RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 학술지명
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • Comparison of Hybrid Security Schemes : A Survey

        Ritesh Bansal,Atefeh Hediayti,Jitisha Aggrawal,Bhanushree Sorlan,Shailender Gupta 보안공학연구지원센터 2016 International Journal of Signal Processing, Image Vol.9 No.8

        In today’s age, communication through internet has become inseparable entity of many applications. These applications often require secrecy of data to be transmitted for security reasons. Therefore, commonly used security mechanisms such as cryptography and steganography can be employedto provide security, however using these techniques standalone often poses security threats. Therefore, a hybrid approach can be used for improving security features. In this paper comparison is drawn of recently published hybrid security mechanisms on the basis of following parameters: Visual assessment, Encrypted code Analysis, Similarity Analysis, Peak Signal Noise Ratio (PSNR), Information Entropy Analysis, Embedding Capacity Analysis, Key space analysis. The schemes are implemented and comparedusing MATLAB-2015.

      • Analysis of Various Cryptography Techniques : A Survey

        Neha Tayal,Ritesh Bansal,Shailender Gupta,Sangeeta Dhall 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.8

        Maintaining the confidentiality of data during communication has always been a prime concern of many researchers. Several encryption mechanisms have been developed in order to protect the secret data from the access of unauthorized users. Encryption can be thought of as a set of instruction used for conversion of data from a readable state to nonsense form. An encryption scheme is said to be effective if it provides high security, low computational time and high brute force search time for hackers. This paper is an effort to compare all the text based encryption schemes mentioned in literature. These schemes are implemented in MATLAB-2010 and their efficacy is compared based on various performance metrics such as time complexity, Correlation, Key sensitivity analysis, Differential attack analysis and Entropy. These results can be fruitful for researchers working in this direction.

      • Image Encryption Schemes : A Complete Survey

        Yamini Jain,Ritesh Bansal,Gaurav Sharma,Bhuvnesh Kumar,Shailender Gupta 보안공학연구지원센터 2016 International Journal of Signal Processing, Image Vol.9 No.7

        Advancement in digital technologies has resulted in increased data transfer over internet in recent years. As a result, security of images/data is one of the biggest concern of many researchers. Therefore several cryptographic schemes have been proposed for image/data encryption. An efficient cryptographic scheme is one that have high brute force search time, low execution time complexity and should be able to provide good security. In this paper, several ciphers (traditional as well as modern) for images are compared based on various parameters such as: Time complexity, Peak Signal to Noise Ratio (PSNR), Number of Pixels Change Rate (NPCR), Unified Average Changing Intensity (UACI) and Entropy. In addition, the paper also shows the shortcomings of traditional ciphers that were used for text and how modern ciphers overcome this limitations. The analysis of simulation result shows that chaotic encryption schemes are most efficient and better than others.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼