A Fast Discrete Cosine Transform and a Cryptographic Technique for Authentication and Security of Digital Images
Kester, Quist-Aphetsi, Nana, Laurent, Pascu, Anca Christine, Gire, Sophie, Eghan, Jojo M., Quaynor, Nii Narku
Published in Security in Computing and Communications (01.01.2015)
Published in Security in Computing and Communications (01.01.2015)
Get full text
Book Chapter
Feature Based Encryption Technique for Securing Digital Image Data Based on FCA-Image Attributes and Visual Cryptography
Kester, Quist-Aphetsi, Pascu, Anca Christine, Nana, Laurent, Gire, Sophie, Eghan, Jojo M., Quaynor, Nii Narku
Published in Computational Science and Its Applications - ICCSA 2015 (19.06.2015)
Published in Computational Science and Its Applications - ICCSA 2015 (19.06.2015)
Get full text
Book Chapter
A Hybrid Encryption Technique for Securing Biometric Image Data Based on Feistel Network and RGB Pixel Displacement
Kester, Quist-Aphetsi, Nana, Laurent, Pascu, Anca Christine, Gire, Sophie, Eghan, Jojo Moses, Quaynnor, Nii Narku
Published in Recent Trends in Computer Networks and Distributed Systems Security (2014)
Published in Recent Trends in Computer Networks and Distributed Systems Security (2014)
Get full text
Book Chapter
Image Encryption based on the RGB PIXEL Transposition and Shuffling
Kester, Quist-Aphetsi
Published in International journal of computer network and information security (01.06.2013)
Published in International journal of computer network and information security (01.06.2013)
Get full text
Journal Article
Feature Based Encryption Technique for Securing Forensic Biometric Image Data Using AES and Visual Cryptography
Kester, Quist-Aphetsi, Nana, Laurent, Pascu, Anca Christine, Gire, Sophie, Eghan, J. M., Quaynor, Nii Narku
Published in 2014 2nd International Conference on Artificial Intelligence, Modelling and Simulation (01.11.2014)
Published in 2014 2nd International Conference on Artificial Intelligence, Modelling and Simulation (01.11.2014)
Get full text
Conference Proceeding
A Cryptographic Tamper Detection Approach for Storage and Preservation of Forensic Digital Data Based on SHA 384 Hash Function
Senkyire, Isaac Baffour, Kester, Quist-Aphetsi
Published in 2021 International Conference on Computing, Computational Modelling and Applications (ICCMA) (01.07.2021)
Published in 2021 International Conference on Computing, Computational Modelling and Applications (ICCMA) (01.07.2021)
Get full text
Conference Proceeding
Crime Predictive Model in Cybercrime based on Social and Economic Factors Using the Bayesian and Markov Theories
Kester, Quist-Aphetsi, Afoma, Emeh Jennifer
Published in 2021 International Conference on Computing, Computational Modelling and Applications (ICCMA) (01.07.2021)
Published in 2021 International Conference on Computing, Computational Modelling and Applications (ICCMA) (01.07.2021)
Get full text
Conference Proceeding
A Hybrid Cryptographic and Steganographic Security Approach for Identity Management and Security of Digital Images
Kester, Quist-Aphetsi, Nana, Laurent, Pascu, Anca Christine, Gire, Sophie, Eghan, Jojo M., Quaynor, Nii Narku
Published in Security in Computing and Communications
Published in Security in Computing and Communications
Get full text
Book Chapter
Enhanced Security Assessment Method for USSD Based Mobile Applications
Danquah, Paul, Kester, Quist-Aphetsi
Published in 2019 International Conference on Computer, Data Science and Applications (ICDSA) (17.07.2019)
Published in 2019 International Conference on Computer, Data Science and Applications (ICDSA) (17.07.2019)
Get full text
Conference Proceeding
A Symmetric Encription Scheme for Electronic Data Exchange for Edge Medical Devices in a Dew-Fog Computing Environment
Simpson, Grace, Kester, Quist-Aphetsi, Nana, Laurent
Published in 2019 International Conference on Mechatronics, Remote Sensing, Information Systems and Industrial Information Technologies (ICMRSISIIT) (20.12.2019)
Published in 2019 International Conference on Mechatronics, Remote Sensing, Information Systems and Industrial Information Technologies (ICMRSISIIT) (20.12.2019)
Get full text
Conference Proceeding
A Cryptographic Algorithm Based On Aes Cipher Andnondeterministic Algorithm Approach For Key Generation
Ofosu, Amoah Emmanuel, Kester, Quist-Aphetsi, Anyanewah, Attah Josephine Akosua
Published in 2019 International Conference on Computing, Computational Modelling and Applications (ICCMA) (01.03.2019)
Published in 2019 International Conference on Computing, Computational Modelling and Applications (ICCMA) (01.03.2019)
Get full text
Conference Proceeding