Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (46)
  • Open Access

    ARTICLE

    A Novel Medical Image Encryption Using Rössler System

    K. Sundara Krishnan1,*, Syed Suhaila1, S. P. Raja2

    Intelligent Automation & Soft Computing, Vol.33, No.2, pp. 1081-1101, 2022, DOI:10.32604/iasc.2022.024023

    Abstract The technological advances made possible by the Internet, coupled with the unforeseen critical circumstances set in motion by the Covid-19 pandemic, have greatly increased the generation and transmission of medical images every day. Medical image transmission over an unsecured public network threatens the privacy of sensitive patient information. We have, in this paper, designed a new secure color medical image encryption algorithm based on binary plane decomposition, DNA (deoxyribonucleic acid) computing, and the chaotic Rössler dynamical system. At first, a bit-by-bit swap is performed on twenty four binary planes of the input image and encoded using DNA encoding rules. Thereafter,… More >

  • Open Access

    ARTICLE

    Atmospheric Convection Model Based Digital Confidentiality Scheme

    Noor Munir1, Majid Khan1,*, Mohammad Mazyad Hazzazi2, Amer Aljaedi3, Sajjad Shaukat Jamal2, Iqtadar Hussain4

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4503-4522, 2022, DOI:10.32604/cmc.2022.021077

    Abstract Nonlinear dynamics is a fascinating area that is intensely affecting a wide range of different disciplines of science and technology globally. The combination of different innovative topics of information security and high-speed computing has added new visions into the behavior of complex nonlinear dynamical systems which uncovered amazing results even in the least difficult nonlinear models. The generation of complex actions from a very simple dynamical method has a strong relation with information security. The protection of digital content is one of the inescapable concerns of the digitally advanced world. Today, information plays an important role in everyday life and… More >

  • Open Access

    ARTICLE

    A QR Data Hiding Method Based on Redundant Region and BCH

    Ying Zhou*, Weiwei Luo

    Journal on Big Data, Vol.3, No.3, pp. 127-133, 2021, DOI:10.32604/jbd.2021.019236

    Abstract In recent years, QR code has been widely used in the Internet and mobile devices. It is based on open standards and easy to generate a code, which lead to that anyone can generate their own QR code. Because the QR code does not have the ability of information hiding, any device can access the content in QR code. Thus, hiding the secret data in QR code becomes a hot topic. Previously, the information hiding methods based on QR code all use the way of information hiding based on image, mostly using digital watermarking technology, and not using the coding… More >

  • Open Access

    ARTICLE

    Novel Image Encryption and Compression Scheme for IoT Environment

    Mesfer Al Duhayyim1, Fahd N. Al-Wesabi2, Radwa Marzouk3, Manar Ahmed Hamza4, Anwer Mustafa Hilal4,*, Majdy M. Eltahir2

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1443-1457, 2022, DOI:10.32604/cmc.2022.021873

    Abstract Latest advancements made in the processing abilities of smart devices have resulted in the designing of Intelligent Internet of Things (IoT) environment. This advanced environment enables the nodes to connect, collect, perceive, and examine useful data from its surroundings. Wireless Multimedia Surveillance Networks (WMSNs) form a vital part in IoT-assisted environment since it contains visual sensors that examine the surroundings from a number of overlapping views by capturing the images incessantly. Since IoT devices generate a massive quantity of digital media, it is therefore required to save the media, especially images, in a secure way. In order to achieve security,… More >

  • Open Access

    ARTICLE

    Double Encryption Using Trigonometric Chaotic Map and XOR of an Image

    Orawit Thinnukool1, Thammarat Panityakul2, Mahwish Bano3,*

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3033-3046, 2021, DOI:10.32604/cmc.2021.019153

    Abstract In the most recent decades, a major number of image encryption plans have been proposed. The vast majority of these plans reached a high-security level; however, their moderate speeds because of their complicated processes made them of no use in real-time applications. Inspired by this, we propose another efficient and rapid image encryption plan dependent on the Trigonometric chaotic guide. In contrast to the most of current plans, we utilize this basic map to create just a couple of arbitrary rows and columns. Moreover, to additionally speed up, we raise the processing unit from the pixel level to the row/column… More >

  • Open Access

    ARTICLE

    A Secure Rotation Invariant LBP Feature Computation in Cloud Environment

    Shiqi Wang1, Mingfang Jiang2,*, Jiaohua Qin1, Hengfu Yang2, Zhichen Gao3

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 2979-2993, 2021, DOI:10.32604/cmc.2021.017094

    Abstract In the era of big data, outsourcing massive data to a remote cloud server is a promising approach. Outsourcing storage and computation services can reduce storage costs and computational burdens. However, public cloud storage brings about new privacy and security concerns since the cloud servers can be shared by multiple users. Privacy-preserving feature extraction techniques are an effective solution to this issue. Because the Rotation Invariant Local Binary Pattern (RILBP) has been widely used in various image processing fields, we propose a new privacy-preserving outsourcing computation of RILBP over encrypted images in this paper (called PPRILBP). To protect image content,… More >

  • Open Access

    ARTICLE

    Non-Associative Algebra Redesigning Block Cipher with Color Image Encryption

    Nazli Sanam1,*, Asif Ali1, Tariq Shah1, Ghazanfar Farooq2

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1-21, 2021, DOI:10.32604/cmc.2021.014442

    Abstract The substitution box (S-box) is a fundamentally important component of symmetric key cryptosystem. An S-box is a primary source of non-linearity in modern block ciphers, and it resists the linear attack. Various approaches have been adopted to construct S-boxes. S-boxes are commonly constructed over commutative and associative algebraic structures including Galois fields, unitary commutative rings and cyclic and non-cyclic finite groups. In this paper, first a non-associative ring of order 512 is obtained by using computational techniques, and then by this ring a triplet of 8 × 8 S-boxes is designed. The motivation behind the designing of these S-boxes is… More >

  • Open Access

    ARTICLE

    ALCencryption: A Secure and Efficient Algorithm for Medical Image Encryption

    Jiao Ge1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.125, No.3, pp. 1083-1100, 2020, DOI:10.32604/cmes.2021.013039

    Abstract With the rapid development of medical informatization and the popularization of digital imaging equipment, DICOM images contain the personal privacy of patients, and there are security risks in the process of storage and transmission, so it needs to be encrypted. In order to solve the security problem of medical images on mobile devices, a safe and efficient medical image encryption algorithm called ALCencryption is designed. The algorithm first analyzes the medical image and distinguishes the color image from the gray image. For gray images, the improved Arnold map is used to scramble them according to the optimal number of iterations,… More >

  • Open Access

    ARTICLE

    Image Feature Computation in Encrypted Domain Based on Mean Value

    Xiangshu Ou1, Mingfang Jiang2,*, Shuai Li1, Yao Bai1

    Journal of Cyber Security, Vol.2, No.3, pp. 123-130, 2020, DOI:10.32604/jcs.2020.09703

    Abstract In smart environments, more and more teaching data sources are uploaded to remote cloud centers which promote the development of the smart campus. The outsourcing of massive teaching data can reduce storage burden and computational cost, but causes some privacy concerns because those teaching data (especially personal image data) may contain personal private information. In this paper, a privacy-preserving image feature extraction algorithm is proposed by using mean value features. Clients use block scrambling and chaotic map to encrypt original images before uploading to the remote servers. Cloud servers can directly extract image mean value features from encrypted images. Experiments… More >

  • Open Access

    ARTICLE

    QDCT Encoding-Based Retrieval for Encrypted JPEG Images

    Qiuju Ji1, Peipeng Yu1, Zhihua Xia1, *

    Journal on Big Data, Vol.2, No.1, pp. 33-51, 2020, DOI:10.32604/jbd.2020.01004

    Abstract Aprivacy-preserving search model for JPEG images is proposed in paper, which uses the bag-of-encrypted-words based on QDCT (Quaternion Discrete Cosine Transform) encoding. The JPEG image is obtained by a series of steps such as DCT (Discrete Cosine Transform) transformation, quantization, entropy coding, etc. In this paper, we firstly transform the images from spatial domain into quaternion domain. By analyzing the algebraic relationship between QDCT and DCT, a QDCT quantization table and QDTC coding for color images are proposed. Then the compressed image data is encrypted after the steps of block permutation, intra-block permutation, single table substitution and stream cipher. At… More >

Displaying 31-40 on page 4 of 46. Per Page