GÖRÜNTÜ DOSYALARININ ŞİFRELENEREK GÜVENLİ ŞEKİLDE SAKLANMASI
Öz
Anahtar Kelimeler
şifreleme , görüntü şifreleme , güvenlik , depolama , bulut depolama
Kaynakça
- Adams, C., Heys, H., Tavares, S., & Wiener, M. (1999). An analysis of the CAST-256 cipher. Paper presented at the Engineering Solutions for the Next Millennium. 1999 IEEE Canadian Conference on Electrical and Computer Engineering (Cat. No. 99TH8411).
- Anandakumar, S. (2015). Image Cryptography Using RSA Algorithm in Network Security. International Journal of Computer Science & Engineering Technology, 5(9), 326-330.
- Askar, S. S., Karawia, A., & Alshamrani, A. M. (2015). Image Encryption Algorithm Based on Chaotic Economic Model. Mathematical Problems in Engineering, 2015, 1-10.
- Babenko, L., Ishchukova, E., & Maro, E. (2013). GOST encryption algorithm and approaches to its analysis. In Theory and Practice of Cryptography Solutions for Secure Information Systems (pp. 34-61): IGI Global.
- Brown, L., & Pieprzyk, J. (1998). Introducing the new LOKI97 block cipher. Paper presented at the First AES Candidate Conference.
- Calzavara , S. ( 2020 ) . Security I I - CSRF & XSSI.
- Chang, C.-C., Hwang, M.-S., & Chen, T.-S. (2001). A new encryption algorithm for image cryptosystems. Journal of Systems and Software, 58(2), 83-91. doi:https://doi.org/10.1016/S0164-1212(01)00029-2
- Chepuri, S. (2017). An RGB image encryption using RSA algorithm. International Journal of Current Trends in Engineering & Research (IJCTER), 3(3), 1-7.
- Çiflikli, C., & Aba, K. TEA ve XTEA Şifreleme Algoritmaları İçin Kaos Tabanlı Kaydırma Dizisi Oluşturulması ve Uygulanması.
- Dong, X., Li, L., Jia, K., & Wang, X. (2015). Improved attacks on reduced-round Camellia-128/192/256. Paper presented at the Cryptographers’ Track at the RSA Conference.