Encryption algorithms are effective in maintaining security
نویسندگان
چکیده
منابع مشابه
Proposing an effective approach for Network security and multimedia documents classically using encryption and watermarking
Local binary pattern (LBP) operators, which measure the local contrast within a pixel's neighborhood, successfully applied to texture analysis, visual inspection, and image retrieval. In this paper, we recommend a semi blind and informed watermarking approach. The watermark has been built from the original image using Weber Law. The approach aims is to present a high robustness and imperceptibi...
متن کاملEnhancing Security in Palm Print Recognition Systems Using Encryption Algorithms
Nowadays, the use of biometric characteristics (e.g., palmprints, irises, fingerprints) is incrementing for individual recognition and many applications of biometrics are already available. Biometrics recognition has many advantages over the traditionally used methods (e.g., password, smart card), because biometric characteristics cannot be shared or forgotten, as it is inherently associated wi...
متن کاملHistogram based comparison on Symmetric Encryption Algorithms of Information Security
Information sharing and transfer of secured data is a challenging issue in Internet and Network applications, so there is a need to protect such applications. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. There are so many Symmetric Encry...
متن کاملEncryption Security in SCADA Networks
Supervisory control and data acquisition (SCADA) are applications that collect data from a system in order to automate the monitoring and controlling of its activities. Several industrial fields such as, electric utilities, water supplies and buildings’ facilities have already adopted SCADA systems to increase the efficiency and reduce cost. However, the IT community is concerned about the leve...
متن کاملAlgorithms for Maintaining
We present algorithms for access rights control in multiuser, object-oriented databases. These algorithms follow the model of authorization introduced in 6]. We show how the three basic operations: AccessControl, Grant, and Revoke can be eeciently implemented using techniques for manipulating partially ordered sets. Several techniques for maintenance of authorization bases are presented and the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: BMJ
سال: 1996
ISSN: 0959-8138,1468-5833
DOI: 10.1136/bmj.312.7036.977c