Essays about: "encryption for image"

Showing result 1 - 5 of 11 essays containing the words encryption for image.

  1. 1. FFS: A cryptographic cloud-based deniable filesystem through exploitation of online web services : Store your sensitive data in plain sight

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Glenn Olsson; [2023]
    Keywords : Filesystem; Fejk FileSystem; Cloud-based filesystem; Steganograhpic filesystem; Filsystem; Fejk FileSystem; Molnbaserat filsystem; Steganografiskt filsystem;

    Abstract : Many Online Web Services (OWSs) today, such as Flickr and Twitter, provide users with the possibility to post images that are stored on the platform for free. This thesis explores creating a cryptographically secure filesystem that stores its data on an online web service by encoding the encrypted data as images. READ MORE

  2. 2. Tribonacci Cat Map : A discrete chaotic mapping with Tribonacci matrix

    University essay from Linnéuniversitetet/Institutionen för matematik (MA)

    Author : Linnea Fransson; [2021]
    Keywords : Arnold s cat map; Tribonacci matrix; chaotic map; discrete dynamical system; linear recurrence sequence; Trisano period; 3D image encryption; colour encryption;

    Abstract : Based on the generating matrix to the Tribonacci sequence, the Tribonacci cat map is a discrete chaotic dynamical system, similar to Arnold's discrete cat map, but on three dimensional space. In this thesis, this new mapping is introduced and the properties of its matrix are presented. READ MORE

  3. 3. Digital incursion: Breaching the android lock screen and liberating data

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Tim Oskarsson; [2021]
    Keywords : Android forensics; Mobile forensics; Memory forensics; Device access; PIN; Pattern; Biometrics; Android Debug Bridge; TWRP; Frida.;

    Abstract : Android is the most used operating system in the world, because of this the probability of an android device being acquired in an investigation is high. To begin to extract data from an android device you first need to gain access to it. Mechanisms like full system encryption can make this very difficult. READ MORE

  4. 4. Automatic Classification of text regarding Child Sexual Abusive Material

    University essay from Uppsala universitet/Avdelningen för systemteknik

    Author : Emil Fleron; [2018]
    Keywords : Deep Learning; Machine Learning; Artificial Neural Network; Djupinlärning; Maskininlärning; Artificiella neurala nätverk;

    Abstract : Sexual abuse is a horrible reality for many children around the world. As technology improves the availability of encryption schemes and anonymity over the internet, the perpetrators of these acts are increasingly hard to track. READ MORE

  5. 5. Modified and Efficient Image Encryption Algorithm Based on Chaos Theory, DNA Complementary Rules and SHA-256

    University essay from Mittuniversitetet/Avdelningen för informations- och kommunikationssystem

    Author : Rizwan Haider; [2017]
    Keywords : block encryption; image cryptography; DNA; chaos; SHA-256;

    Abstract : The emerging topic, symmetric encryption technique for digital imagesusing chaotic function and DNA bases has recently drawn a lot ofattentions from the research community. The use of voice and visualmaterial as an addition to textual data has become more widespread. READ MORE