Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (240)
  • Open Access

    ARTICLE

    A Meaningful Image Encryption Algorithm Based on Prediction Error and Wavelet Transform

    Mengling Zou1, Zhengxuan Liu2, Xianyi Chen3, *

    Journal on Big Data, Vol.1, No.3, pp. 151-158, 2019, DOI:10.32604/jbd.2019.09057

    Abstract Image encryption (IE) is a very useful and popular technology to protect the privacy of users. Most algorithms usually encrypt the original image into an image similar to texture or noise, but texture and noise are an obvious visual indication that the image has been encrypted, which is more likely to cause the attacks of enemy. To overcome this shortcoming, many image encryption systems, which convert the original image into a carrier image with visual significance have been proposed. However, the generated cryptographic image still has texture features. In line with the idea of improving More >

  • Open Access

    ARTICLE

    A Privacy Preserving Deep Linear Regression Scheme Based on Homomorphic Encryption

    Danping Dong1, *, Yue Wu1, Lizhi Xiong1, Zhihua Xia1

    Journal on Big Data, Vol.1, No.3, pp. 145-150, 2019, DOI:10.32604/jbd.2019.08706

    Abstract This paper proposes a strategy for machine learning in the ciphertext domain. The data to be trained in the linear regression equation is encrypted by SHE homomorphic encryption, and then trained in the ciphertext domain. At the same time, it is guaranteed that the error of the training results between the ciphertext domain and the plaintext domain is in a controllable range. After the training, the ciphertext can be decrypted and restored to the original plaintext training data. More >

  • Open Access

    ARTICLE

    Pipeline Defect Detection Cloud System Using Role Encryption and Hybrid Information

    Ce Li1,2,*, Xinyu Shang2, Liguo Zhang3,4, Feng Yang1,2, Jing Zheng1,5, Xianlei Xu1

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1245-1260, 2019, DOI:10.32604/cmc.2019.06159

    Abstract Pipeline defect detection systems collect the videos from cameras of pipeline robots, however the systems always analyzed these videos by offline systems or humans to detect the defects of potential security threats. The existing systems tend to reach the limit in terms of data access anywhere, access security and video processing on cloud. There is in need of studying on a pipeline defect detection cloud system for automatic pipeline inspection. In this paper, we deploy the framework of a cloud based pipeline defect detection system, including the user management module, pipeline robot control module, system More >

  • Open Access

    ARTICLE

    Achieving Privacy-Preserving Iris Identification Via El Gamal

    Yong Ding1, Lei Tian1, Bo Han2, Huiyong Wang2,*, Yujue Wang1, James Xi Zheng3

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 727-738, 2019, DOI:10.32604/cmc.2019.06220

    Abstract Currently, many biometric systems maintain the user’s biometrics and templates in plaintext format, which brings great privacy risk to uses’ biometric information. Biometrics are unique and almost unchangeable, which means it is a great concern for users on whether their biometric information would be leaked. To address this issue, this paper proposes a confidential comparison algorithm for iris feature vectors with masks, and develops a privacy-preserving iris verification scheme based on the El Gamal encryption scheme. In our scheme, the multiplicative homomorphism of encrypted features is used to compare of iris features and their mask More >

  • Open Access

    ARTICLE

    A Block Compressed Sensing for Images Selective Encryption in Cloud

    Xingting Liu1, Jianming Zhang2,*, Xudong Li2, Siwang Zhou1, Siyuan Zhou2, Hye-JinKim3

    Journal of Cyber Security, Vol.1, No.1, pp. 29-41, 2019, DOI:10.32604/jcs.2019.06013

    Abstract The theory of compressed sensing (CS) has been proposed to reduce the processing time and accelerate the scanning process. In this paper, the image recovery task is considered to outsource to the cloud server for its abundant computing and storage resources. However, the cloud server is untrusted then may pose a considerable amount of concern for potential privacy leakage. How to protect data privacy and simultaneously maintain management of the image remains challenging. Motivated by the above challenge, we propose an image encryption algorithm based on chaotic system, CS and image saliency. In our scheme, More >

  • Open Access

    ARTICLE

    Heterogeneous Memristive Models Design and Its Application in Information Security

    Shaojiang Zhong1, *

    CMC-Computers, Materials & Continua, Vol.60, No.2, pp. 465-479, 2019, DOI:10.32604/cmc.2019.05853

    Abstract Based on the three-dimensional classic Chua circuit, a nonlinear circuit containing two flux-control memristors is designed. Due to the difference in the design of the characteristic equation of the two magnetron memristors, their position form a symmetrical structure with respect to the capacitor. The existence of chaotic properties is proved by analyzing the stability of the system, including Lyapunov exponent, equilibrium point, eigenvalue, Poincare map, power spectrum, bifurcation diagram et al. Theoretical analysis and numerical calculation show that this heterogeneous memristive model is a hyperchaotic five-dimensional nonlinear dynamical system and has a strong chaotic behavior. More >

  • Open Access

    ARTICLE

    Message Authentication with a New Quantum Hash Function

    Yalan Wang1,2, Yuling Chen1,*, Haseeb Ahmad3, Zhanhong Wei4

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 635-648, 2019, DOI:10.32604/cmc.2019.05251

    Abstract To ensure the security during the communication, we often adopt different ways to encrypt the messages to resist various attacks. However, with the computing power improving, the existing encryption and authentication schemes are being faced with big challenges. We take the message authentication as an example into a careful consideration. Then, we proposed a new message authentication scheme with the Advanced Encryption Standard as the encryption function and the new quantum Hash function as the authentication function. Firstly, the Advanced Encryption Standard algorithm is used to encrypt the result of the initial message cascading the… More >

  • Open Access

    ARTICLE

    Reversible Data Hiding in Encrypted Image Based on Block Classification Permutation

    Qun Mo1, Heng Yao1, Fang Cao2, Zheng Chang3, Chuan Qin1,*

    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 119-133, 2019, DOI:10.32604/cmc.2019.05770

    Abstract Recently, reversible data hiding in encrypted image (RDHEI) has attracted extensive attention, which can be used in secure cloud computing and privacy protection effectively. In this paper, a novel RDHEI scheme based on block classification and permutation is proposed. Content owner first divides original image into non-overlapping blocks and then set a threshold to classify these blocks into smooth and non-smooth blocks respectively. After block classification, content owner utilizes a specific encryption method, including stream cipher encryption and block permutation to protect image content securely. For the encrypted image, data hider embeds additional secret information… More >

  • Open Access

    ARTICLE

    A GLCM-Feature-Based Approach for Reversible Image Transformation

    Xianyi Chen1,2,*, Haidong Zhong1,2, Zhifeng Bao3

    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 239-255, 2019, DOI:10.32604/cmc.2019.03572

    Abstract Recently, a reversible image transformation (RIT) technology that transforms a secret image to a freely-selected target image is proposed. It not only can generate a stego-image that looks similar to the target image, but also can recover the secret image without any loss. It also has been proved to be very useful in image content protection and reversible data hiding in encrypted images. However, the standard deviation (SD) is selected as the only feature during the matching of the secret and target image blocks in RIT methods, the matching result is not so good and… More >

  • Open Access

    ARTICLE

    A Dynamic Online Protection Framework for Android Applications

    Junfeng Xu, Linna Zhou

    Computer Systems Science and Engineering, Vol.33, No.5, pp. 361-368, 2018, DOI:10.32604/csse.2018.33.361

    Abstract At present, Android is the most popular Operating System (OS) which is widespreadly installed on mobile phones, smart TVs and other wearable devices. Due to its overwhelming market share, Android attracts the attentions from many attackers. Reverse Engineering technology plays an important role in the field of Android security, such as cracking applications, malware analysis, software protection, etc. In order to prevent others from obtaining the real codes and tampering them, this paper designs and implements a online dynamic protection framework by deploying dynamic anti-debugging technology for Android application with comprehensive utilization of encryption, dynamic More >

Displaying 221-230 on page 23 of 240. Per Page