Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request
Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request
Academic Journal

Improved anti-noise attack ability of image encryption algorithm using de-noising technique

Subjects: DCT; DWT; Gaussian noise

  • Source: TELKOMNIKA (Telecommunication Computing Electronics and Control); Vol 18, No 6: December 2020; 3080-3087 ; 2302-9293 ; 1693-6930 ; 10.12928/telkomnika.v18i6

تفاصيل العنوان

×
Academic Journal

The quality of image encryption techniques by reasoned logic

Subjects: correlation; encryption; entropy

  • Source: TELKOMNIKA (Telecommunication Computing Electronics and Control); Vol 18, No 6: December 2020; 2992-2998 ; 2302-9293 ; 1693-6930 ; 10.12928/telkomnika.v18i6

تفاصيل العنوان

×
Academic Journal

Iris images encryption based on QR code and chaotic map

Subjects: binarization; histogram equalization; image encryption

  • Source: TELKOMNIKA (Telecommunication Computing Electronics and Control); Vol 18, No 1: February 2020; 289-300 ; 2302-9293 ; 1693-6930 ; 10.12928/telkomnika.v18i1

تفاصيل العنوان

×
Academic Journal

DWT-SMM-based audio steganography with RSA encryption and compressive sampling

Subjects: audio steganography; compressive sampling; encryption

  • Source: TELKOMNIKA (Telecommunication Computing Electronics and Control); Vol 18, No 2: April 2020; 1095-1104 ; 2302-9293 ; 1693-6930 ; 10.12928/telkomnika.v18i2

تفاصيل العنوان

×
Academic Journal

Optimization of video steganography with additional compression and encryption

Subjects: compression; distribution; encryption

  • Source: TELKOMNIKA (Telecommunication Computing Electronics and Control); Vol 17, No 3: June 2019; 1417-1424 ; 2302-9293 ; 1693-6930 ; 10.12928/telkomnika.v17i3

تفاصيل العنوان

×
Academic Journal

Secure E-voting System by Utilizing Homomorphic Properties of the Encryption Algorithm

Subjects: cryptography; encryption; homomorphic

  • Source: TELKOMNIKA (Telecommunication Computing Electronics and Control); Vol 16, No 2: April 2018; 862-867 ; 2302-9293 ; 1693-6930 ; 10.12928/telkomnika.v16i2

تفاصيل العنوان

×
Academic Journal

File Encryption and Hiding Application Based on AES and Append Insertion Steganography

Subjects: file hiding; append insertion steganography; symmetric key encryption

  • Source: TELKOMNIKA (Telecommunication Computing Electronics and Control); Vol 16, No 1: February 2018; 361-367 ; 2302-9293 ; 1693-6930 ; 10.12928/telkomnika.v16i1

تفاصيل العنوان

×
Academic Journal

High throughput FPGA Implementation of Advanced Encryption Standard Algorithm

Subjects: security; advanced encryption standard; high throughput

  • Source: TELKOMNIKA (Telecommunication Computing Electronics and Control); Vol 15, No 1: March 2017; 494-503 ; 2302-9293 ; 1693-6930 ; 10.12928/telkomnika.v15i1

تفاصيل العنوان

×
Academic Journal

Power analysis attack against encryption devices: a comprehensive analysis of AES, DES, and BC3

Subjects: AES; BC3; cryptography

  • Source: TELKOMNIKA (Telecommunication Computing Electronics and Control); Vol 17, No 3: June 2019; 1282-1289 ; 2302-9293 ; 1693-6930 ; 10.12928/telkomnika.v17i3

تفاصيل العنوان

×
Academic Journal

A Good Performance OTP Encryption Image based on DCT-DWT Steganography

Subjects: image steganography; image cryptography; one time pad

  • Source: TELKOMNIKA (Telecommunication Computing Electronics and Control); Vol 15, No 4: December 2017; 1982-1989 ; 2302-9293 ; 1693-6930 ; 10.12928/telkomnika.v15i4

تفاصيل العنوان

×
  • 1-10 ل  31 نتائج ل ""Encryption""