Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (19)
  • Open Access

    ARTICLE

    Secret Key Optimization for Secure Speech Communications

    Osama S. Faragallah1,*, Mahmoud Farouk2, Hala S. El-Sayed3

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3025-3037, 2022, DOI:10.32604/cmc.2022.019951

    Abstract This paper answers three essential questions for audio speech cryptosystems in time and discrete transform domains. The first question is, what are the best values of sub-keys that must be used to get the best quality and security for the audio cryptosystem in time and discrete transform domains. The second question is the relation between the number of sub-keys, the number of secret keys used, and the audio speech signal block’s size. Finally, how many possible secret keys can be used to get the best quality and security results for the audio speech cryptosystem in time and discrete transform domains.… More >

  • Open Access

    ARTICLE

    Improved Software Implementation for Montgomery Elliptic Curve Cryptosystem

    Mohammad Al-Khatib*, Wafaa Saif

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4847-4865, 2022, DOI:10.32604/cmc.2022.021483

    Abstract The last decade witnessed rapid increase in multimedia and other applications that require transmitting and protecting huge amount of data streams simultaneously. For such applications, a high-performance cryptosystem is compulsory to provide necessary security services. Elliptic curve cryptosystem (ECC) has been introduced as a considerable option. However, the usual sequential implementation of ECC and the standard elliptic curve (EC) form cannot achieve required performance level. Moreover, the widely used Hardware implementation of ECC is costly option and may be not affordable. This research aims to develop a high-performance parallel software implementation for ECC. To achieve this, many experiments were performed… More >

  • Open Access

    ARTICLE

    A Fractional Fourier Based Medical Image Authentication Approach

    Fayez Alqahtani1,*, Mohammed Amoon2,3, Walid El-Shafai4

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3133-3150, 2022, DOI:10.32604/cmc.2022.020454

    Abstract Patient medical information in all forms is crucial to keep private and secure, particularly when medical data communication occurs through insecure channels. Therefore, there is a bad need for protecting and securing the color medical images against impostors and invaders. In this paper, an optical medical image security approach is introduced. It is based on the optical bit-plane Jigsaw Transform (JT) and Fractional Fourier Transform (FFT). Different kernels with a lone lens and a single arbitrary phase code are exploited in this security approach. A preceding bit-plane scrambling process is conducted on the input color medical images prior to the… More >

  • Open Access

    ARTICLE

    Analyzing the Data of Software Security Life-Span: Quantum Computing Era

    Hashem Alyami1, Mohd Nadeem2, Wael Alosaimi3, Abdullah Alharbi3, Rajeev Kumar4,*, Bineet Kumar Gupta4, Alka Agrawal2, Raees Ahmad Khan2

    Intelligent Automation & Soft Computing, Vol.31, No.2, pp. 707-716, 2022, DOI:10.32604/iasc.2022.020780

    Abstract Software or web application security is the main objective in the era of Information Technology (IT) and Artificial Intelligence (AI). Distinguishing proof of security at the initial stage produces significant results to comprehend the administration of security relics for best potential outcomes. A security alternative gives several methods and algorithms to ensure the software security. Security estimation is the vital factor in assessing, administrating, controlling security to improve the nature of security. It is to be realized that assessment of security at early stage of development helps in identifying distinctive worms, dangers, weaknesses and threats. This paper will talk about… More >

  • Open Access

    ARTICLE

    Secure and Robust Optical Multi-Stage Medical Image Cryptosystem

    Walid El-Shafai1, Moustafa H. Aly2, Abeer D. Algarni3,*, Fathi E. Abd El-Samie1,3, Naglaa F. Soliman3,4

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 895-913, 2022, DOI:10.32604/cmc.2022.018545

    Abstract Due to the rapid growth of telemedicine and healthcare services, color medical image security applications have been expanded precipitously. In this paper, an asymmetric PTFrFT (Phase Truncated Fractional Fourier Transform)-based color medical image cryptosystem is suggested. Two different phases in the fractional Fourier and output planes are provided as deciphering keys. Accordingly, the ciphering keys will not be employed for the deciphering procedure. Thus, the introduced PTFrFT algorithm comprises asymmetric ciphering and deciphering processes in contrast to the traditional optical symmetric OSH (Optical Scanning Holography) and DRPE (Double Random Phase Encoding) algorithms. One of the principal impacts of the introduced… More >

  • Open Access

    ARTICLE

    Privacy Preserving Blockchain Technique to Achieve Secure and Reliable Sharing of IoT Data

    Bao Le Nguyen1, E. Laxmi Lydia2, Mohamed Elhoseny3, Irina V. Pustokhina4, Denis A. Pustokhin5, Mahmoud Mohamed Selim6, Gia Nhu Nguyen7, 8, K. Shankar9, *

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 87-107, 2020, DOI:10.32604/cmc.2020.011599

    Abstract In present digital era, an exponential increase in Internet of Things (IoT) devices poses several design issues for business concerning security and privacy. Earlier studies indicate that the blockchain technology is found to be a significant solution to resolve the challenges of data security exist in IoT. In this view, this paper presents a new privacy-preserving Secure Ant Colony optimization with Multi Kernel Support Vector Machine (ACOMKSVM) with Elliptical Curve cryptosystem (ECC) for secure and reliable IoT data sharing. This program uses blockchain to ensure protection and integrity of some data while it has the technology to create secure ACOMKSVM… More >

  • Open Access

    ARTICLE

    Cryptanalysis and Improvement of a Chaotic Map-Control-Based and the Plain Image-Related Cryptosystem

    Bin Lu1, Fenlin Liu1, Xin Ge1,*, Zhenyu Li2

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 687-699, 2019, DOI:10.32604/cmc.2019.05633

    Abstract Due to the characteristics of chaotic systems, different cryptosystems based on chaos have been proposed to satisfy the security of multimedia data. A plain image-related chaotic algorithm is proposed by Luo et al. with high speed and efficiency. Security weaknesses of the cryptosystem are studied in this paper. It is found that the important secret key information is leaked because an important parameter can be obtained after an inverse operation in the last step of the cryptosystems without secret key. Meanwhile, the value zero is processed improperly in quantification algorithm. Based on the weaknesses, chosen plaintext attack on the cryptosystem… More >

  • Open Access

    ARTICLE

    A New NTRU-Type Public-Key Cryptosystem over the Binary Field

    Youyu Gu1, Xiongwei Xie2, Chunsheng Gu3,*

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 305-316, 2019, DOI:10.32604/cmc.2019.04121

    Abstract As the development of cloud computing and the convenience of wireless sensor netowrks, smart devices are widely used in daily life, but the security issues of the smart devices have not been well resolved. In this paper, we present a new NTRU-type public-key cryptosystem over the binary field. Specifically, the security of our scheme relies on the computational intractability of an unbalanced sparse polynomial ratio problem (DUSPR). Through theoretical analysis, we prove the correctness of our proposed cryptosystem. Furthermore, we implement our scheme using the NTL library, and conduct a group of experiments to evaluate the capabilities and consuming time… More >

  • Open Access

    ARTICLE

    A Cryptograph Domain Image Retrieval Method Based on Paillier Homomorphic Block Encryption

    Wenjia Xu1, Shijun Xiang1,*, Vasily Sachnev2

    CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 285-295, 2018, DOI:10.3970/cmc.2018.01719

    Abstract With the rapid development of information network, the computing resources and storage capacity of ordinary users cannot meet their needs of data processing. The emergence of cloud computing solves this problem but brings data security problems. How to manage and retrieve ciphertext data effectively becomes a challenging problem. To these problems, a new image retrieval method in ciphertext domain by block image encrypting based on Paillier homomophic cryptosystem is proposed in this paper. This can be described as follows: According to the Paillier encryption technology, the image owner encrypts the original image in blocks, obtains the image in ciphertext domain,… More >

Displaying 11-20 on page 2 of 19. Per Page