Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (20)
  • Open Access

    ARTICLE

    Edge-Based Data Hiding and Extraction Algorithm to Increase Payload Capacity and Data Security

    Hanan Hardan1,*, Osama A. Khashan2,*, Mohammad Alshinwan1

    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 1681-1710, 2025, DOI:10.32604/cmc.2025.061659 - 09 June 2025

    Abstract This study introduces an Edge-Based Data Hiding and Extraction Algorithm (EBDHEA) to address the problem of data embedding in images while preserving robust security and high image quality. The algorithm produces three classes of pixels from the pixels in the cover image: edges found by the Canny edge detection method, pixels arising from the expansion of neighboring edge pixels, and pixels that are neither edges nor components of the neighboring edge pixels. The number of Least Significant Bits (LSBs) that are used to hide data depends on these classifications. Furthermore, the lossless compression method, Huffman… More >

  • Open Access

    ARTICLE

    LSBSP: A Lightweight Sharding Method of Blockchain Based on State Pruning for Efficient Data Sharing in IoMT

    Guoqiong Liao1,3, Yinxiang Lei1,2,*, Yufang Xie1, Neal N. Xiong4

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 3309-3335, 2025, DOI:10.32604/cmc.2024.060077 - 17 February 2025

    Abstract As the Internet of Medical Things (IoMT) continues to expand, smart health-monitoring devices generate vast amounts of valuable data while simultaneously raising critical security and privacy challenges. Blockchain technology presents a promising avenue to address these concerns due to its inherent decentralization and security features. However, scalability remains a persistent hurdle, particularly for IoMT applications that involve large-scale networks and resource-constrained devices. This paper introduces a novel lightweight sharding method tailored to the unique demands of IoMT data sharing. Our approach enhances state bootstrapping efficiency and reduces operational overhead by utilizing a dual-chain structure comprising… More >

  • Open Access

    ARTICLE

    High-Secured Image LSB Steganography Using AVL-Tree with Random RGB Channel Substitution

    Murad Njoum1,2,*, Rossilawati Sulaiman1, Zarina Shukur1, Faizan Qamar1

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 183-211, 2024, DOI:10.32604/cmc.2024.050090 - 15 October 2024

    Abstract Random pixel selection is one of the image steganography methods that has achieved significant success in enhancing the robustness of hidden data. This property makes it difficult for steganalysts’ powerful data extraction tools to detect the hidden data and ensures high-quality stego image generation. However, using a seed key to generate non-repeated sequential numbers takes a long time because it requires specific mathematical equations. In addition, these numbers may cluster in certain ranges. The hidden data in these clustered pixels will reduce the image quality, which steganalysis tools can detect. Therefore, this paper proposes a… More >

  • Open Access

    REVIEW

    A Review of Image Steganography Based on Multiple Hashing Algorithm

    Abdullah Alenizi1, Mohammad Sajid Mohammadi2, Ahmad A. Al-Hajji2, Arshiya Sajid Ansari1,*

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2463-2494, 2024, DOI:10.32604/cmc.2024.051826 - 15 August 2024

    Abstract Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item. From ancient times to the present, the security of secret or vital information has always been a significant problem. The development of secure communication methods that keep recipient-only data transmissions secret has always been an area of interest. Therefore, several approaches, including steganography, have been developed by researchers over time to enable safe data transit. In this review, we have discussed image steganography based on Discrete Cosine Transform (DCT) algorithm, etc. We have also discussed image steganography based… More >

  • Open Access

    ARTICLE

    Elevating Image Steganography: A Fusion of MSB Matching and LSB Substitution for Enhanced Concealment Capabilities

    Muhammad Zaman Ali1, Omer Riaz1, Hafiz Muhammad Hasnain2, Waqas Sharif2, Tenvir Ali2, Gyu Sang Choi3,*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2923-2943, 2024, DOI:10.32604/cmc.2024.049139 - 15 May 2024

    Abstract In today’s rapidly evolving landscape of communication technologies, ensuring the secure delivery of sensitive data has become an essential priority. To overcome these difficulties, different steganography and data encryption methods have been proposed by researchers to secure communications. Most of the proposed steganography techniques achieve higher embedding capacities without compromising visual imperceptibility using LSB substitution. In this work, we have an approach that utilizes a combination of Most Significant Bit (MSB) matching and Least Significant Bit (LSB) substitution. The proposed algorithm divides confidential messages into pairs of bits and connects them with the MSBs of… More >

  • Open Access

    ARTICLE

    An Efficient Sleep Spindle Detection Algorithm Based on MP and LSBoost

    Fei Wang1,2, Li Li1, Yinxing Wan1, Zhuorong Li1, Lixian Luo3, Bangshun Hu1, Jiahui Pan1,2, Zhenfu Wen4, Haiyun Huang1,2,*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2301-2316, 2023, DOI:10.32604/cmc.2023.037727 - 30 August 2023

    Abstract Sleep spindles are an electroencephalogram (EEG) biomarker of non-rapid eye movement (NREM) sleep and have important implications for clinical diagnosis and prognosis. However, it is challenging to accurately detect sleep spindles due to the complexity of the human brain and the uncertainty of neural mechanisms. To improve the reliability and objectivity of sleep spindle detection and to compensate for the limitations of manual annotation, this study proposes a new automatic detection algorithm based on Matching Pursuit (MP) and Least Squares Boosting (LSBoost), where the automatic sleep spindle detection algorithm can help reduce the visual annotation… More >

  • Open Access

    ARTICLE

    Comparative Analysis of Execution of CNN-Based Sanguine Data Transmission with LSB-SS and PVD-SS

    Alaknanda S. Patil1,*, G. Sundari1, Arun Kumar Sivaraman2

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1707-1721, 2023, DOI:10.32604/csse.2023.034270 - 09 February 2023

    Abstract The intact data transmission to the authentic user is becoming crucial at every moment in the current era. Steganography; is a technique for concealing the hidden message in any cover media such as image, video; and audio to increase the protection of data. The resilience and imperceptibility are improved by choosing an appropriate embedding position. This paper gives a novel system to immerse the secret information in different videos with different methods. An audio and video steganography with novel amalgamations are implemented to immerse the confidential auditory information and the authentic user’s face image. A… More >

  • Open Access

    ARTICLE

    Proposed Privacy Preservation Technique for Color Medical Images

    Walid El-Shafai1,2, Hayam A. Abd El-Hameed3, Noha A. El-Hag4, Ashraf A. M. Khalaf3, Naglaa F. Soliman5, Hussah Nasser AlEisa6,*, Fathi E. Abd El-Samie1

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 719-732, 2023, DOI:10.32604/iasc.2023.031079 - 29 September 2022

    Abstract Nowadays, the security of images or information is very important. This paper introduces a proposed hybrid watermarking and encryption technique for increasing medical image security. First, the secret medical image is encrypted using Advanced Encryption Standard (AES) algorithm. Then, the secret report of the patient is embedded into the encrypted secret medical image with the Least Significant Bit (LSB) watermarking algorithm. After that, the encrypted secret medical image with the secret report is concealed in a cover medical image, using Kekre’s Median Codebook Generation (KMCG) algorithm. Afterwards, the stego-image obtained is split into 16 parts.… More >

  • Open Access

    ARTICLE

    A Robust Data Hiding Reversible Technique for Improving the Security in e-Health Care System

    Saima Kanwal1, Feng Tao1,*, Ahmad Almogren2, Ateeq Ur Rehman3, Rizwan Taj1, Ayman Radwan4

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.1, pp. 201-219, 2023, DOI:10.32604/cmes.2022.020255 - 24 August 2022

    Abstract The authenticity and integrity of healthcare is the primary objective. Numerous reversible watermarking schemes have been developed to improve the primary objective but increasing the quantity of embedding data leads to covering image distortion and visual quality resulting in data security detection. A trade-off between robustness, imperceptibility, and embedded capacity is difficult to achieve with current algorithms due to limitations in their ability. Keeping this purpose insight, an improved reversibility watermarking methodology is proposed to maximize data embedding capacity and imperceptibility while maintaining data security as a primary concern. A key is generated by a… More >

  • Open Access

    ARTICLE

    High Efficiency Crypto-Watermarking System Based on Clifford-Multiwavelet for 3D Meshes Security

    Wajdi Elhamzi1,2,*, Malika Jallouli3, Yassine Bouteraa1,4

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 4329-4347, 2022, DOI:10.32604/cmc.2022.030954 - 16 June 2022

    Abstract Since 3D mesh security has become intellectual property, 3D watermarking algorithms have continued to appear to secure 3D meshes shared by remote users and saved in distant multimedia databases. The novelty of our approach is that it uses a new Clifford-multiwavelet transform to insert copyright data in a multiresolution domain, allowing us to greatly expand the size of the watermark. After that, our method does two rounds of insertion, each applying a different type of Clifford-wavelet transform. Before being placed into the Clifford-multiwavelet coefficients, the watermark, which is a mixture of the mesh description, source… More >

Displaying 1-10 on page 1 of 20. Per Page