Enhancing security for document exchange using authentication and GAN encryption
Multimedia Tools and Applications, ISSN: 1573-7721, Vol: 83, Issue: 28, Page: 71203-71233
2024
- 1Citations
- 1Captures
- 1Mentions
Metric Options: Counts1 Year3 YearSelecting the 1-year or 3-year option will change the metrics count to percentiles, illustrating how an article or review compares to other articles or reviews within the selected time period in the same journal. Selecting the 1-year option compares the metrics against other articles/reviews that were also published in the same calendar year. Selecting the 3-year option compares the metrics against other articles/reviews that were also published in the same calendar year plus the two years prior.
Example: if you select the 1-year option for an article published in 2019 and a metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019. If you select the 3-year option for the same article published in 2019 and the metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019, 2018 and 2017.
Citation Benchmarking is provided by Scopus and SciVal and is different from the metrics context provided by PlumX Metrics.
Example: if you select the 1-year option for an article published in 2019 and a metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019. If you select the 3-year option for the same article published in 2019 and the metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019, 2018 and 2017.
Citation Benchmarking is provided by Scopus and SciVal and is different from the metrics context provided by PlumX Metrics.
Most Recent News
New Information and Data Encoding and Encryption Study Findings Have Been Reported by Investigators at University of Sfax (Enhancing Security for Document Exchange Using Authentication and Gan Encryption)
2024 MAR 04 (NewsRx) -- By a News Reporter-Staff News Editor at NewsRx Policy and Law Daily -- Research findings on Information Technology - Information
Article Description
The real threat to the privacy of a plain document exchanged over insecure channels is content manipulation or eavesdropping by unauthorized parties. To protect a transferred document, the architecture proposed in this paper offers encryption, authentication, and scrambling GAN with shuffle confusion (EAGAN) comprehensively with a relatively rapid execution time average of 2s for each colored document. The EAGAN encrypts and signs the document content at the origin point (sender side) and then decrypts and verifies the cipher document at the receiver side, achieving two verification levels and three levels of confidentiality, reinforced with two keys of chaos and equal document content. Each document has a unique hash value (signature or identity) with a QR code watermark to detect forgery, even when the change is small (even by one bit), without depending on any third party. If case the intermediate encrypted document, the neural network model (Decoder-Key), the cipher document, or the initial values of the Chaos Key are leaked, an unauthorized person won’t be able to retrieve the document. As proven by the experiments in this paper, EAGAN has characteristics that make it more resistant to security threats.
Bibliographic Details
Springer Science and Business Media LLC
Provide Feedback
Have ideas for a new metric? Would you like to see something else here?Let us know