah
Published: (2008)
by: Sulong, Mek Rahmah
Published: (2008)
Behavior Recognition In Video Surveillance System For Indoor Public Areas Using Artificial Immune System
by: Abad, Azad
Published: (2008)
by: Abad, Azad
Published: (2008)
Improvement on rooftop classification of worldview-3 imagery using object-based image analysis
by: Norman, Masayu
Published: (2019)
by: Norman, Masayu
Published: (2019)
Multimodal fingerprint and face biometrics with fragile watermarking and convolutional neural network
by: Najih, Abdulmawla
Published: (2020)
by: Najih, Abdulmawla
Published: (2020)
Dynamic determinant matrix-based block cipher algorithm
by: Juremi, Julia
Published: (2018)
by: Juremi, Julia
Published: (2018)
Performance optimization of cloud storage in access control of Ciphertext Policy Attribute-based Encryption
by: Mohd Satar, Siti Dhalila
Published: (2023)
by: Mohd Satar, Siti Dhalila
Published: (2023)
A block-based multi-scale background extraction algorithm
by: Davarpanah, Seyed Hashem, et al.
Published: (2010)
by: Davarpanah, Seyed Hashem, et al.
Published: (2010)
Image segmentation method for boundary detection of breast thermography using random walkers
by: Moghbel, Mehrdad
Published: (2013)
by: Moghbel, Mehrdad
Published: (2013)
Super resolution imaging using modified lanr based on separable filtering
by: Somadina, Ike Chidiebere
Published: (2019)
by: Somadina, Ike Chidiebere
Published: (2019)
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
by: Jamal, Fara
Published: (2021)
by: Jamal, Fara
Published: (2021)
Similar Items
-
Design and performance evaluation of parallel elliptic curve cryptosystem with GF(P) projective coordinates
by: Hussein Fayiz, Mohammad Al-Khatib
Published: (2012) -
A new encryption algorithm over elliptic curve
by: Han, Song, et al.
Published: (2005) -
A lightweight and secure algorithm of elliptic curve cryptography scalar multiplication using Q-NAF method in Lopez-Dahab coordinate
by: Abdulraheem, Waleed Khalid Amin
Published: (2019) -
New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field
by: Md Yasin, Sharifah
Published: (2011) -
On the Improvement of Addition Chain in Applications to Elliptic Curve Cryptosystem
Status: Submitted
by: Mohamed, Mohamad Afendee
Published: (2011)