Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (19)
  • Open Access

    ARTICLE

    Efficient Group Blind Signature for Medical Data Anonymous Authentication in Blockchain-Enabled IoMT

    Chaoyang Li*, Bohao Jiang, Yanbu Guo, Xiangjun Xin

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 591-606, 2023, DOI:10.32604/cmc.2023.038129

    Abstract Blockchain technology promotes the development of the Internet of medical things (IoMT) from the centralized form to distributed trust mode as blockchain-based Internet of medical things (BIoMT). Although blockchain improves the cross-institution data sharing ability, there still exist the problems of authentication difficulty and privacy leakage. This paper first describes the architecture of the BIoMT system and designs an anonymous authentication model for medical data sharing. This BIoMT system is divided into four layers: perceptual, network, platform, and application. The model integrates an anonymous authentication scheme to guarantee secure data sharing in the network ledger. Utilizing the untampered blockchain ledger… More >

  • Open Access

    ARTICLE

    Smart Shoes Safety System for the Blind People Based on (IoT) Technology

    Ammar Almomani1,2,*, Mohammad Alauthman3, Amal Malkawi2, Hadeel Shwaihet2, Batool Aldigide2, Donia Aldabeek2, Karmen Abu Hamoodeh2

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 415-436, 2023, DOI:10.32604/cmc.2023.036266

    Abstract People’s lives have become easier and simpler as technology has proliferated. This is especially true with the Internet of Things (IoT). The biggest problem for blind people is figuring out how to get where they want to go. People with good eyesight need to help these people. Smart shoes are a technique that helps blind people find their way when they walk. So, a special shoe has been made to help blind people walk safely without worrying about running into other people or solid objects. In this research, we are making a new safety system and a smart shoe for… More >

  • Open Access

    ARTICLE

    Determined Reverberant Blind Source Separation of Audio Mixing Signals

    Senquan Yang1, Fan Ding1, Jianjun Liu1, Pu Li1,2, Songxi Hu1,2,*

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3309-3323, 2023, DOI:10.32604/iasc.2023.035051

    Abstract Audio signal separation is an open and challenging issue in the classical “Cocktail Party Problem”. Especially in a reverberation environment, the separation of mixed signals is more difficult separated due to the influence of reverberation and echo. To solve the problem, we propose a determined reverberant blind source separation algorithm. The main innovation of the algorithm focuses on the estimation of the mixing matrix. A new cost function is built to obtain the accurate demixing matrix, which shows the gap between the prediction and the actual data. Then, the update rule of the demixing matrix is derived using Newton gradient… More >

  • Open Access

    ARTICLE

    A Lightweight Convolutional Neural Network with Representation Self-challenge for Fingerprint Liveness Detection

    Jie Chen1, Chengsheng Yuan1,2,*, Chen Cui2, Zhihua Xia1, Xingming Sun1,3, Thangarajah Akilan4

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 719-733, 2022, DOI:10.32604/cmc.2022.027984

    Abstract Fingerprint identification systems have been widely deployed in many occasions of our daily life. However, together with many advantages, they are still vulnerable to the presentation attack (PA) by some counterfeit fingerprints. To address challenges from PA, fingerprint liveness detection (FLD) technology has been proposed and gradually attracted people's attention. The vast majority of the FLD methods directly employ convolutional neural network (CNN), and rarely pay attention to the problem of over-parameterization and over-fitting of models, resulting in large calculation force of model deployment and poor model generalization. Aiming at filling this gap, this paper designs a lightweight multi-scale convolutional… More >

  • Open Access

    ARTICLE

    Security Analysis for a VANET Privacy Protection Scheme

    Yuzhen Liu1,2, Xiaoliang Wang1,2,*, Zhoulei Cao1,2, Frank Jiang3

    Journal of Cyber Security, Vol.4, No.1, pp. 57-64, 2022, DOI:10.32604/jcs.2022.028792

    Abstract Vehicular ad hoc network (VANET) is a self-organizing wireless sensor network model, which is extensively used in the existing traffic. Due to the openness of wireless channel and the sensitivity of traffic information, data transmission process in VANET is vulnerable to leakage and attack. Authentication of vehicle identity while protecting vehicle privacy information is an advantageous way to improve the security of VANET. We propose a scheme based on fair blind signature and secret sharing algorithm. In this paper, we prove that the scheme is feasible through security analysis. More >

  • Open Access

    ARTICLE

    Securing Copyright Using 3D Objects Blind Watermarking Scheme

    Hussein Abulkasim1,*, Mona Jamjoom2, Safia Abbas2

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5969-5983, 2022, DOI:10.32604/cmc.2022.027999

    Abstract Recently, securing Copyright has become a hot research topic due to rapidly advancing information technology. As a host cover, watermarking methods are used to conceal or embed sensitive information messages in such a manner that it was undetectable to a human observer in contemporary times. Digital media covers may often take any form, including audio, video, photos, even DNA data sequences. In this work, we present a new methodology for watermarking to hide secret data into 3-D objects. The technique of blind extraction based on reversing the steps of the data embedding process is used. The implemented technique uses the… More >

  • Open Access

    ARTICLE

    A Novel Post-Quantum Blind Signature for Log System in Blockchain

    Gang Xu1,2, Yibo Cao1, Shiyuan Xu1, Ke Xiao1, Xin Liu3, Xiubo Chen4,*, Mianxiong Dong5

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 945-958, 2022, DOI:10.32604/csse.2022.022100

    Abstract In recent decades, log system management has been widely studied for data security management. System abnormalities or illegal operations can be found in time by analyzing the log and provide evidence for intrusions. In order to ensure the integrity of the log in the current system, many researchers have designed it based on blockchain. However, the emerging blockchain is facing significant security challenges with the increment of quantum computers. An attacker equipped with a quantum computer can extract the user's private key from the public key to generate a forged signature, destroy the structure of the blockchain, and threaten the… More >

  • Open Access

    ARTICLE

    An Efficient Proxy Blind Signcryption Scheme for IoT

    Aamer Khan1, Insaf Ullah2,*, Fahad Algarni3, Muhammad Naeem1, M. Irfan Uddin4, Muhammad Asghar Khan2

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4293-4306, 2022, DOI:10.32604/cmc.2022.017318

    Abstract Recent years have witnessed growing scientific research interest in the Internet of Things (IoT) technologies, which supports the development of a variety of applications such as health care, Industry 4.0, agriculture, ecological data management, and other various domains. IoT utilizes the Internet as a prime medium of communication for both single documents as well as multi-digital messages. However, due to the wide-open nature of the Internet, it is important to ensure the anonymity, untraceably, confidentiality, and unforgeability of communication with efficient computational complexity and low bandwidth. We designed a light weight and secure proxy blind signcryption for multi-digital messages based… More >

  • Open Access

    ARTICLE

    Blind and Visually Impaired User Interface to Solve Accessibility Problems

    Azeem Shera1, Muhammad Waseem Iqbal2,*, Syed Khuram Shahzad3, Madeeha Gul1, Natash Ali Mian4, Muhammad Raza Naqvi5, Babar Ayub Khan1

    Intelligent Automation & Soft Computing, Vol.30, No.1, pp. 285-301, 2021, DOI:10.32604/iasc.2021.018009

    Abstract Blind and visually impaired (BVI) users often have interface accessibility problems while using mobile applications. This study was conducted to reduce the cognitive effort required for interface navigation by identifying the accessibility issues according to the user’s mental model. The study evaluated the accessibility of smartphone screens to solve organizational, presentation, and behavioral (OPB) problems of using mobile applications. Usability evaluation of an application was conducted and validated with a specific focus on BVI user experience. A total of 56 BVI participants were included in the evaluation. Overall, four tasks to assess organization, avoidance of redundant information, serialization of content,… More >

  • Open Access

    ARTICLE

    Implementation of Multi-Object Recognition System for the Blind

    Huijin Park, Soobin Ou, Jongwoo Lee*

    Intelligent Automation & Soft Computing, Vol.29, No.1, pp. 247-258, 2021, DOI:10.32604/iasc.2021.015274

    Abstract Blind people are highly exposed to numerous dangers when they walk alone outside as they cannot obtain sufficient information about their surroundings. While proceeding along a crosswalk, acoustic signals are played, though such signals are often faulty or difficult to hear. The bollards can also be dangerous if they are not made with flexible materials or are located improperly. Therefore, since the blind cannot detect proper information about these obstacles while walking, their environment can prove to be dangerous. In this paper, we propose an object recognition system that allows the blind to walk safely outdoors. The proposed system can… More >

Displaying 1-10 on page 1 of 19. Per Page