Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (53)
  • Open Access

    ARTICLE

    A QR Data Hiding Method Based on Redundant Region and BCH

    Ying Zhou*, Weiwei Luo

    Journal on Big Data, Vol.3, No.3, pp. 127-133, 2021, DOI:10.32604/jbd.2021.019236 - 22 November 2021

    Abstract In recent years, QR code has been widely used in the Internet and mobile devices. It is based on open standards and easy to generate a code, which lead to that anyone can generate their own QR code. Because the QR code does not have the ability of information hiding, any device can access the content in QR code. Thus, hiding the secret data in QR code becomes a hot topic. Previously, the information hiding methods based on QR code all use the way of information hiding based on image, mostly using digital watermarking technology,… More >

  • Open Access

    ARTICLE

    Double Encryption Using Trigonometric Chaotic Map and XOR of an Image

    Orawit Thinnukool1, Thammarat Panityakul2, Mahwish Bano3,*

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3033-3046, 2021, DOI:10.32604/cmc.2021.019153 - 24 August 2021

    Abstract In the most recent decades, a major number of image encryption plans have been proposed. The vast majority of these plans reached a high-security level; however, their moderate speeds because of their complicated processes made them of no use in real-time applications. Inspired by this, we propose another efficient and rapid image encryption plan dependent on the Trigonometric chaotic guide. In contrast to the most of current plans, we utilize this basic map to create just a couple of arbitrary rows and columns. Moreover, to additionally speed up, we raise the processing unit from the More >

  • Open Access

    ARTICLE

    A Secure Rotation Invariant LBP Feature Computation in Cloud Environment

    Shiqi Wang1, Mingfang Jiang2,*, Jiaohua Qin1, Hengfu Yang2, Zhichen Gao3

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 2979-2993, 2021, DOI:10.32604/cmc.2021.017094 - 06 May 2021

    Abstract In the era of big data, outsourcing massive data to a remote cloud server is a promising approach. Outsourcing storage and computation services can reduce storage costs and computational burdens. However, public cloud storage brings about new privacy and security concerns since the cloud servers can be shared by multiple users. Privacy-preserving feature extraction techniques are an effective solution to this issue. Because the Rotation Invariant Local Binary Pattern (RILBP) has been widely used in various image processing fields, we propose a new privacy-preserving outsourcing computation of RILBP over encrypted images in this paper (called More >

  • Open Access

    ARTICLE

    Non-Associative Algebra Redesigning Block Cipher with Color Image Encryption

    Nazli Sanam1,*, Asif Ali1, Tariq Shah1, Ghazanfar Farooq2

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1-21, 2021, DOI:10.32604/cmc.2021.014442 - 12 January 2021

    Abstract The substitution box (S-box) is a fundamentally important component of symmetric key cryptosystem. An S-box is a primary source of non-linearity in modern block ciphers, and it resists the linear attack. Various approaches have been adopted to construct S-boxes. S-boxes are commonly constructed over commutative and associative algebraic structures including Galois fields, unitary commutative rings and cyclic and non-cyclic finite groups. In this paper, first a non-associative ring of order 512 is obtained by using computational techniques, and then by this ring a triplet of 8 × 8 S-boxes is designed. The motivation behind the… More >

  • Open Access

    ARTICLE

    ALCencryption: A Secure and Efficient Algorithm for Medical Image Encryption

    Jiao Ge1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.125, No.3, pp. 1083-1100, 2020, DOI:10.32604/cmes.2021.013039 - 15 December 2020

    Abstract With the rapid development of medical informatization and the popularization of digital imaging equipment, DICOM images contain the personal privacy of patients, and there are security risks in the process of storage and transmission, so it needs to be encrypted. In order to solve the security problem of medical images on mobile devices, a safe and efficient medical image encryption algorithm called ALCencryption is designed. The algorithm first analyzes the medical image and distinguishes the color image from the gray image. For gray images, the improved Arnold map is used to scramble them according to More >

  • Open Access

    ARTICLE

    Image Feature Computation in Encrypted Domain Based on Mean Value

    Xiangshu Ou1, Mingfang Jiang2,*, Shuai Li1, Yao Bai1

    Journal of Cyber Security, Vol.2, No.3, pp. 123-130, 2020, DOI:10.32604/jcs.2020.09703 - 14 September 2020

    Abstract In smart environments, more and more teaching data sources are uploaded to remote cloud centers which promote the development of the smart campus. The outsourcing of massive teaching data can reduce storage burden and computational cost, but causes some privacy concerns because those teaching data (especially personal image data) may contain personal private information. In this paper, a privacy-preserving image feature extraction algorithm is proposed by using mean value features. Clients use block scrambling and chaotic map to encrypt original images before uploading to the remote servers. Cloud servers can directly extract image mean value More >

  • Open Access

    ARTICLE

    QDCT Encoding-Based Retrieval for Encrypted JPEG Images

    Qiuju Ji1, Peipeng Yu1, Zhihua Xia1, *

    Journal on Big Data, Vol.2, No.1, pp. 33-51, 2020, DOI:10.32604/jbd.2020.01004 - 07 September 2020

    Abstract Aprivacy-preserving search model for JPEG images is proposed in paper, which uses the bag-of-encrypted-words based on QDCT (Quaternion Discrete Cosine Transform) encoding. The JPEG image is obtained by a series of steps such as DCT (Discrete Cosine Transform) transformation, quantization, entropy coding, etc. In this paper, we firstly transform the images from spatial domain into quaternion domain. By analyzing the algebraic relationship between QDCT and DCT, a QDCT quantization table and QDTC coding for color images are proposed. Then the compressed image data is encrypted after the steps of block permutation, intra-block permutation, single table More >

  • Open Access

    ARTICLE

    A Meaningful Image Encryption Algorithm Based on Prediction Error and Wavelet Transform

    Mengling Zou1, Zhengxuan Liu2, Xianyi Chen3, *

    Journal on Big Data, Vol.1, No.3, pp. 151-158, 2019, DOI:10.32604/jbd.2019.09057

    Abstract Image encryption (IE) is a very useful and popular technology to protect the privacy of users. Most algorithms usually encrypt the original image into an image similar to texture or noise, but texture and noise are an obvious visual indication that the image has been encrypted, which is more likely to cause the attacks of enemy. To overcome this shortcoming, many image encryption systems, which convert the original image into a carrier image with visual significance have been proposed. However, the generated cryptographic image still has texture features. In line with the idea of improving More >

  • Open Access

    ARTICLE

    A Block Compressed Sensing for Images Selective Encryption in Cloud

    Xingting Liu1, Jianming Zhang2,*, Xudong Li2, Siwang Zhou1, Siyuan Zhou2, Hye-JinKim3

    Journal of Cyber Security, Vol.1, No.1, pp. 29-41, 2019, DOI:10.32604/jcs.2019.06013

    Abstract The theory of compressed sensing (CS) has been proposed to reduce the processing time and accelerate the scanning process. In this paper, the image recovery task is considered to outsource to the cloud server for its abundant computing and storage resources. However, the cloud server is untrusted then may pose a considerable amount of concern for potential privacy leakage. How to protect data privacy and simultaneously maintain management of the image remains challenging. Motivated by the above challenge, we propose an image encryption algorithm based on chaotic system, CS and image saliency. In our scheme, More >

  • Open Access

    ARTICLE

    Heterogeneous Memristive Models Design and Its Application in Information Security

    Shaojiang Zhong1, *

    CMC-Computers, Materials & Continua, Vol.60, No.2, pp. 465-479, 2019, DOI:10.32604/cmc.2019.05853

    Abstract Based on the three-dimensional classic Chua circuit, a nonlinear circuit containing two flux-control memristors is designed. Due to the difference in the design of the characteristic equation of the two magnetron memristors, their position form a symmetrical structure with respect to the capacitor. The existence of chaotic properties is proved by analyzing the stability of the system, including Lyapunov exponent, equilibrium point, eigenvalue, Poincare map, power spectrum, bifurcation diagram et al. Theoretical analysis and numerical calculation show that this heterogeneous memristive model is a hyperchaotic five-dimensional nonlinear dynamical system and has a strong chaotic behavior. More >

Displaying 41-50 on page 5 of 53. Per Page