Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (43)
  • Open Access

    ARTICLE

    On Hiding Secret Information in Medium Frequency DCT Components Using Least Significant Bits Steganography

    Sahib Khan1,*, M A Irfan1, Arslan Arif1, Syed Tahir Hussain Rizvi2, Asma Gul3, Muhammad Naeem4, Nasir Ahmad5

    CMES-Computer Modeling in Engineering & Sciences, Vol.118, No.3, pp. 529-546, 2019, DOI:10.31614/cmes.2019.06179

    Abstract This work presents a new method of data hiding in digital images, in discrete cosine transform domain. The proposed method uses the least significant bits of the medium frequency components of the cover image for hiding the secret information, while the low and high frequency coefficients are kept unaltered. The unaltered low frequency DCT coefficients preserves the quality of the smooth region of the cover image, while no changes in the high DCT coefficient preserve the quality of the edges. As the medium frequency components have less contribution towards energy and image details, so the modification of these coefficients for… More >

  • Open Access

    ARTICLE

    Optimal Adaptive Genetic Algorithm Based Hybrid Signcryption Algorithm for Information Security

    R. Sujatha1, M. Ramakrishnan2, N. Duraipandian3, B. Ramakrishnan4

    CMES-Computer Modeling in Engineering & Sciences, Vol.105, No.1, pp. 47-68, 2015, DOI:10.3970/cmes.2015.105.047

    Abstract The functions of digital signature and public key encryption are simultaneously fulfilled by signcryption, which is a cryptographic primitive. To securely communicate very large messages, the cryptographic primitive called signcryption efficiently implements the same and while most of the public key based systems are suitable for small messages, hybrid encryption (KEM-DEM) provides a competent and practical way. In this paper, we develop a hybrid signcryption technique. The hybrid signcryption is based on the KEM and DEM technique. The KEM algorithm utilizes the KDF technique to encapsulate the symmetric key. The DEM algorithm utilizes the Adaptive Genetic Algorithm based Elliptic curve… More >

  • Open Access

    ARTICLE

    New Method for Computer Identification Through Electromagnetic Radiation

    Jun Shi1, Zhujun Zhang2, Yangyang Li1,*, Rui Wang1, Hao Shi1, Xile Li3

    CMC-Computers, Materials & Continua, Vol.57, No.1, pp. 69-80, 2018, DOI:10.32604/cmc.2018.03688

    Abstract The electromagnetic waves emitted from devices can be a source of information leakage and can cause electromagnetic compatibility (EMC) problems. Electromagnetic radiation signals from computer displays can be a security risk if they are intercepted and reconstructed. In addition, the leaks may reveal the hardware information of the computer, which is more important for some attackers, protectors and security inspection workers. In this paper, we propose a statistical distribution based algorithm (SD algorithm) to extracted eigenvalues from electromagnetic radiate video signals, and then classified computers by using classifier based on Bayesian and SVM. We can identify computers automatically and accurately… More >

Displaying 41-50 on page 5 of 43. Per Page