2019
DOI: 10.1504/ijitst.2019.101823
|View full text |Cite
|
Sign up to set email alerts
|

A public key-based encryption and signature verification model for secured image transmission in network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…Several studies have proposed combining the Hill Cipher and RSA methods to increase the level of security in text encryption. This approach takes advantage of the advantages of each method to produce a stronger encryption scheme (Jayanthi and Singh, 2019;Agustini and Kurniawan, 2019). An illustration of the concept of asymmetric encryption can be seen in the following Fig.…”
Section: Introductionmentioning
confidence: 99%
“…Several studies have proposed combining the Hill Cipher and RSA methods to increase the level of security in text encryption. This approach takes advantage of the advantages of each method to produce a stronger encryption scheme (Jayanthi and Singh, 2019;Agustini and Kurniawan, 2019). An illustration of the concept of asymmetric encryption can be seen in the following Fig.…”
Section: Introductionmentioning
confidence: 99%