-
2
-
-
51849099850
-
Application of Genetic Algorithm in the Field of Steganography
-
Kumar, A., Rajpal, N.: Application of Genetic Algorithm in the Field of Steganography. Journal of Information Technology 2(1), 12-15 (2004)
-
(2004)
Journal of Information Technology
, vol.2
, Issue.1
, pp. 12-15
-
-
Kumar, A.1
Rajpal, N.2
-
3
-
-
84865176107
-
New Signal Security System for Multimedia Data Transmission Using Genetic Algorithms
-
Kumar, A., Rajpal, N., Tayal, A.: New Signal Security System for Multimedia Data Transmission Using Genetic Algorithms. In: NCC 2005, IIT Kharagpur, January 28-20, pp. 579-583 (2005)
-
(2005)
NCC 2005, IIT Kharagpur, January 28-20
, pp. 579-583
-
-
Kumar, A.1
Rajpal, N.2
Tayal, A.3
-
4
-
-
34247250206
-
Genetic Algorithms Inspired Cryptography
-
A.M.S.E Association for the Advancement of Modeling & Simulation Techniques in Enterprises. November
-
Tragha, A., Omary, F., Kriouile, A.: Genetic Algorithms Inspired Cryptography. In: A.M.S.E Association for the Advancement of Modeling & Simulation Techniques in Enterprises. Series D: Computer Science and Statistics (November 2005)
-
(2005)
Series D: Computer Science and Statistics
-
-
Tragha, A.1
Omary, F.2
Kriouile, A.3
-
5
-
-
34247266636
-
ICIGA: Improved Cryptography Inspired by Genetic Algorithms
-
Tragha, A., Omary, F., Mouloudi, A.: ICIGA: Improved Cryptography Inspired by Genetic Algorithms. In: International Conference on Hybrid Information Technology, ICHIT 2006 (2006)
-
International Conference on Hybrid Information Technology, ICHIT 2006 (2006)
-
-
Tragha, A.1
Omary, F.2
Mouloudi, A.3
-
6
-
-
80052824798
-
Design and Evaluation of Two Symmetrical Evolutionist-Based Ciphering Algorithms
-
Omary, F., Tragha, A., Bellaachia, A., Mouloudi, A.: Design and Evaluation of Two Symmetrical Evolutionist-Based Ciphering Algorithms. IJCSNS International Journal of Computer Science and Network Security 7(2), 181-190 (2007)
-
(2007)
IJCSNS International Journal of Computer Science and Network Security
, vol.7
, Issue.2
, pp. 181-190
-
-
Omary, F.1
Tragha, A.2
Bellaachia, A.3
Mouloudi, A.4
-
8
-
-
0036453480
-
On the Security of An Image Encryption Method
-
September
-
Liand, S., Zheng, X.: On The Security of An Image Encryption Method. In: IEEE International Conference on Image Processing (ICIP 2002), Rochester, New York. Proceedings of ICIP 2002, vol. 2, pp. 925-928 (September 2002)
-
(2002)
IEEE International Conference on Image Processing (ICIP 2002), Rochester, New York. Proceedings of ICIP 2002
, vol.2
, pp. 925-928
-
-
Liand, S.1
Zheng, X.2
-
9
-
-
33749632318
-
Image Encryption using Genetic Algorithm
-
Husainy, M.: Image Encryption using Genetic Algorithm. Information Technology Journal 5(3), 516-519 (2006)
-
(2006)
Information Technology Journal
, vol.5
, Issue.3
, pp. 516-519
-
-
Husainy, M.1
-
10
-
-
84898878928
-
Bit Level Encryption of Images using Genetic Algorithm
-
July ISSN 0974-3375
-
Srikanth, V., Asati, U., Natarajan, V., Pavan Kumar, T., Mullapudi, T., Iyengar, N.C.S.N.: Bit Level Encryption of Images using Genetic Algorithm. TECHNIA-International Journal of Computing Science and Communication Technologies 3(1) (July 2010) ISSN 0974-3375
-
(2010)
TECHNIA-International Journal of Computing Science and Communication Technologies
, vol.3
, Issue.1
-
-
Srikanth, V.1
Asati, U.2
Natarajan, V.3
Pavan Kumar, T.4
Mullapudi, T.5
Iyengar, N.C.S.N.6
-
12
-
-
79952555153
-
Efficiency and Security of Some Image Encryption Algorithms
-
El-Wahed, M.A., Mesbah, S., Shoukry, A.: Efficiency and Security of Some Image Encryption Algorithms. In: Proceedings of the World Congress on Engineering, WCE 2008, London, U.K, July 2-4, vol. I (2008)
-
(2008)
Proceedings of the World Congress on Engineering, WCE 2008, London, U.K, July 2-4
, vol.1
-
-
El-Wahed, M.A.1
Mesbah, S.2
Shoukry, A.3
|