Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (243)
  • Open Access

    ARTICLE

    Secure Image Authentication Using Watermarking and Blockchain

    Alsehli Abrar1, Wadood Abdul1,*, Sanaa Ghouzali2

    Intelligent Automation & Soft Computing, Vol.28, No.2, pp. 577-591, 2021, DOI:10.32604/iasc.2021.016382 - 01 April 2021

    Abstract Image authentication is an important field that employs many different approaches and has several significant applications. In the proposed approach, we used a combination of two techniques to achieve authentication. Image watermarking is one of the techniques that has been used in many studies but the authentication field still needs to be studied. Blockchain technology is a relatively new technology that has significant research potential related to image authentication. The watermark is embedded into the third-level discrete wavelet transform (DWT) in the middle frequency regions to achieve security and imperceptibility goals. Peak signal-to-noise ratio PSNR,… More >

  • Open Access

    ARTICLE

    ECG Encryption Enhancement Technique with Multiple Layers of AES and DNA Computing

    Jamal Kh-Madhloom1,2,*, Mohd Khanapi Abd Ghani1, Mohd Rizuan Baharon1

    Intelligent Automation & Soft Computing, Vol.28, No.2, pp. 493-512, 2021, DOI:10.32604/iasc.2021.015129 - 01 April 2021

    Abstract Over the decades, protecting the privacy of a health cloud using the design of a fog computing network is a very important field and will be more important in the near future. Current Internet of Things (IoT) research includes security and privacy due to their extreme importance in any growing technology that involves the implementation of cryptographic Internet communications (ICs) for protected IC applications such as fog computing and cloud computing devices. In addition, the implementation of public-key cryptography for IoT-based DNA sequence testing devices requires considerable expertise. Any key can be broken by using… More >

  • Open Access

    ARTICLE

    A Triple-Channel Encrypted Hybrid Fusion Technique to Improve Security of Medical Images

    Ahmed S. Salama1,2,3, Mohamed Amr Mokhtar3, Mazhar B. Tayel3, Esraa Eldesouky4,6, Ahmed Ali5,6,*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 431-446, 2021, DOI:10.32604/cmc.2021.016165 - 22 March 2021

    Abstract Assuring medical images protection and robustness is a compulsory necessity nowadays. In this paper, a novel technique is proposed that fuses the wavelet-induced multi-resolution decomposition of the Discrete Wavelet Transform (DWT) with the energy compaction of the Discrete Wavelet Transform (DCT). The multi-level Encryption-based Hybrid Fusion Technique (EbhFT) aims to achieve great advances in terms of imperceptibility and security of medical images. A DWT disintegrated sub-band of a cover image is reformed simultaneously using the DCT transform. Afterwards, a 64-bit hex key is employed to encrypt the host image as well as participate in the… More >

  • Open Access

    ARTICLE

    Applying and Comparison of Chaotic-Based Permutation Algorithms for Audio Encryption

    Osama M. Abu Zaid1,*, Medhat A. Tawfeek2,3, Saad Alanazi2

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3161-3176, 2021, DOI:10.32604/cmc.2021.015175 - 01 March 2021

    Abstract This research presents, and clarifies the application of two permutation algorithms, based on chaotic map systems, and applied to a file of speech signals. They are the Arnold cat map-based permutation algorithm, and the Baker’s chaotic map-based permutation algorithm. Both algorithms are implemented on the same speech signal sample. Then, both the premier and the encrypted file histograms are documented and plotted. The speech signal amplitude values with time signals of the original file are recorded and plotted against the encrypted and decrypted files. Furthermore, the original file is plotted against the encrypted file, using… More >

  • Open Access

    ARTICLE

    TLSmell: Direct Identification on Malicious HTTPs Encryption Traffic with Simple Connection-Specific Indicators

    Zhengqiu Weng1,2, Timing Chen1,*, Tiantian Zhu1, Hang Dong1, Dan Zhou1, Osama Alfarraj3

    Computer Systems Science and Engineering, Vol.37, No.1, pp. 105-119, 2021, DOI:10.32604/csse.2021.015074 - 05 February 2021

    Abstract Internet traffic encryption is a very common traffic protection method. Most internet traffic is protected by the encryption protocol called transport layer security (TLS). Although traffic encryption can ensure the security of communication, it also enables malware to hide its information and avoid being detected. At present, most of the malicious traffic detection methods are aimed at the unencrypted ones. There are some problems in the detection of encrypted traffic, such as high false positive rate, difficulty in feature extraction, and insufficient practicability. The accuracy and effectiveness of existing methods need to be improved. In… More >

  • Open Access

    ARTICLE

    High Security for De-Duplicated Big Data Using Optimal SIMON Cipher

    A. Muthumari1, J. Banumathi2, S. Rajasekaran3, P. Vijayakarthik4, K. Shankar5, Irina V. Pustokhina6, Denis A. Pustokhin7,*

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 1863-1879, 2021, DOI:10.32604/cmc.2021.013614 - 05 February 2021

    Abstract Cloud computing offers internet location-based affordable, scalable, and independent services. Cloud computing is a promising and a cost-effective approach that supports big data analytics and advanced applications in the event of forced business continuity events, for instance, pandemic situations. To handle massive information, clusters of servers are required to assist the equipment which enables streamlining the widespread quantity of data, with elevated velocity and modified configurations. Data deduplication model enables cloud users to efficiently manage their cloud storage space by getting rid of redundant data stored in the server. Data deduplication also saves network bandwidth.… More >

  • Open Access

    ARTICLE

    An Efficient Sound and Data Steganography Based Secure Authentication System

    Debajit Datta1, Lalit Garg2,*, Kathiravan Srinivasan3, Atsushi Inoue4, G. Thippa Reddy3, M. Praveen Kumar Reddy3, K. Ramesh5, Nidal Nasser6

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 723-751, 2021, DOI:10.32604/cmc.2021.014802 - 12 January 2021

    Abstract The prodigious advancements in contemporary technologies have also brought in the situation of unprecedented cyber-attacks. Further, the pin-based security system is an inadequate mechanism for handling such a scenario. The reason is that hackers use multiple strategies for evading security systems and thereby gaining access to private data. This research proposes to deploy diverse approaches for authenticating and securing a connection amongst two devices/gadgets via sound, thereby disregarding the pins’ manual verification. Further, the results demonstrate that the proposed approaches outperform conventional pin-based authentication or QR authentication approaches. Firstly, a random signal is encrypted, and… More >

  • Open Access

    ARTICLE

    Non-Associative Algebra Redesigning Block Cipher with Color Image Encryption

    Nazli Sanam1,*, Asif Ali1, Tariq Shah1, Ghazanfar Farooq2

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1-21, 2021, DOI:10.32604/cmc.2021.014442 - 12 January 2021

    Abstract The substitution box (S-box) is a fundamentally important component of symmetric key cryptosystem. An S-box is a primary source of non-linearity in modern block ciphers, and it resists the linear attack. Various approaches have been adopted to construct S-boxes. S-boxes are commonly constructed over commutative and associative algebraic structures including Galois fields, unitary commutative rings and cyclic and non-cyclic finite groups. In this paper, first a non-associative ring of order 512 is obtained by using computational techniques, and then by this ring a triplet of 8 × 8 S-boxes is designed. The motivation behind the… More >

  • Open Access

    ARTICLE

    Hybrid Multimodal Biometric Template Protection

    Naima Bousnina1, Sanaa Ghouzali2,*, Mounia Mikram1,3, Maryam Lafkih1, Ohoud Nafea4, Muna Al-Razgan2, Wadood Abdul4

    Intelligent Automation & Soft Computing, Vol.27, No.1, pp. 35-51, 2021, DOI:10.32604/iasc.2021.014694 - 07 January 2021

    Abstract Biometric template disclosure starts gaining an important concern in deploying practical biometric authentication systems, where an assailant compromises the database for illegitimate access. To protect biometric templates from disclosure attacks, biometric authentication systems should meet these four requirements: security, diversity, revocability, and performance. Different methods have been suggested in the literature such as feature transformation techniques and biometric cryptosystems. However, no single method could satisfy the four requirements, giving rise to the deployment of hybrid mechanisms. In this context, the current paper proposes a hybrid system for multimodal biometric template protection to provide robustness against… More >

  • Open Access

    ARTICLE

    Data Security Storage Model of the Internet of Things Based on Blockchain

    Pingshui Wang1,2,*, Willy Susilo2

    Computer Systems Science and Engineering, Vol.36, No.1, pp. 213-224, 2021, DOI:10.32604/csse.2021.014541 - 23 December 2020

    Abstract With the development of information technology, the Internet of Things (IoT) has gradually become the third wave of the worldwide information industry revolution after the computer and the Internet. The application of the IoT has brought great convenience to people’s production and life. However, the potential information security problems in various IoT applications are gradually exposed and people pay more attention to them. The traditional centralized data storage and management model of the IoT is easy to cause transmission delay, single point of failure, privacy disclosure and other problems, and eventually leads to unpredictable behavior More >

Displaying 191-200 on page 20 of 243. Per Page