The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Encryption and decryption technique is normally applied for security enhancement namely by hiding data, messages or images. In this paper, encryption and decryption method based on Hill Cipher is implemented in a car park is discussed. The main focus of applying encryption and decryption on the system is to conceal the images of car plate stored in the database. In addition, prevention from attackers...
Symmetric key algorithms are a typically efficient and fast cryptosystem, so it has significant applications in many realms. For a wireless ad hoc network with constraint computational resources, the cryptosystem based on symmetric key algorithms is extremely suitable for such an agile and dynamic environment, along with other security strategies. In this paper, we introduce the concept of selective...
Nowadays many image cryptosystems have been shown to be insecure. In this paper we present a new cryptosystem based on the chaotic time delay feedback Chua circuit. It consists of two steps: the first step assures the transmitter/receiver synchronization while the second step focuses on the encryption/decryption procedure. The synchronization is performed through a nonlinear state observer design,...
Information security is an important issue. Today's encryption technologies can be traced back to the earliest ciphers, and have grown as a result of evolution. The first ciphers were cracked, so new, stronger ciphers emerged. Code breakers set to work on these and eventually found flaws, forcing cryptographers to invent better ciphers and so on. Hill Cipher is one of the most famous symmetric cryptosystem...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.