Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22)
  • Open Access

    ARTICLE

    Secure Content Based Image Retrieval Scheme Based on Deep Hashing and Searchable Encryption

    Zhen Wang, Qiu-yu Zhang*, Ling-tao Meng, Yi-lin Liu

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 6161-6184, 2023, DOI:10.32604/cmc.2023.037134

    Abstract To solve the problem that the existing ciphertext domain image retrieval system is challenging to balance security, retrieval efficiency, and retrieval accuracy. This research suggests a searchable encryption and deep hashing-based secure image retrieval technique that extracts more expressive image features and constructs a secure, searchable encryption scheme. First, a deep learning framework based on residual network and transfer learning model is designed to extract more representative image deep features. Secondly, the central similarity is used to quantify and construct the deep hash sequence of features. The Paillier homomorphic encryption encrypts the deep hash sequence to build a high-security and… More >

  • Open Access

    ARTICLE

    Robust Watermarking Algorithm for Medical Images Based on Non-Subsampled Shearlet Transform and Schur Decomposition

    Meng Yang1, Jingbing Li1,2,*, Uzair Aslam Bhatti1,2, Chunyan Shao1, Yen-Wei Chen3

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5539-5554, 2023, DOI:10.32604/cmc.2023.036904

    Abstract With the development of digitalization in healthcare, more and more information is delivered and stored in digital form, facilitating people’s lives significantly. In the meanwhile, privacy leakage and security issues come along with it. Zero watermarking can solve this problem well. To protect the security of medical information and improve the algorithm’s robustness, this paper proposes a robust watermarking algorithm for medical images based on Non-Subsampled Shearlet Transform (NSST) and Schur decomposition. Firstly, the low-frequency subband image of the original medical image is obtained by NSST and chunked. Secondly, the Schur decomposition of low-frequency blocks to get stable values, extracting… More >

  • Open Access

    ARTICLE

    TECMH: Transformer-Based Cross-Modal Hashing For Fine-Grained Image-Text Retrieval

    Qiqi Li1, Longfei Ma1, Zheng Jiang1, Mingyong Li1,*, Bo Jin2

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3713-3728, 2023, DOI:10.32604/cmc.2023.037463

    Abstract In recent years, cross-modal hash retrieval has become a popular research field because of its advantages of high efficiency and low storage. Cross-modal retrieval technology can be applied to search engines, cross-modal medical processing, etc. The existing main method is to use a multi-label matching paradigm to finish the retrieval tasks. However, such methods do not use fine-grained information in the multi-modal data, which may lead to sub-optimal results. To avoid cross-modal matching turning into label matching, this paper proposes an end-to-end fine-grained cross-modal hash retrieval method, which can focus more on the fine-grained semantic information of multi-modal data. First,… More >

  • Open Access

    ARTICLE

    ViT2CMH: Vision Transformer Cross-Modal Hashing for Fine-Grained Vision-Text Retrieval

    Mingyong Li, Qiqi Li, Zheng Jiang, Yan Ma*

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1401-1414, 2023, DOI:10.32604/csse.2023.034757

    Abstract In recent years, the development of deep learning has further improved hash retrieval technology. Most of the existing hashing methods currently use Convolutional Neural Networks (CNNs) and Recurrent Neural Networks (RNNs) to process image and text information, respectively. This makes images or texts subject to local constraints, and inherent label matching cannot capture fine-grained information, often leading to suboptimal results. Driven by the development of the transformer model, we propose a framework called ViT2CMH mainly based on the Vision Transformer to handle deep Cross-modal Hashing tasks rather than CNNs or RNNs. Specifically, we use a BERT network to extract text… More >

  • Open Access

    ARTICLE

    Hybrid Grey Wolf and Dipper Throated Optimization in Network Intrusion Detection Systems

    Reem Alkanhel1,*, Doaa Sami Khafaga2, El-Sayed M. El-kenawy3, Abdelaziz A. Abdelhamid4,5, Abdelhameed Ibrahim6, Rashid Amin7, Mostafa Abotaleb8, B. M. El-den6

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2695-2709, 2023, DOI:10.32604/cmc.2023.033153

    Abstract The Internet of Things (IoT) is a modern approach that enables connection with a wide variety of devices remotely. Due to the resource constraints and open nature of IoT nodes, the routing protocol for low power and lossy (RPL) networks may be vulnerable to several routing attacks. That’s why a network intrusion detection system (NIDS) is needed to guard against routing assaults on RPL-based IoT networks. The imbalance between the false and valid attacks in the training set degrades the performance of machine learning employed to detect network attacks. Therefore, we propose in this paper a novel approach to balance… More >

  • Open Access

    ARTICLE

    Cancellable Multi-Biometric Feature Veins Template Generation Based on SHA-3 Hashing

    Salwa M. Serag Eldin1,*, Ahmed Sedik2, Sultan S. Alshamrani3, Ahmed M. Ayoup4

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 733-749, 2023, DOI:10.32604/cmc.2023.030789

    Abstract In this paper, a novel cancellable biometrics technique called Multi-Biometric-Feature-Hashing (MBFH) is proposed. The MBFH strategy is utilized to actualize a single direction (non-invertibility) biometric shape. MBFH is a typical model security conspire that is distinguished in the utilization of this protection insurance framework in numerous sorts of biometric feature strategies (retina, palm print, Hand Dorsum, fingerprint). A more robust and accurate multilingual biological structure in expressing human loneliness requires a different format to record clients with inseparable comparisons from individual biographical sources. This may raise worries about their utilization and security when these spread out designs are subverted as… More >

  • Open Access

    ARTICLE

    A Locality-Sensitive Hashing-Based Jamming Detection System for IoT Networks

    P. Ganeshkumar*, Talal Albalawi

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5943-5959, 2022, DOI:10.32604/cmc.2022.030388

    Abstract

    Internet of things (IoT) comprises many heterogeneous nodes that operate together to accomplish a human friendly or a business task to ease the life. Generally, IoT nodes are connected in wireless media and thus they are prone to jamming attacks. In the present scenario jamming detection (JD) by using machine learning (ML) algorithms grasp the attention of the researchers due to its virtuous outcome. In this research, jamming detection is modelled as a classification problem which uses several features. Using one/two or minimum number of features produces vague results that cannot be explained. Also the relationship between the feature and… More >

  • Open Access

    ARTICLE

    Enhanced Disease Identification Model for Tea Plant Using Deep Learning

    Santhana Krishnan Jayapal1, Sivakumar Poruran2,*

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 1261-1275, 2023, DOI:10.32604/iasc.2023.026564

    Abstract Tea plant cultivation plays a significant role in the Indian economy. The Tea board of India supports tea farmers to increase tea production by preventing various diseases in Tea Plant. Various climatic factors and other parameters cause these diseases. In this paper, the image retrieval model is developed to identify whether the given input tea leaf image has a disease or is healthy. Automation in image retrieval is a hot topic in the industry as it doesn’t require any form of metadata related to the images for storing or retrieval. Deep Hashing with Integrated Autoencoders is our proposed method for… More >

  • Open Access

    ARTICLE

    Novel Block Chain Technique for Data Privacy and Access Anonymity in Smart Healthcare

    J. Priya*, C. Palanisamy

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 243-259, 2023, DOI:10.32604/iasc.2023.025719

    Abstract The Internet of Things (IoT) and Cloud computing are gaining popularity due to their numerous advantages, including the efficient utilization of internet and computing resources. In recent years, many more IoT applications have been extensively used. For instance, Healthcare applications execute computations utilizing the user’s private data stored on cloud servers. However, the main obstacles faced by the extensive acceptance and usage of these emerging technologies are security and privacy. Moreover, many healthcare data management system applications have emerged, offering solutions for distinct circumstances. But still, the existing system has issues with specific security issues, privacy-preserving rate, information loss, etc.… More >

  • Open Access

    ARTICLE

    An Intelligent HealthCare Monitoring Framework for Daily Assistant Living

    Yazeed Yasin Ghadi1, Nida Khalid2, Suliman A. Alsuhibany3, Tamara al Shloul4, Ahmad Jalal2, Jeongmin Park5,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2597-2615, 2022, DOI:10.32604/cmc.2022.024422

    Abstract Human Activity Recognition (HAR) plays an important role in life care and health monitoring since it involves examining various activities of patients at homes, hospitals, or offices. Hence, the proposed system integrates Human-Human Interaction (HHI) and Human-Object Interaction (HOI) recognition to provide in-depth monitoring of the daily routine of patients. We propose a robust system comprising both RGB (red, green, blue) and depth information. In particular, humans in HHI datasets are segmented via connected components analysis and skin detection while the human and object in HOI datasets are segmented via saliency map. To track the movement of humans, we proposed… More >

Displaying 1-10 on page 1 of 22. Per Page  

Share Link