Comprehensive on Exploring Advanced Ciphering for Enhanced Data Protection: Review

Authors

DOI:

https://doi.org/10.31185/wjps.265

Abstract

Stage cipher. data protection; encryption; Cyber security ; open encryption; hidden communications; saving information; Encryption algorithms. Hidden Markov models; convolutional neural networks; e-learning; hide pictures; acoustic masking; Video data masking; Hide texts; electronic watermarks; Cryptanalysis. Data and information theory; Measures of the quality of information hiding

References

Jingxuan,Jing, Yue Li, "Establishing an International Engagement Model of Digital Identity Based on Blockchain," Mobile Information Systems, vol. 2022, 2022.

Mohammed F.G., Athab S.D., Mohammed S.G.,'' Disc damage likelihood scale recognition for Glaucoma detection,'' Journal of Physics: Conference Series, 2114 (1) , art. no. 012005.2021

Christopher G. Bradley, "Privacy for Sale: The Law of Transactions in Consumers' Private Data," Yale Journal on Regulation, vol. 40, pp. 127 - 196, December 2023.

Mohammed S.G., Abdul-Jabbar S.S., Mohammed F.G.,'' Art Image Compression Based on Lossless LZW Hashing Ciphering Algorithm,'' Journal of Physics: Conference Series, 2114 (1) , art. no. 012080.2021

Haibin,Chen, Jinyin,Shangguan, Wenchang Zheng, "GONE: A generic O(1) NoisE layer for protecting privacy of deep neural networks," Computers and Security, vol. 135, December 2023.

George LE, Hassan EK, Mohammed SG and Mohammed FG, '' Selective image encryption based on DCT, hybrid shift coding and randomly generated secret key''. Iraqi J Sci 61(4):920–935.2020

Ahmed Kamil Hasan,Alkhasraji, Jafaar Mohammed Daif Al-Ali, "Colour image encryption based on hybrid bit-level scrambling, ciphering, and public key cryptography," Bulletin of Electrical Engineering and Informatics, vol. 12, pp. 1607 - 1619, 2023.

M. M. Hoobi, S. S. Sulaiman, I. A. AbdulMunem, "Enhanced Multistage RSA Encryption Model," 2nd International Scientific Conference of Al-Ayen University (ISCAU), IOP Conf. Series: Materials Science and Engineering, p. 455, 2020.

Mohammed A. Kareem and Suhad Malallah Kadhem, "Text Steganography Method Based On Modified Run Length Encoding," Iraqi Journal of Science, vol. 57, pp. 2338-2347, 2022.

Mohammed, F.G., Athab, S.D., ''Disc damage likelihood scale recognition for Glaucoma detection,''Journal of Physics: Conference Series, 2021, 2114(1), 012005

Hind S. Harba,ets Eman S. Harba, "Improving Security of the Crypto-Stego Approach using Time Sequence Dictionary and Spacing Modification Techniques," Iraqi Journal of Science, vol. 62, p. 5, 2021.

Ali Hamzah Obaid Sahar Najah Hussein, "Encryption Symmetric secret Key in Wireless Sensor Network Using AES Algorithm," Iraqi Journal of Science, vol. 63, 2022.

Ch.,Greeshmanth Rupa, "Novel secure data protection scheme using Martino homomorphic encryption," Journal of Cloud Computing, vol. 12, 2023.

Maytham A. Ali Nehad Hameed Hussein, "Medical Image Compression and Encryption Using Adaptive Arithmetic Coding, Quantization Technique and RSA in DWT Domain," Iraqi Journal of Science, vol. 63, 2022.

Xin,Xu, Yang,ets Liu, "The secure judgment of graphic similarity against malicious adversaries and its applications," Scientific Reports, vol. 13, 2023.

Haibo,Wen, Yanchuan and etc Tian, "Lattice based distributed threshold additive homomorphic encryption with application in federated learning," Computer Standards and Interfaces, vol. 87, 2023.

Jiaqi,Zhu, Hui and Wang, Fengwei Zhao, "Efficient and privacy-preserving tree-based inference via additive homomorphic encryption," Information Sciences, vol. 650, 2023.

Oscar,Guijarro-Berdiñas, Bertha,Hernández-Pereira, Elena Fontenla-Romero, "FedHEONN: Federated and homomorphically encrypted learning method for one-layer neural networks," Future Generation Computer Systems, vol. 149, 2023.

Alexander G. Chefranov, "Adaptive to pixel value and pixel value difference irreversible spatial data hiding method using modified LSB for grayscale images," Journal of Information Security and Applications, vol. 70, 2022.

Rohit,Saluja, Deepak and Kumar, Suman Singh, "Spread Spectrum Coded Radar for R2R Interference Mitigation in Autonomous Vehicles," IEEE Transactions on Intelligent Transportation Systems, vol. 23, 2022.

Samer,Alsaraira, Amer Alabed, "Implementing and developing secure low-cost long-range system using speech signal processing," Indonesian Journal of Electrical Engineering and Computer Science, vol. 31, 2023.

Elhadi,Abed, Djamel and Bouchemel, Ammar Mehallel, "Efficient Transmission of 2D Chaotic Maps Encrypted Images with DWT-Based SC-FDMA LTE System," Periodica polytechnica Electrical engineering and computer science, vol. 66, 2022.

Nagi H.,Al Soufy, Khaled A. M. Al-Ashwal, "Performance analysis of wireless compressed-image transmission over DST-based OFDMA systems," Eurasip Journal on Wireless Communications and Networking, vol. 2023, 2023.

Tony,Renner, Renato Metger, "Security of quantum key distribution from generalised entropy accumulation," Nature Communications, vol. 14, 2023.

Yuan,Zhao, Yongli ets Cao, "The Evolution of Quantum Key Distribution Networks: On the Road to the Qinternet," IEEE Communications Surveys and Tutorials, vol. 24, 2022.

Yichen,Chen, Ziyang,ets Zhang, "Long-Distance Continuous-Variable Quantum Key Distribution over 202.81 km of Fiber," Physical Review Letters, vol. 125, 2020.

Wencheng,Wang, Song and Cui, Hui Yang, "A Review of Homomorphic Encryption for Privacy-Preserving Biometrics," Sensors, vol. 23, 2023.

Shahid,Uddin, Jamal ets Rahman, "A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image," Scientific Reports, vol. 13, 2023.

Jie,He, Peisong ,ets Luo, "Reversible adversarial steganography for security enhancement," Journal of Visual Communication and Image Representation, vol. 97, 2023.

Mahesh, K. Michael,Pon Bharathi A. Veluchamy S., "DeepDrive: A braking decision making approach using optimized GAN and Deep CNN for advanced driver assistance systems," Engineering Applications of Artificial Intelligence, vol. 123, 2023.

Downloads

Published

2023-12-30

Issue

Section

Computer

How to Cite

g.mohammed, sajaa. (2023). Comprehensive on Exploring Advanced Ciphering for Enhanced Data Protection: Review. Wasit Journal for Pure Sciences , 2(4), 116-130. https://doi.org/10.31185/wjps.265

Most read articles by the same author(s)