Encryption of images file using a user controlled automatically-generated key

Traditional symmetrical cryptographic algorithms generally provide an adequate degree of immunity to attacks aimed at revealing secret keys. A number of approaches exist for the automated generation of secret keys, but, for high security applications, some end users remain wary of approaches that ar...

Full description

Saved in:
Bibliographic Details
Main Authors: Halima Abdul halime Shnishah, David Mulvaney
Format: Default Conference proceeding
Published: 2018
Subjects:
Online Access:https://hdl.handle.net/2134/37961
Tags: Add Tag
No Tags, Be the first to tag this record!