Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (24)
  • Open Access

    ARTICLE

    Cryptanalysis and Improvement of a Chaotic Map-Control-Based and the Plain Image-Related Cryptosystem

    Bin Lu1, Fenlin Liu1, Xin Ge1,*, Zhenyu Li2

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 687-699, 2019, DOI:10.32604/cmc.2019.05633

    Abstract Due to the characteristics of chaotic systems, different cryptosystems based on chaos have been proposed to satisfy the security of multimedia data. A plain image-related chaotic algorithm is proposed by Luo et al. with high speed and efficiency. Security weaknesses of the cryptosystem are studied in this paper. It is found that the important secret key information is leaked because an important parameter can be obtained after an inverse operation in the last step of the cryptosystems without secret key. Meanwhile, the value zero is processed improperly in quantification algorithm. Based on the weaknesses, chosen plaintext attack on the cryptosystem… More >

  • Open Access

    ARTICLE

    Efficient Secure Data Provenance Scheme in Multimedia Outsourcing and Sharing

    Zhen Yang1,2, Yongfeng Huang1,2,*, Xing Li1,2, Wenyu Wang3

    CMC-Computers, Materials & Continua, Vol.56, No.1, pp. 1-17, 2018, DOI: 10.3970/cmc.2018.03697

    Abstract To cope with privacy leakage caused by multimedia outsourcing and sharing, data provenance is used to analyze leaked multimedia and provide reactive accountability. Existing schemes of multimedia provenance are based on watermarking protocols. In an outsourcing scenario, existing schemes face two severe challenges: 1) when data leakage occurs, there exists a probability that data provenance results can be repudiated, in which case data provenance tracking fails; and 2) when outsourced data are shared, data encryption transfer causes key management burden outside the schemes, and privacy leakage threatens users. In this paper, we propose a novel data provenance scheme with an… More >

  • Open Access

    ARTICLE

    A Distributed LRTCO Algorithm in Large-Scale DVE Multimedia Systems

    Hangjun Zhou1,2,*, Guang Sun1, Sha Fu1, Wangdong Jiang1, Tingting Xie3, Danqing Duan1

    CMC-Computers, Materials & Continua, Vol.56, No.1, pp. 73-89, 2018, DOI: 10.3970/cmc.2018.02411

    Abstract In the large-scale Distributed Virtual Environment (DVE) multimedia systems, one of key challenges is to distributedly preserve causal order delivery of messages in real time. Most of the existing causal order control approaches with real-time constraints use vector time as causal control information which is closely coupled with system scales. As the scale expands, each message is attached a large amount of control information that introduces too much network transmission overhead to maintain the real-time causal order delivery. In this article, a novel Lightweight Real-Time Causal Order (LRTCO) algorithm is proposed for large-scale DVE multimedia systems. LRTCO predicts and compares… More >

  • Open Access

    ARTICLE

    Localization Based Evolutionary Routing (LOBER) for Efficient Aggregation in Wireless Multimedia Sensor Networks

    Ashwinth Janarthanan1,*, Dhananjay Kumar1

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 895-912, 2019, DOI:10.32604/cmc.2019.06805

    Abstract Efficient aggregation in wireless sensor nodes helps reduce network traffic and reduce energy consumption. The objective of this work Localization Based Evolutionary Routing (LOBER) is to achieve global optimization for aggregation and WMSN lifetime. Improved localization is achieved by a novel Centroid Based Octant Localization (CBOL) technique considering an arbitrary hexagonal region. Geometric principles of hexagon are used to locate the unknown nodes in the centroid positions of partitioned regions. Flower pollination algorithm, a meta heuristic evolutionary algorithm that is extensively applied in solving real life, complex and nonlinear optimization problems in engineering and industry is modified as Enhanced Flower… More >

Displaying 21-30 on page 3 of 24. Per Page