http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Comparison of Hybrid Security Schemes : A Survey
Ritesh Bansal,Atefeh Hediayti,Jitisha Aggrawal,Bhanushree Sorlan,Shailender Gupta 보안공학연구지원센터 2016 International Journal of Signal Processing, Image Vol.9 No.8
In today’s age, communication through internet has become inseparable entity of many applications. These applications often require secrecy of data to be transmitted for security reasons. Therefore, commonly used security mechanisms such as cryptography and steganography can be employedto provide security, however using these techniques standalone often poses security threats. Therefore, a hybrid approach can be used for improving security features. In this paper comparison is drawn of recently published hybrid security mechanisms on the basis of following parameters: Visual assessment, Encrypted code Analysis, Similarity Analysis, Peak Signal Noise Ratio (PSNR), Information Entropy Analysis, Embedding Capacity Analysis, Key space analysis. The schemes are implemented and comparedusing MATLAB-2015.
Analysis of Various Cryptography Techniques : A Survey
Neha Tayal,Ritesh Bansal,Shailender Gupta,Sangeeta Dhall 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.8
Maintaining the confidentiality of data during communication has always been a prime concern of many researchers. Several encryption mechanisms have been developed in order to protect the secret data from the access of unauthorized users. Encryption can be thought of as a set of instruction used for conversion of data from a readable state to nonsense form. An encryption scheme is said to be effective if it provides high security, low computational time and high brute force search time for hackers. This paper is an effort to compare all the text based encryption schemes mentioned in literature. These schemes are implemented in MATLAB-2010 and their efficacy is compared based on various performance metrics such as time complexity, Correlation, Key sensitivity analysis, Differential attack analysis and Entropy. These results can be fruitful for researchers working in this direction.
Image Encryption Schemes : A Complete Survey
Yamini Jain,Ritesh Bansal,Gaurav Sharma,Bhuvnesh Kumar,Shailender Gupta 보안공학연구지원센터 2016 International Journal of Signal Processing, Image Vol.9 No.7
Advancement in digital technologies has resulted in increased data transfer over internet in recent years. As a result, security of images/data is one of the biggest concern of many researchers. Therefore several cryptographic schemes have been proposed for image/data encryption. An efficient cryptographic scheme is one that have high brute force search time, low execution time complexity and should be able to provide good security. In this paper, several ciphers (traditional as well as modern) for images are compared based on various parameters such as: Time complexity, Peak Signal to Noise Ratio (PSNR), Number of Pixels Change Rate (NPCR), Unified Average Changing Intensity (UACI) and Entropy. In addition, the paper also shows the shortcomings of traditional ciphers that were used for text and how modern ciphers overcome this limitations. The analysis of simulation result shows that chaotic encryption schemes are most efficient and better than others.