Essays about: "image cryptography"

Showing result 1 - 5 of 8 essays containing the words image cryptography.

  1. 1. Evaluating and Fine-Tuning a Few-Shot Model for Transcription of Historical Ciphers

    University essay from Uppsala universitet/Institutionen för lingvistik och filologi

    Author : Ingrid Eliasson; [2023]
    Keywords : historical ciphers; few-shot learning; automatic transcription;

    Abstract : Thousands of historical ciphers, encrypted manuscripts, are stored in archives across Europe. Historical cryptology is the research field concerned with studying these manuscripts - combining the interest of humanistic fields with methods of cryptography and computational linguistics. READ MORE

  2. 2. Multiparty adversarial neural cryptography with symmetric and asymmetric encryption

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Tianpeng Ju; [2021]
    Keywords : Cryptography; neural network; asymmetric encryption; multiparty systems; Kryptografi; neuronnätverk; asymmetrisk kryptering; flerpartssystem;

    Abstract : Deep learning has shown excellent performance in image recognition, speech recognition, natural language processing and other fields over the recent decades. Cryptography is a technical science that studies the preparation and decoding of ciphers. READ MORE

  3. 3. A study in how to inject steganographic data into videos in a sturdy and non-intrusive manner

    University essay from KTH/Hälsoinformatik och logistik

    Author : Julius Andersson; David Engström; [2019]
    Keywords : Steganography; Steganalysis; Watermarking; Information hiding; Cryptography; Compression; Non-intrusive; Sturdy; JPEG; Steganografi; Steganalys; Vattenmärkning; Kryptografi; Kompression; Icke störande; Stabil; JPEG;

    Abstract : It is desirable for companies to be able to hide data inside videos to be able to find the source of any unauthorised sharing of a video. The hidden data (the payload) should damage the original data (the cover) by an as small amount as possible while also making it hard to remove the payload without also severely damaging the cover. READ MORE

  4. 4. Bitcoins challenge To The Financial Institutions

    University essay from Umeå universitet/Företagsekonomi

    Author : Abdirahman Gulled; Jakaria Hossain; [2018]
    Keywords : ;

    Abstract : Bitcoin is a cryptocurrencyand worldwide decentralizedpayment system. The network is conducted through peer-to-peertransactionsand these transactions are verified by using cryptography technology. Blockchain technology keeps the records of public distributed ledger. READ MORE

  5. 5. Modified and Efficient Image Encryption Algorithm Based on Chaos Theory, DNA Complementary Rules and SHA-256

    University essay from Mittuniversitetet/Avdelningen för informations- och kommunikationssystem

    Author : Rizwan Haider; [2017]
    Keywords : block encryption; image cryptography; DNA; chaos; SHA-256;

    Abstract : The emerging topic, symmetric encryption technique for digital imagesusing chaotic function and DNA bases has recently drawn a lot ofattentions from the research community. The use of voice and visualmaterial as an addition to textual data has become more widespread. READ MORE