A Survey on Cryptography Based QR code authenticationRonak M. ParmarKrunal J. PanchalIJARIIE
Cryptography and Steganography - A Survey - Raphael, Sundaram () Citation Context ...ent for secure communication. Even though both methods provide security, a study is made to combine both Cryptography and Steganography methods into one system for better confidentiality and security =-=[5]-=-....
The technology is showing rapid development and these developments are changing our lives, our habits, and our needs. As electronic devices, which are indispensable for our daily lives, continue to...doi:10.1007/978-981-13-0408-8_18Boyaci, AliEkti, Ali RizaAydin, Muhammed AliYarkan, Serhan...
A molecular cryptography model based on structures of DNA self-assembly. Chinese Science Bulletin , 2014 , 59(11): 1192 -1198 CrossRef Google Scholar [58] ZAKERI B, CARR P A, and LU T K. Multiplexed sequence encoding: A framework for DNA communication. PLoS One , 2016 , 11(4...
With the continuous development of network technology, cryptographic protocols are facing diverse and complex security challenges. Blockchain technology, as a solution incorporating decentralization, traceability, programmability, and immutability, effec
The term "visual" in visual cryptography stands for the fact that during decryption phase, a user can perceive the recovered secret with his/her visual system, without the intervention of machines. Various visual cryptography techniques have been discussed extensively in this survey. The metrics ...
Benefiting from the development of the Internet and smart devices, it is now convenient to transmit images anywhere and anytime, which poses a new challenge for image security. The Visual Cryptography Scheme (VCS) is a secret sharing method for protectin
International Journal of Recent Research and Review, Vol.VII, Issue 1, March 2014 ISSN 2277 – 8322 A Survey on Digital Archive as a Limitation in Cloud Computing Vidhi Agarwal1, Ms. Pooja Sharma2 M.Tech Scholar (Software Engineering), Poornima College of Engineering, Jaipur, India Assistant...
Long term confidentiality: a survey Abstract Sensitive electronic data may be required to remain confidential for long periods of time. Yet encryption under a computationally secure cryptosystem cannot provide a guarantee of long term confidentiality, due to potential advances in computing power or ...
A comprehensive survey of biometric cryptosystems and cancelable biometrics is presented. State-of-the-art approaches are reviewed based on which an in-depth discussion and an outlook to future prospects are given.Similar content being viewed by others...