An Approach To Enhance Image Encryption Using Block-Based Trasformation Algorithm.
Penyulitan data (data encryption) telah digunakan secara meluas untuk menjamin keselamatan dalam rangkaian terbuka (open network), contohnya internet. Data encryption is widely used to ensure security in open networks such as the internet.
| Main Author: | Younes, Mohammad Ali Moh'd Bani |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2009
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/10135/ http://eprints.usm.my/10135/1/AN_APPROACH_TO_ENHANCE_IMAGE_ENCRYPTION_USING_BLOCKBASED.pdf |
Similar Items
Image Encrytion Using Block Based Transformation Algorithm
by: Bani Younes, Mohammad Ali, et al.
Published: (2008)
by: Bani Younes, Mohammad Ali, et al.
Published: (2008)
A New Image-Database Encryption Based on A Hybrid Approach of Data-at-Rest and Data-in-Motion Encryption Protocol.
by: Ooi, Bee Sien, et al.
Published: (2004)
by: Ooi, Bee Sien, et al.
Published: (2004)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
by: Omolara, Abiodun Esther
Published: (2020)
Harmony search-based fuzzy clustering algorithms for image segmentation.
by: Alia, Osama Moh’d Radi
Published: (2011)
by: Alia, Osama Moh’d Radi
Published: (2011)
An Enhanced Flower Pollination Algorithm For Multiple Sequence Alignment
by: Hussein, Ahmad Moh’d Aziz Issa
Published: (2020)
by: Hussein, Ahmad Moh’d Aziz Issa
Published: (2020)
The Construction Of Quantum Block Cipher For Grover Algorithm
by: Eid, Almazrooie Mishal
Published: (2018)
by: Eid, Almazrooie Mishal
Published: (2018)
Data Integrity For Cloud Computing With Homomorphic Encryption
by: Awadallah, Ruba N S
Published: (2022)
by: Awadallah, Ruba N S
Published: (2022)
k-Resilient Identity-Based Encryption in the Standard Model
by: HENG, S.-H.
Published: (2006)
by: HENG, S.-H.
Published: (2006)
Integrating Identity-Based Encryption (Ibe) In The Return Routability Protocol (Rrp) To Enhance Signals Security
In Mobile Ipv6.
by: S. Alsayfi, Majed Salam
Published: (2010)
by: S. Alsayfi, Majed Salam
Published: (2010)
Cryptanalysis of the n-party encrypted Diffie-Hellman key exchange using different passwords
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
Harmony Search-Based Cluster Initialization For Fuzzy C-Means Segmentation Of MR Images.
by: Moh’d Alia, Osama, et al.
Published: (2009)
by: Moh’d Alia, Osama, et al.
Published: (2009)
A Machine Learning Approach To Evaluate The Security Of Ultra-lightweight Block Ciphers
by: Lee, Ting Rong
Published: (2021)
by: Lee, Ting Rong
Published: (2021)
Feature Selection And Enhanced Krill Herd Algorithm For Text Document Clustering
by: Abualigah, Laith Mohammad Qasim
Published: (2018)
by: Abualigah, Laith Mohammad Qasim
Published: (2018)
Enhanced Cuckoo Search Algorithm With Metaheuristic Components For Extracting The Maxima Of The Orientation Distribution Function
by: Shehab, Mohammad Mohammad Said
Published: (2018)
by: Shehab, Mohammad Mohammad Said
Published: (2018)
Colour Transformation Algorithm On Website Images
For The Colour Blind Users
by: Ching, Siew Li
Published: (2010)
by: Ching, Siew Li
Published: (2010)
Efficient Block-based Matching for Content-based Retrieval of CT Head Images
by: Ahmad Fauzi, Mohammad Faizal, et al.
Published: (2008)
by: Ahmad Fauzi, Mohammad Faizal, et al.
Published: (2008)
Two Novel E-Visas Verification Schemes Based On
Public Key Infrastructure (Pki) And Identity Based
Encryption (Ibe).
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
Underwater Image Enhancement Using An Integrated Colour Model.
by: Iqbal, Kashif, et al.
Published: (2007)
by: Iqbal, Kashif, et al.
Published: (2007)
Enhanced Se-Resnet 101 For Food Image Segmentation
by: Abuowaida, Suhaila Farhan Ahmad
Published: (2022)
by: Abuowaida, Suhaila Farhan Ahmad
Published: (2022)
Predictive call admission control algorithm for power-controlled wireless systems
by: Chin, Choong Ming, et al.
Published: (2006)
by: Chin, Choong Ming, et al.
Published: (2006)
Biometric Template Protection Using Watermarking with Hidden Password Encryption
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
Single core hardware module to implement encryption in TECB mode
by: Reaz, M. B. I., et al.
Published: (2007)
by: Reaz, M. B. I., et al.
Published: (2007)
Enhanced Micro Genetic
Algorithm-Based Models For
Multi-Objective Optimization
by: Tan, Choo Jun
Published: (2014)
by: Tan, Choo Jun
Published: (2014)
Enhanced Honey Bees Colony Algorithms For Protein Tertiary Structure Prediction
by: Bahamish, Hesham Awadh Abdallah
Published: (2011)
by: Bahamish, Hesham Awadh Abdallah
Published: (2011)
Enhanced Bio-Inspired Algorithm With Pedestrian Simulation
For Spatial Layout Design
by: Ibrahim, Najihah
Published: (2023)
by: Ibrahim, Najihah
Published: (2023)
Enhancing Svd-Based Image
Watermarking Strategies Based On
Digital Chaos
by: Alshoura, Wafa’hamdan Suleiman
Published: (2022)
by: Alshoura, Wafa’hamdan Suleiman
Published: (2022)
Segmentation Of Ultisequence Medical Images Using Random Walks Algorithm And Rough Sets Theory
by: Lim, Khai Yin
Published: (2017)
by: Lim, Khai Yin
Published: (2017)
A Feature Selection Approach Based On Hybridizing Flower Pollination Algorithm With Particle Swarm Optimization For Enhancing The Performance Of Ipv6 Intrusion Detection System
by: Al Ghuraibawi, Adnan Hasan Bdair
Published: (2023)
by: Al Ghuraibawi, Adnan Hasan Bdair
Published: (2023)
Related-mode attacks on block cipher modes of operation
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Adapting and enhancing mussels wandering optimization algorithm for supervised training of neural networks
by: Abusnaina, Ahmed A. A.
Published: (2015)
by: Abusnaina, Ahmed A. A.
Published: (2015)
Enhanced and automated approaches for fish recognition and classification system
by: Samma, Ali Salem Ali
Published: (2011)
by: Samma, Ali Salem Ali
Published: (2011)
Medical Image Modality Classification using Feature Weighted Clustering Approach.
by: Chandra, Bhavik Anil
Published: (2010)
by: Chandra, Bhavik Anil
Published: (2010)
Biometric Template Protection using watermarking with hidden password encryption
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
Technology Review: Image Enhancement, Feature Extraction and Template Protection of a Fingerprint Authentication System
by: Islam, Md. Rajibul, et al.
Published: (2010)
by: Islam, Md. Rajibul, et al.
Published: (2010)
Efficient and fast multi layer statistical approach for colour based image retrieval
by: Odeh, , JQ, et al.
Published: (2003)
by: Odeh, , JQ, et al.
Published: (2003)
Automated Extraction Of Small Structures In Medical Images Based On Multi Scale Approach.
by: Foon, Dah Way, et al.
Published: (2004)
by: Foon, Dah Way, et al.
Published: (2004)
A Denoising Generative Adversarial Network Based On Enhanced Feature Mapping Of Data Augmentation For Image Synthesis
by: Chen, Li
Published: (2024)
by: Chen, Li
Published: (2024)
A Genetic Algorithm Based Approach for Solving
the Minimum Dominating Set of Queens Problem
by: Alharbi, Saad, et al.
Published: (2017)
by: Alharbi, Saad, et al.
Published: (2017)
A Genetic Algorithm Based Approach for Solving the Minimum Dominating Set of Queens Problem
by: Alharbi, Saad, et al.
Published: (2017)
by: Alharbi, Saad, et al.
Published: (2017)
Anchor Point Approach For Initial
Population Of Bat Algorithm For
Protein Multiple Sequence Alignment
by: Boraik Ali, Aziz Nasser
Published: (2016)
by: Boraik Ali, Aziz Nasser
Published: (2016)
Similar Items
-
Image Encrytion Using Block Based Transformation Algorithm
by: Bani Younes, Mohammad Ali, et al.
Published: (2008) -
A New Image-Database Encryption Based on A Hybrid Approach of Data-at-Rest and Data-in-Motion Encryption Protocol.
by: Ooi, Bee Sien, et al.
Published: (2004) -
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020) -
Harmony search-based fuzzy clustering algorithms for image segmentation.
by: Alia, Osama Moh’d Radi
Published: (2011) -
An Enhanced Flower Pollination Algorithm For Multiple Sequence Alignment
by: Hussein, Ahmad Moh’d Aziz Issa
Published: (2020)