Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (336)
  • Open Access

    ARTICLE

    Reversible Watermarking Method with Low Distortion for the Secure Transmission of Medical Images

    Rizwan Taj1, Feng Tao1,*, Shahzada Khurram2, Ateeq Ur Rehman3, Syed Kamran Haider4, Akber Abid Gardezi5, Saima Kanwal1

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.3, pp. 1309-1324, 2022, DOI:10.32604/cmes.2022.017650 - 30 December 2021

    Abstract In telemedicine, the realization of reversible watermarking through information security is an emerging research field. However, adding watermarks hinders the distribution of pixels in the cover image because it creates distortions (which lead to an increase in the detection probability). In this article, we introduce a reversible watermarking method that can transmit medical images with minimal distortion and high security. The proposed method selects two adjacent gray pixels whose least significant bit (LSB) is different from the relevant message bit and then calculates the distortion degree. We use the LSB pairing method to embed the secret… More >

  • Open Access

    ARTICLE

    Optimum Calcination Condition of Waste Stabilized Adobe for Alkali Activated High Volume Adobe-Slag Binder Cured at Room Temperature

    Brya Aldawoodi1,*, Salaheddin Sabri1, Abdulmounem Alchekh Wis2

    Journal of Renewable Materials, Vol.10, No.5, pp. 1269-1285, 2022, DOI:10.32604/jrm.2022.017445 - 22 December 2021

    Abstract This study aims to determine the most convenient calcination temperature and calcination duration of waste-stabilized Adobe (AB) to produce a new alkali-activated binder. Waste-stabilized Adobe mainly consists of soil, CaCO3 as a stabilizer, and straw (for strengthening). The availability of raw materials for making Adobe presents the waste-stabilized Adobe as a potential product for a new alkali-activated binder. Waste-stabilized Adobe collected from an abandoned damaged building in the village of Inonu in Northern Cyprus, ground and calcined at the following temperatures: 450, 550, 650, 750, 850, and 950°C. The calcination at each temperature was held for… More >

  • Open Access

    ARTICLE

    Construction of Key-dependent S-box for Secure Cloud Storage

    A. Indumathi*, G. Sumathi

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1509-1524, 2022, DOI:10.32604/iasc.2022.022743 - 09 December 2021

    Abstract As cloud storage systems have developed and been applied in complex environments, their data security has become more prevalent in recent years. The issue has been approached through many models. Data is encrypted and stored in these models. One of the most widely used encryption methods is the Advanced Encryption Standard (AES). In AES, the Substitution box(S-box) is playing a significant part in imparting the job of confusion. The security of the entire cryptosystem depends on its nonlinearity. In this work, a robust and secure S-box is constructed using a novel method, i.e., fingerprint features-based permutation… More >

  • Open Access

    ARTICLE

    An Enhanced Privacy Preserving, Secure and Efficient Authentication Protocol for VANET

    Safiullah Khan1, Ali Raza2,3, Seong Oun Hwang4,*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3703-3719, 2022, DOI:10.32604/cmc.2022.023476 - 07 December 2021

    Abstract Vehicular ad hoc networks (VANETs) have attracted growing interest in both academia and industry because they can provide a viable solution that improves road safety and comfort for travelers on roads. However, wireless communications over open-access environments face many security and privacy issues that may affect deployment of large-scale VANETs. Researchers have proposed different protocols to address security and privacy issues in a VANET, and in this study we cryptanalyze some of the privacy preserving protocols to show that all existing protocols are vulnerable to the Sybil attack. The Sybil attack can be used by… More >

  • Open Access

    ARTICLE

    Hyper Elliptic Curve Based Certificateless Signcryption Scheme for Secure IIoT Communications

    Usman Ali1,2, Mohd Yamani Idna Idris1,3,*, Jaroslav Frnda4, Mohamad Nizam Bin Ayub1, Roobaea Alroobaea5, Fahad Almansour6, Nura Modi Shagari1, Insaf Ullah7, Ihsan Ali1

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2515-2532, 2022, DOI:10.32604/cmc.2022.019800 - 07 December 2021

    Abstract Industrial internet of things (IIoT) is the usage of internet of things (IoT) devices and applications for the purpose of sensing, processing and communicating real-time events in the industrial system to reduce the unnecessary operational cost and enhance manufacturing and other industrial-related processes to attain more profits. However, such IoT based smart industries need internet connectivity and interoperability which makes them susceptible to numerous cyber-attacks due to the scarcity of computational resources of IoT devices and communication over insecure wireless channels. Therefore, this necessitates the design of an efficient security mechanism for IIoT environment. In… More >

  • Open Access

    ARTICLE

    Blockchain Based Secured Load Balanced Task Scheduling Approach for Fitness Service

    Muhammad Ibrahim1, Faisal Jamil2, YunJung Lee1, DoHyeun Kim2,*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2599-2616, 2022, DOI:10.32604/cmc.2022.019534 - 07 December 2021

    Abstract In recent times, the evolution of blockchain technology has got huge attention from the research community due to its versatile applications and unique security features. The IoT has shown wide adoption in various applications including smart cities, healthcare, trade, business, etc. Among these applications, fitness applications have been widely considered for smart fitness systems. The users of the fitness system are increasing at a high rate thus the gym providers are constantly extending the fitness facilities. Thus, scheduling such a huge number of requests for fitness exercise is a big challenge. Secondly, the user fitness… More >

  • Open Access

    ARTICLE

    An Effective Secure MAC Protocol for Cognitive Radio Networks

    Bayan Al-Amri1, Gofran Sami2, Wajdi Alhakami1,*

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 133-148, 2022, DOI:10.32604/csse.2022.021543 - 02 December 2021

    Abstract The vast revolution in networking is increasing rapidly along with technology advancements, which requires more effort from all cyberspace professionals to cope with the challenges that come with advanced technology privileges and services. Hence, Cognitive Radio Network is one of the promising approaches that permit a dynamic type of smart network for improving the utilization of idle spectrum portions of wireless communications. However, it is vulnerable to security threats and attacks and demands security mechanisms to preserve and protect the cognitive radio networks for ensuring a secure communication environment. This paper presents an effective secure More >

  • Open Access

    ARTICLE

    A Secure Encrypted Classified Electronic Healthcare Data for Public Cloud Environment

    Kirupa Shankar Komathi Maathavan1,*, Santhi Venkatraman2

    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 765-779, 2022, DOI:10.32604/iasc.2022.022276 - 17 November 2021

    Abstract The major operation of the blood bank supply chain is to estimate the demand, perform inventory management and distribute adequate blood for the needs. The proliferation of big data in the blood bank supply chain and data management needs an intelligent, automated system to classify the essential data so that the requests can be handled easily with less human intervention. Big data in the blood bank domain refers to the collection, organization, and analysis of large volumes of data to obtain useful information. For this purpose, in this research work we have employed machine learning… More >

  • Open Access

    ARTICLE

    Secured Route Selection Using E-ACO in Underwater Wireless Sensor Networks

    S. Premkumar Deepak*, M. B. Mukeshkrishnan

    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 963-978, 2022, DOI:10.32604/iasc.2022.022126 - 17 November 2021

    Abstract Underwater wireless sensor networks (UWSNs) are promising, emerging technologies for the applications in oceanic research. UWSN contains high number of sensor nodes and autonomous underwater vehicles that are deployed to perform the data transmission in the sea. In UWSN networks, the sensors are placed in the buoyant which are highly vulnerable to selfish behavioural attack. In this paper, the major challenges in finding secure and optimal route navigation in UWSN are identified and in order to address them, Entropy based ACO algorithm (E-ACO) is proposed for secure route selection. Moreover, the Selfish Node Recovery (SNR) More >

  • Open Access

    ARTICLE

    Service Level Agreement Based Secured Data Analytics Framework for Healthcare Systems

    S. Benila1,*, N. Usha Bhanu2

    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 1277-1291, 2022, DOI:10.32604/iasc.2022.021920 - 17 November 2021

    Abstract Many physical objects are connected to the internet in this modern day to make things easier to work based on the convenience of the user, which reduces human involvement with the help of Internet of Things (IoT) technology.This aids in the capture of large amounts of data, the interchange of information via the internet, and the remote operation of machines. IoT health data is typically in the form of big data and is frequently coupled with the cloud for secure storage. Cloud technology provides a wide range of technological services via the internet, and it… More >

Displaying 221-230 on page 23 of 336. Per Page