ACCENTS
期刊
会议
图书
作者:Jitendra J. Bonde , Kailash Patidar , Manoj Kumar Yadav ...
来源:[J].ACCENTS Transactions on Information Security (TIS), 2018, Vol.3 (9)ACCENTS
摘要:In this paper AES and blowfish algorithm for video encryption based on random process of password generation have been applied for efficient encryption and decryption process. The data is processed in the form of video file but the file is not processed directly for the encryptio...
作者:Jitendra J. Bonde , Kailash Patidar , Manoj Kumar Yadav ...
来源:[J].ACCENTS Transactions on Information Security (TIS), 2018, Vol.3 (9)ACCENTS
摘要:Information security is essential in all field of information correspondence as it is vital so that any unapproved access of information can be anticipated. There are few approaches to secure the information in which cryptography and steganography is the fundamental. Information ...
作者:Rupa Rajoriya , Kailash Patidar , Sudeesh Chouhan
来源:[J].ACCENTS Transactions on Information Security (TIS), 2018, Vol.3 (9)ACCENTS
摘要:In this paper an efficient image cryptography method by using random key (RK)-RC6 algorithm has been proposed. The implementation environment has been developed and designs in Netbeans 7.2 environment and by using Java programming language. It consists of image encryption and dec...
作者:Rupa Rajoriya , Kailash Patidar , Sudeesh Chouhan
来源:[J].ACCENTS Transactions on Information Security (TIS), 2018, Vol.3 (9)ACCENTS
摘要:Image based communication is increasing day by day. There are several area where image based communication have been used widely like website, university database, hospital etc. So there is the need of proper security in case of image data so that unauthorized access can be preve...
作者:Ravi Shankar Yadav , Kailash Patidar , Rishi Kushwah ...
来源:[J].ACCENTS Transactions on Information Security (TIS), 2018, Vol.3 (9)ACCENTS
摘要:The need of data security is increasing day by day as the requirement of communication industry and other aspects of communication. This paper aim is to highlights and elaborates the methods used in image security. It also explores the way of applying the algorithms and the probl...
作者:Mahale Rahul Bhaskar , Kailash Patidar , Rishi Kushwah ...
来源:[J].ACCENTS Transactions on Information Security (TIS), 2019, Vol.4 (13)ACCENTS
摘要:In this paper an efficient approach for private cloud data security has been maintained by the advanced encryption standard (AES) with additional XOR and RC6 key variant mechanism. The benefit of AES is robust and provides the variability in higher key length sizes. So the combin...
作者:Swapnil Paliwal
来源:[J].ACCENTS Transactions on Information Security (TIS), 2017, Vol.2 (8)ACCENTS
摘要:An effective probabilistic polygraphic cryptosystem is developed, which is capable of performing compression as well as expansion encryption. There are two set of keys which are used, key1 is developed at the time of encryption whereas key2(is a matrix which can at most cont...
作者:Vidya M H , Ganesan P , Sathyanararyana S V ...
来源:[J].ACCENTS Transactions on Information Security (TIS), 2017, Vol.2 (8)ACCENTS
摘要:Security is a major aspect of communication in every day to day life. Neural cryptography is a non-classical cryptographic technique which aims to derive a common key through learning mechanism between two neural networks. It makes use of lightweight permutation parity machines (...
作者:Ganesan P , Priyanka B.R , Mahfooz Sheikh ...
来源:[J].ACCENTS Transactions on Information Security (TIS), 2017, Vol.2 (8)ACCENTS
摘要:Neural cryptography approaches probabilistic algorithm for exchange of keys with assured security. Artificial neural networks do not require complex number theory instead they work on basic arithmetic computation. Tree parity machine (TPM), one of the multi-layer neural network h...
作者:Anurag Sarkar
来源:[J].ACCENTS Transactions on Information Security (TIS), 2016, Vol.1 (1)ACCENTS
摘要:With an increasing reliance on online communications and transactions, the need for effective cryptographic algorithms to ensure security and reliability has never been more important, especially with the rise of big data. This paper provides a survey of different cryptograp...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×