Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (672)
  • Open Access

    ARTICLE

    Splicing Image and Its Localization: A Survey

    Jinwei Wang1,*, Yangyang Li2

    Journal of Information Hiding and Privacy Protection, Vol.1, No.2, pp. 77-86, 2019, DOI:10.32604/jihpp.2019.07186

    Abstract With the rapid development of information technology, digital images have become an important medium for information transmission. However, manipulating images is becoming a common task with the powerful image editing tools and software, and people can tamper the images content without leaving any visible traces of splicing in order to gain personal goal. Images are easily spliced and distributed, and the situation will be a great threat to social security. The survey covers splicing image and its localization. The present status of splicing image localization approaches is discussed along with a recommendation for future research. More >

  • Open Access

    ARTICLE

    A Survey on Cryptographic Security and Information Hiding Technology for Cloud or Fog-Based IoT System

    Liang Bai1, Yuzhen Liu1, Xiaoliang Wang1,*, Nick Patterson2, F. Jiang2

    Journal of Information Hiding and Privacy Protection, Vol.1, No.1, pp. 1-10, 2019, DOI:10.32604/jihpp.2019.06043

    Abstract Internet of Things (IoT) is an emerging paradigm involving intelligent sensor networks that incorporates embedded technology for collecting data, communicating with external environments. Recently, cloud computing together with fog computing has become an important research area of the Internet of Things because of big data processing capabilities. It is a promising technology that utilizes cloud or fog computing / architecture to improve sensor computing, storage, and communication capabilities. However, recently it has been shown that this computing/architecture may be vulnerable to various attacks because of the openness nature of the wireless network. Therefore, it becomes more and more important to… More >

  • Open Access

    ARTICLE

    An Effective Approach of Secured Medical Image Transmission Using Encryption Method

    Ranu Gupta1,3,*, Rahul Pachauri2,3, Ashutosh Kumar Singh1,4

    Molecular & Cellular Biomechanics, Vol.15, No.2, pp. 63-83, 2018, DOI: 10.3970/mcb.2018.00114

    Abstract Various chaos-based image encryption schemes have been proposed in last few years. The proposed image encryption method uses chaotic map. The encryption is done by using 256 bit long external secret key. The initial condition for the chaotic mapping is evaluated by the use of external secret key along with the mapping function. Besides that, the proposed method is made more robust by applying multiple operations to the pixels of the image depending on the outcome of the calculation of the logistic map. Moreover, block shuffling of the image and modifying the secret key after encryption of each row is… More >

  • Open Access

    ARTICLE

    High Security Identity Tags Using Spiral Resonators

    Anju Pradeep1, S. Mridula1, P. Mohanan2

    CMC-Computers, Materials & Continua, Vol.52, No.3, pp. 187-196, 2016, DOI:10.3970/cmc.2016.052.185

    Abstract A highly compact chipless tag based on Frequency coding technique using Spiral Resonators is proposed in this paper. Spirals are well known metamaterial structures and thus capable of sharp resonance, and hence Spiral Resonators can serve as a good candidate for RF Identity Tags. The bit capacity of the proposed tag is 10 bits per sqcm. The prototype of the tag is fabricated on a low-cost substrate of dielectric constant 4.4 and loss tangent 0.02. The overall dimension of tag is 15.4 x 3 x 1.6 mm3. Two methods for reading the tags are also discussed in this paper. Scope… More >

  • Open Access

    ARTICLE

    Heterogeneous Memristive Models Design and Its Application in Information Security

    Shaojiang Zhong1, *

    CMC-Computers, Materials & Continua, Vol.60, No.2, pp. 465-479, 2019, DOI:10.32604/cmc.2019.05853

    Abstract Based on the three-dimensional classic Chua circuit, a nonlinear circuit containing two flux-control memristors is designed. Due to the difference in the design of the characteristic equation of the two magnetron memristors, their position form a symmetrical structure with respect to the capacitor. The existence of chaotic properties is proved by analyzing the stability of the system, including Lyapunov exponent, equilibrium point, eigenvalue, Poincare map, power spectrum, bifurcation diagram et al. Theoretical analysis and numerical calculation show that this heterogeneous memristive model is a hyperchaotic five-dimensional nonlinear dynamical system and has a strong chaotic behavior. Then, the memristive system is… More >

  • Open Access

    ARTICLE

    A Hybrid Model for Anomalies Detection in AMI System Combining K-means Clustering and Deep Neural Network

    Assia Maamar1,*, Khelifa Benahmed2

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 15-39, 2019, DOI:10.32604/cmc.2019.06497

    Abstract Recently, the radical digital transformation has deeply affected the traditional electricity grid and transformed it into an intelligent network (smart grid). This mutation is based on the progressive development of advanced technologies: advanced metering infrastructure (AMI) and smart meter which play a crucial role in the development of smart grid. AMI technologies have a promising potential in terms of improvement in energy efficiency, better demand management, and reduction in electricity costs. However the possibility of hacking smart meters and electricity theft is still among the most significant challenges facing electricity companies. In this regard, we propose a hybrid approach to… More >

  • Open Access

    ARTICLE

    Developing a New Security Framework for Bluetooth Low Energy Devices

    Qiaoyang Zhang1, Zhiyao Liang1,*, Zhiping Cai2

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 457-471, 2019, DOI:10.32604/cmc.2019.03758

    Abstract Wearable devices are becoming more popular in our daily life. They are usually used to monitor health status, track fitness data, or even do medical tests, etc. Since the wearable devices can obtain a lot of personal data, their security issues are very important. Motivated by the consideration that the current pairing mechanisms of Bluetooth Low Energy (BLE) are commonly impractical or insecure for many BLE based wearable devices nowadays, we design and implement a security framework in order to protect the communication between these devices. The security framework is a supplement to the Bluetooth pairing mechanisms and is compatible… More >

  • Open Access

    ARTICLE

    Security and Privacy Frameworks for Access Control Big Data Systems

    Paolina Centonze1,*

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 361-374, 2019, DOI:10.32604/cmc.2019.06223

    Abstract In the security and privacy fields, Access Control (AC) systems are viewed as the fundamental aspects of networking security mechanisms. Enforcing AC becomes even more challenging when researchers and data analysts have to analyze complex and distributed Big Data (BD) processing cluster frameworks, which are adopted to manage yottabyte of unstructured sensitive data. For instance, Big Data systems’ privacy and security restrictions are most likely to failure due to the malformed AC policy configurations. Furthermore, BD systems were initially developed toped to take care of some of the DB issues to address BD challenges and many of these dealt with… More >

  • Open Access

    ARTICLE

    System Architecture and Key Technologies of Network Security Situation Awareness System YHSAS

    Weihong Han1, Zhihong Tian1,*, Zizhong Huang2, Lin Zhong3, Yan Jia2

    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 167-180, 2019, DOI:10.32604/cmc.2019.05192

    Abstract Network Security Situation Awareness System YHSAS acquires, understands and displays the security factors which cause changes of network situation, and predicts the future development trend of these security factors. YHSAS is developed for national backbone network, large network operators, large enterprises and other large-scale network. This paper describes its architecture and key technologies: Network Security Oriented Total Factor Information Collection and High-Dimensional Vector Space Analysis, Knowledge Representation and Management of Super Large-Scale Network Security, Multi-Level, Multi-Granularity and Multi-Dimensional Network Security Index Construction Method, Multi-Mode and Multi-Granularity Network Security Situation Prediction Technology, and so on. The performance tests show that YHSAS… More >

  • Open Access

    ARTICLE

    Network Security Situation Awareness Framework based on Threat Intelligence

    Hongbin Zhang1, 2, Yuzi Yi1, *, Junshe Wang1, Ning Cao3, *, Qiang Duan4

    CMC-Computers, Materials & Continua, Vol.56, No.3, pp. 381-399, 2018, DOI: 10.3970/cmc.2018.03787

    Abstract Network security situation awareness is an important foundation for network security management, which presents the target system security status by analyzing existing or potential cyber threats in the target system. In network offense and defense, the network security state of the target system will be affected by both offensive and defensive strategies. According to this feature, this paper proposes a network security situation awareness method using stochastic game in cloud computing environment, uses the utility of both sides of the game to quantify the network security situation value. This method analyzes the nodes based on the network security state of… More >

Displaying 641-650 on page 65 of 672. Per Page