Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (231)
  • Open Access

    ARTICLE

    Secure Audio Transmission Over Wireless Uncorrelated Rayleigh Fading Channel

    Osama S. Faragallah1,*, M. Farouk2, Hala S. El-sayed3, Mohsen A.M. El-bendary4

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1603-1615, 2022, DOI:10.32604/cmc.2022.019710

    Abstract Audio communications and computer networking play essential roles in our daily lives, including many domains with different scopes. Developments in these technologies are quick. In consequence, there is a dire need to secure these technologies up to date. This paper presents an efficient model for secure audio signal transmission over the wireless noisy uncorrelated Rayleigh fading channel. Also, the performance of the utilized multiple secret keys-based audio cryptosystem is analyzed in different transformation domains. The discrete cosine transform (DCT), the discrete sine transform (DST), and the discrete wavelet transform (DWT) are investigated in the utilized multiple secret key-based audio cryptosystem.… More >

  • Open Access

    ARTICLE

    Amino Acid Encryption Method Using Genetic Algorithm for Key Generation

    Ahmed S. Sakr1, M. Y. Shams2, Amena Mahmoud3, Mohammed Zidan4,*

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 123-134, 2022, DOI:10.32604/cmc.2022.019455

    Abstract In this new information era, the transfer of data and information has become a very important matter. Transferred data must be kept secured from unauthorized persons using cryptography. The science of cryptography depends not only on complex mathematical models but also on encryption keys. Amino acid encryption is a promising model for data security. In this paper, we propose an amino acid encryption model with two encryption keys. The first key is generated randomly using the genetic algorithm. The second key is called the protein key which is generated from converting DNA to a protein message. Then, the protein message… More >

  • Open Access

    ARTICLE

    Utilization of HEVC ChaCha20-Based Selective Encryption for Secure Telehealth Video Conferencing

    Osama S. Faragallah1,*, Ahmed I. Sallam2, Hala S. El-sayed3

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 831-845, 2022, DOI:10.32604/cmc.2022.019151

    Abstract Coronavirus (COVID-19) is a contagious disease that causes exceptional effect on healthcare organizations worldwide with dangerous impact on medical services within the hospitals. Because of the fast spread of COVID-19, the healthcare facilities could be a big source of disease infection. So, healthcare video consultations should be used to decrease face-to-face communication between clinician and patients. Healthcare video consultations may be beneficial for some COVID-19 conditions and reduce the need for face-to-face contact with a potentially positive patient without symptoms. These conditions are like top clinicians who provide remote consultations to develop treatment methodology and follow-up remotely, patients who consult… More >

  • Open Access

    ARTICLE

    Secure and Robust Optical Multi-Stage Medical Image Cryptosystem

    Walid El-Shafai1, Moustafa H. Aly2, Abeer D. Algarni3,*, Fathi E. Abd El-Samie1,3, Naglaa F. Soliman3,4

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 895-913, 2022, DOI:10.32604/cmc.2022.018545

    Abstract Due to the rapid growth of telemedicine and healthcare services, color medical image security applications have been expanded precipitously. In this paper, an asymmetric PTFrFT (Phase Truncated Fractional Fourier Transform)-based color medical image cryptosystem is suggested. Two different phases in the fractional Fourier and output planes are provided as deciphering keys. Accordingly, the ciphering keys will not be employed for the deciphering procedure. Thus, the introduced PTFrFT algorithm comprises asymmetric ciphering and deciphering processes in contrast to the traditional optical symmetric OSH (Optical Scanning Holography) and DRPE (Double Random Phase Encoding) algorithms. One of the principal impacts of the introduced… More >

  • Open Access

    ARTICLE

    Visual Protection Using RC5 Selective Encryption in Telemedicine

    Osama S. Faragallah1,*, Ahmed I. Sallam2, Hala S. El-sayed3

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 177-190, 2022, DOI:10.32604/iasc.2022.019348

    Abstract The dissemination of the COVID-19 viruses now extends the usage of video consultations to share perspectives and virtual medical consultations, save expenses and health procedures, track the success of care proposals with detail, consistency, and ease from moment to time. The research aims to study the security of video consultations. We will also present the advantages and disadvantages of video consultations and the complications of their implementation. This paper mainly proposes a practical, high-efficiency video encoding technique for the new video encoding technique (HEVC) used in video consultations. The technology offered uses the RC5 block encryption algorithm for encrypting the… More >

  • Open Access

    ARTICLE

    Repeated Attribute Optimization for Big Data Encryption

    Abdalla Alameen*

    Computer Systems Science and Engineering, Vol.40, No.1, pp. 53-64, 2022, DOI:10.32604/csse.2022.017597

    Abstract Big data denotes the variety, velocity, and massive volume of data. Existing databases are unsuitable to store big data owing to its high volume. Cloud computing is an optimal solution to process and store big data. However, the significant issue lies in handling access control and privacy, wherein the data should be encrypted and unauthorized user access must be restricted through efficient access control. Attribute-based encryption (ABE) permits users to encrypt and decrypt data. However, for the policy to work in practical scenarios, the attributes must be repeated. In the case of specific policies, it is not possible to avoid… More >

  • Open Access

    ARTICLE

    Road Distance Computation Using Homomorphic Encryption in Road Networks

    Haining Yu1, Lailai Yin1,*, Hongli Zhang1, Dongyang Zhan1,2, Jiaxing Qu3, Guangyao Zhang4

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3445-3458, 2021, DOI:10.32604/cmc.2021.019462

    Abstract Road networks have been used in a wide range of applications to reduces the cost of transportation and improve the quality of related services. The shortest road distance computation has been considered as one of the most fundamental operations of road networks computation. To alleviate privacy concerns about location privacy leaks during road distance computation, it is desirable to have a secure and efficient road distance computation approach. In this paper, we propose two secure road distance computation approaches, which can compute road distance over encrypted data efficiently. An approximate road distance computation approach is designed by using Partially Homomorphic… More >

  • Open Access

    ARTICLE

    Double Encryption Using Trigonometric Chaotic Map and XOR of an Image

    Orawit Thinnukool1, Thammarat Panityakul2, Mahwish Bano3,*

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3033-3046, 2021, DOI:10.32604/cmc.2021.019153

    Abstract In the most recent decades, a major number of image encryption plans have been proposed. The vast majority of these plans reached a high-security level; however, their moderate speeds because of their complicated processes made them of no use in real-time applications. Inspired by this, we propose another efficient and rapid image encryption plan dependent on the Trigonometric chaotic guide. In contrast to the most of current plans, we utilize this basic map to create just a couple of arbitrary rows and columns. Moreover, to additionally speed up, we raise the processing unit from the pixel level to the row/column… More >

  • Open Access

    ARTICLE

    Towards Privacy-Preserving Cloud Storage: A Blockchain Approach

    Jia-Shun Zhang1, Gang Xu2,*, Xiu-Bo Chen1, Haseeb Ahmad3, Xin Liu4, Wen Liu5,6,7

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 2903-2916, 2021, DOI:10.32604/cmc.2021.017227

    Abstract With the rapid development of cloud computing technology, cloud services have now become a new business model for information services. The cloud server provides the IT resources required by customers in a self-service manner through the network, realizing business expansion and rapid innovation. However, due to the insufficient protection of data privacy, the problem of data privacy leakage in cloud storage is threatening cloud computing. To address the problem, we propose BC-PECK, a data protection scheme based on blockchain and public key searchable encryption. Firstly, all the data is protected by the encryption algorithm. The privacy data is encrypted and… More >

  • Open Access

    ARTICLE

    Front-end Control Mechanism of Electronic Records

    Jiang Xu1, Ling Wang1,2, Xinyu Liu1,2, Xiujuan Feng3, Yongjun Ren1,2,*, Jinyue Xia4

    Computer Systems Science and Engineering, Vol.39, No.3, pp. 337-349, 2021, DOI:10.32604/csse.2021.015004

    Abstract In the digital era, how to ensure the authenticity and integrity of electronic records has become an open challenging issue. Front-end control is an important concept as well as a basic principle in electronic record management. Under the instruction of front-end control, many original management links in the record-management stage are required to move forward, and the managers enter the formation stage of the electronic records to ensure the originality. However, the front-end control technique primarily focuses on transaction management, and it lacks the strategy of providing the control of electronic records. In this paper, a novel electronic record front-end… More >

Displaying 161-170 on page 17 of 231. Per Page