Essays about: "encryption for image"
Showing result 1 - 5 of 11 essays containing the words encryption for image.
-
1. FFS: A cryptographic cloud-based deniable filesystem through exploitation of online web services : Store your sensitive data in plain sight
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Many Online Web Services (OWSs) today, such as Flickr and Twitter, provide users with the possibility to post images that are stored on the platform for free. This thesis explores creating a cryptographically secure filesystem that stores its data on an online web service by encoding the encrypted data as images. READ MORE
-
2. Tribonacci Cat Map : A discrete chaotic mapping with Tribonacci matrix
University essay from Linnéuniversitetet/Institutionen för matematik (MA)Abstract : Based on the generating matrix to the Tribonacci sequence, the Tribonacci cat map is a discrete chaotic dynamical system, similar to Arnold's discrete cat map, but on three dimensional space. In this thesis, this new mapping is introduced and the properties of its matrix are presented. READ MORE
-
3. Digital incursion: Breaching the android lock screen and liberating data
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Android is the most used operating system in the world, because of this the probability of an android device being acquired in an investigation is high. To begin to extract data from an android device you first need to gain access to it. Mechanisms like full system encryption can make this very difficult. READ MORE
-
4. Automatic Classification of text regarding Child Sexual Abusive Material
University essay from Uppsala universitet/Avdelningen för systemteknikAbstract : Sexual abuse is a horrible reality for many children around the world. As technology improves the availability of encryption schemes and anonymity over the internet, the perpetrators of these acts are increasingly hard to track. READ MORE
-
5. Modified and Efficient Image Encryption Algorithm Based on Chaos Theory, DNA Complementary Rules and SHA-256
University essay from Mittuniversitetet/Avdelningen för informations- och kommunikationssystemAbstract : The emerging topic, symmetric encryption technique for digital imagesusing chaotic function and DNA bases has recently drawn a lot ofattentions from the research community. The use of voice and visualmaterial as an addition to textual data has become more widespread. READ MORE