I mean an AES and Blowfish cryptography algorithm that can be used to encode and decode an image dataset
Hi
Its easy bcz the Image is file of Binary code, then Encrypt the file of Image by AES
Best regards
Check this: AES and Blowfish image cryptography algorithms? Attached
with regards
Patients information such as the personal information, medical history and the likes are the information required for the database or data-sets needed
12 January 2020 2,548 4 View
environmental performance
31 August 2018 7,485 4 View
I intend to write a research proposal as part of an application to a PhD in Management science and engineering.. I just wanted to gather more insights of contemporary topics in the area . Would...
14 April 2018 8,428 6 View
On the Anfis editor gui, there are two default optimization methods namely "hybrid" and "backprop". However, I want to use the conjugate gradient descent method to do my optimization but I do not...
24 April 2017 1,739 1 View
I have undergone chest x-rays for 8 times in only 9 months. I am told each time u go to an x-ray your life span is short by 3 years. So, I imagine I have lost 27 years of life ahead and...
16 October 2015 8,405 27 View
Please suggest basic literature on lattice-based cryptography. A kind response from the cryptographic community will be highly appreciated.
24 July 2024 6,291 4 View
Hi, I wanna to implement evolutionary algorithms in ryu sdn controller in mininet, i have some challenges, how i can run the big scale topo with one sdn contoller??? and another question is to...
21 July 2024 246 2 View
In quantum cryptographic protocols, participants typically share both a quantum channel and a classical authenticated channel. Authenticated channels ensure that messages come from legitimate...
22 June 2024 7,074 3 View
I am interested in designing, developing, and testing algorithms on my laptop or local machine. Do I require any specialized quantum hardware or an online quantum computing service? Is it possible...
10 June 2024 2,917 3 View
I'm trying to implement BB84 on a network, however I don't have a source code that is backed by any organization or a peer reviewed paper. Any help would be appreciated. Thanks!
09 June 2024 5,786 1 View
I am interested in understanding how surrogates are effectively integrated into evolutionary algorithms (EAs). Specifically, I would like guidance on how to handle the approximation function when...
08 May 2024 2,579 0 View
How do quantum algorithms, such as quantum support vector machines or quantum neural networks, differ from their classical counterparts?
25 March 2024 2,307 1 View
25 March 2024 4,842 1 View
Dear Researchers, Professor, I hope this e-mail finds you well ! Currently, I am in the process of editing a forthcoming Scopus index IGI Global Book publication entitled “Advancing Cyber Security...
19 March 2024 6,547 0 View
Which tuning method is optimal for adjusting PID controller parameters, such as Ziegler-Nichols (ZN), Genetic Algorithms (GA), Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO), and...
18 March 2024 5,283 1 View