Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (140)
  • Open Access

    ARTICLE

    Robust Reversible Audio Watermarking Scheme for Telemedicine and Privacy Protection

    Xiaorui Zhang1,2,*, Xun Sun1, Xingming Sun1, Wei Sun3, Sunil Kumar Jha4

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3035-3050, 2022, DOI:10.32604/cmc.2022.022304

    Abstract The leakage of medical audio data in telemedicine seriously violates the privacy of patients. In order to avoid the leakage of patient information in telemedicine, a two-stage reversible robust audio watermarking algorithm is proposed to protect medical audio data. The scheme decomposes the medical audio into two independent embedding domains, embeds the robust watermark and the reversible watermark into the two domains respectively. In order to ensure the audio quality, the Hurst exponent is used to find a suitable position for watermark embedding. Due to the independence of the two embedding domains, the embedding of the second-stage reversible watermark will… More >

  • Open Access

    ARTICLE

    A Zero-Watermark Scheme Based on Quaternion Generalized Fourier Descriptor for Multiple Images

    Baowei Wang1,2,3,*, Weishen Wang1, Peng Zhao1, Naixue Xiong4

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2633-2652, 2022, DOI:10.32604/cmc.2022.022291

    Abstract Most of the existing zero-watermark schemes for medical images are only appropriate for a single grayscale image. When they protect a large number of medical images, repeating operations will cause a significant amount of time and storage costs. Hence, this paper proposes an efficient zero-watermark scheme for multiple color medical images based on quaternion generalized Fourier descriptor (QGFD). Firstly, QGFD is utilized to compute the feature invariants of each color image, then the representative features of each image are selected, stacked, and reshaped to generate a feature matrix, which is then binarized to get a binary feature image. Copyright information… More >

  • Open Access

    ARTICLE

    PLC Protection System Based on Verification Separation

    Xiaojun Pan1, Haiying Li2, Xiaoyi Li1, Li Xu1, Yanbin Sun1,*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2401-2417, 2022, DOI:10.32604/cmc.2022.021020

    Abstract Supervisory control and data acquisition systems (SCADAs) play an important role in supervising and controlling industrial production with the help of programmable logic controllers (PLCs) in industrial control systems (ICSs). A PLC receives the control information or program from a SCADA to control the production equipment and feeds the production data back to the SCADA. Once a SCADA is controlled by an attacker, it may threaten the safety of industrial production. The lack of security protection, such as identity authentication and encryption for industrial control protocols, increases the potential security risks. In this paper, we propose a PLC protection system… More >

  • Open Access

    ARTICLE

    A Robust 3-D Medical Watermarking Based on Wavelet Transform for Data Protection

    Xiaorui Zhang1,3,*, Wenfang Zhang1, Wei Sun2, Xingming Sun1, Sunil Kumar Jha4

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1043-1056, 2022, DOI:10.32604/csse.2022.022305

    Abstract In a telemedicine diagnosis system, the emergence of 3D imaging enables doctors to make clearer judgments, and its accuracy also directly affects doctors’ diagnosis of the disease. In order to ensure the safe transmission and storage of medical data, a 3D medical watermarking algorithm based on wavelet transform is proposed in this paper. The proposed algorithm employs the principal component analysis (PCA) transform to reduce the data dimension, which can minimize the error between the extracted components and the original data in the mean square sense. Especially, this algorithm helps to create a bacterial foraging model based on particle swarm… More >

  • Open Access

    ARTICLE

    A Novel Post-Quantum Blind Signature for Log System in Blockchain

    Gang Xu1,2, Yibo Cao1, Shiyuan Xu1, Ke Xiao1, Xin Liu3, Xiubo Chen4,*, Mianxiong Dong5

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 945-958, 2022, DOI:10.32604/csse.2022.022100

    Abstract In recent decades, log system management has been widely studied for data security management. System abnormalities or illegal operations can be found in time by analyzing the log and provide evidence for intrusions. In order to ensure the integrity of the log in the current system, many researchers have designed it based on blockchain. However, the emerging blockchain is facing significant security challenges with the increment of quantum computers. An attacker equipped with a quantum computer can extract the user's private key from the public key to generate a forged signature, destroy the structure of the blockchain, and threaten the… More >

  • Open Access

    ARTICLE

    DDoS Detection in SDN using Machine Learning Techniques

    Muhammad Waqas Nadeem, Hock Guan Goh*, Vasaki Ponnusamy, Yichiet Aun

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 771-789, 2022, DOI:10.32604/cmc.2022.021669

    Abstract Software-defined network (SDN) becomes a new revolutionary paradigm in networks because it provides more control and network operation over a network infrastructure. The SDN controller is considered as the operating system of the SDN based network infrastructure, and it is responsible for executing the different network applications and maintaining the network services and functionalities. Despite all its tremendous capabilities, the SDN face many security issues due to the complexity of the SDN architecture. Distributed denial of services (DDoS) is a common attack on SDN due to its centralized architecture, especially at the control layer of the SDN that has a… More >

  • Open Access

    ARTICLE

    Foliar Application of Cytokinin Modulates Gas Exchange Features, Water Relation and Biochemical Responses to Improve Growth Performance of Maize under Drought Stress

    M. Rafiqul Islam1,*, M. Shahinur Islam1, Nurunnaher Akter1, Mohammed Mohi-Ud-Din2, Mohammad Golam Mostofa3,4,*

    Phyton-International Journal of Experimental Botany, Vol.91, No.3, pp. 633-649, 2022, DOI:10.32604/phyton.2022.018074

    Abstract Improvement of plant performance under drought stress is crucial to sustaining agricultural productivity. The current study investigated the ameliorative effects of foliar-applied kinetin, an adenine-type cytokinin (CK), on growth and gas exchange parameters, water relations and biochemical attributes of maize plants under drought stress. Eighteen-day-old maize plants were subjected to drought by maintaining soil moisture content at 25% field capacity for 8 days followed by foliar application of kinetin at 0, 75, 150 and 225 mg L−1 (CK0, CK75, CK150 and CK225, respectively) to the plants for two-times at the 9-day interval. Results revealed that drought stress markedly reduced stem diameter,… More >

  • Open Access

    ARTICLE

    The neuroprotection of electro-acupuncture via the PGC-1α/TFAM pathway in transient focal cerebral ischemia rats

    LUPING YANG1,#, YIJING JIANG2,#, XIAOQIAN YE3,#, YONGMEI YOU2, LING LIN2, JING LIAN2, JUAN LI1, SHANLI YANG2, XIEHUA XUE2

    BIOCELL, Vol.46, No.1, pp. 235-245, 2022, DOI:10.32604/biocell.2022.014997

    Abstract ATP depletion is one of the pathological bases in cerebral ischemia. Electro-acupuncture (EA) is widely used in clinical practice for ischemia. However, the mechanism of EA remains unclear. The purpose of this study was to investigate whether EA could activate the AMPK/PGC-1α/TFAM signaling pathway and, consequently, increase the preservation of ATP in rats with ischemia. In this study, 48 rats were randomly divided into four groups as a sham-operation control group (sham group), a middle cerebral artery occlusion group (MCAO group), an EA group, and an EA group blocked by the AMPK inhibitor compound C (EA + CC group) (N… More >

  • Open Access

    ARTICLE

    A Novel Database Watermarking Technique Using Blockchain as Trusted Third Party

    Ahmed S. Alghamdi1, Surayya Naz2, Ammar Saeed3, Eesa Al Solami1, Muhammad Kamran1,*, Mohammed Saeed Alkatheiri1

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1585-1601, 2022, DOI:10.32604/cmc.2022.019936

    Abstract With widespread use of relational database in various real-life applications, maintaining integrity and providing copyright protection is gaining keen interest of the researchers. For this purpose, watermarking has been used for quite a long time. Watermarking requires the role of trusted third party and a mechanism to extract digital signatures (watermark) to prove the ownership of the data under dispute. This is often inefficient as lots of processing is required. Moreover, certain malicious attacks, like additive attacks, can give rise to a situation when more than one parties can claim the ownership of the same data by inserting and detecting… More >

  • Open Access

    ARTICLE

    Multi-Factor Authentication for Secured Financial Transactions in Cloud Environment

    D. Prabakaran1,*, Shyamala Ramachandran2

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1781-1798, 2022, DOI:10.32604/cmc.2022.019591

    Abstract The rise of the digital economy and the comfort of accessing by way of user mobile devices expedite human endeavors in financial transactions over the Virtual Private Network (VPN) backbone. This prominent application of VPN evades the hurdles involved in physical money exchange. The VPN acts as a gateway for the authorized user in accessing the banking server to provide mutual authentication between the user and the server. The security in the cloud authentication server remains vulnerable to the results of threat in JP Morgan Data breach in 2014, Capital One Data Breach in 2019, and many more cloud server… More >

Displaying 71-80 on page 8 of 140. Per Page