Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (32)
  • Open Access

    ARTICLE

    Secure Medical Image Transmission Using Chaotic Encryption and Blockchain-Based Integrity Verification

    Rim Amdouni1,2,*, Mahdi Madani3, Mohamed Ali Hajjaji1,4, El Bay Bourennane3, Mohamed Atri5

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 5527-5553, 2025, DOI:10.32604/cmc.2025.065356 - 30 July 2025

    Abstract Ensuring the integrity and confidentiality of patient medical information is a critical priority in the healthcare sector. In the context of security, this paper proposes a novel encryption algorithm that integrates Blockchain technology, aiming to improve the security and privacy of transmitted data. The proposed encryption algorithm is a block-cipher image encryption scheme based on different chaotic maps: The logistic Map, the Tent Map, and the Henon Map used to generate three encryption keys. The proposed block-cipher system employs the Hilbert curve to perform permutation while a generated chaos-based S-Box is used to perform substitution.… More >

  • Open Access

    RESIDENT’S CORNER

    Urethral carcinoma after skin substitution urethral reconstruction

    Zhan Wu, Mystie Chen, Ryan Mori

    Canadian Journal of Urology, Vol.31, No.2, pp. 11858-11860, 2024

    Abstract Urethral cancer after urethral reconstruction is an under-recognized, uncommon disease associated with significant morbidity and mortality. The survival rates of patients with carcinoma of the bulbar urethra are as low as 20%-30%. Stricture recurrence and unrecognized malignant changes present prior to reconstruction are major risk factors for urethral cancer. Skin substitution urethroplasty is subjected to higher rates of recurrence, which lends to the potential for carcinogenesis. We present a case of a 59-year-old male who underwent multi-stage skin substitution urethroplasty who developed urethral carcinoma 20 years later. More >

  • Open Access

    ARTICLE

    Hybrid Metaheuristic Lion and Firefly Optimization Algorithm with Chaotic Map for Substitution S-Box Design

    Arkan Kh Shakr Sabonchi*

    Journal of Information Hiding and Privacy Protection, Vol.6, pp. 21-45, 2024, DOI:10.32604/jihpp.2024.058954 - 31 December 2024

    Abstract Substitution boxes (S-boxes) are key components of symmetrical cryptosystems, acting as nonlinear substitution functions that hide the relationship between the encrypted text and input key. This confusion mechanism is vital for cryptographic security because it prevents attackers from intercepting the secret key by analyzing the encrypted text. Therefore, the S-box design is essential for the robustness of cryptographic systems, especially for the data encryption standard (DES) and advanced encryption standard (AES). This study focuses on the application of the firefly algorithm (FA) and metaheuristic lion optimization algorithm (LOA), thereby proposing a hybrid approach called the… More >

  • Open Access

    ARTICLE

    High-Secured Image LSB Steganography Using AVL-Tree with Random RGB Channel Substitution

    Murad Njoum1,2,*, Rossilawati Sulaiman1, Zarina Shukur1, Faizan Qamar1

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 183-211, 2024, DOI:10.32604/cmc.2024.050090 - 15 October 2024

    Abstract Random pixel selection is one of the image steganography methods that has achieved significant success in enhancing the robustness of hidden data. This property makes it difficult for steganalysts’ powerful data extraction tools to detect the hidden data and ensures high-quality stego image generation. However, using a seed key to generate non-repeated sequential numbers takes a long time because it requires specific mathematical equations. In addition, these numbers may cluster in certain ranges. The hidden data in these clustered pixels will reduce the image quality, which steganalysis tools can detect. Therefore, this paper proposes a… More >

  • Open Access

    ARTICLE

    Elevating Image Steganography: A Fusion of MSB Matching and LSB Substitution for Enhanced Concealment Capabilities

    Muhammad Zaman Ali1, Omer Riaz1, Hafiz Muhammad Hasnain2, Waqas Sharif2, Tenvir Ali2, Gyu Sang Choi3,*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2923-2943, 2024, DOI:10.32604/cmc.2024.049139 - 15 May 2024

    Abstract In today’s rapidly evolving landscape of communication technologies, ensuring the secure delivery of sensitive data has become an essential priority. To overcome these difficulties, different steganography and data encryption methods have been proposed by researchers to secure communications. Most of the proposed steganography techniques achieve higher embedding capacities without compromising visual imperceptibility using LSB substitution. In this work, we have an approach that utilizes a combination of Most Significant Bit (MSB) matching and Least Significant Bit (LSB) substitution. The proposed algorithm divides confidential messages into pairs of bits and connects them with the MSBs of… More >

  • Open Access

    ARTICLE

    A Novel Accurate Method for Multi-Term Time-Fractional Nonlinear Diffusion Equations in Arbitrary Domains

    Tao Hu1, Cheng Huang2, Sergiy Reutskiy3,*, Jun Lu4, Ji Lin5,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1521-1548, 2024, DOI:10.32604/cmes.2023.030449 - 17 November 2023

    Abstract A novel accurate method is proposed to solve a broad variety of linear and nonlinear (1+1)-dimensional and (2+1)- dimensional multi-term time-fractional partial differential equations with spatial operators of anisotropic diffusivity. For (1+1)-dimensional problems, analytical solutions that satisfy the boundary requirements are derived. Such solutions are numerically calculated using the trigonometric basis approximation for (2+1)-dimensional problems. With the aid of these analytical or numerical approximations, the original problems can be converted into the fractional ordinary differential equations, and solutions to the fractional ordinary differential equations are approximated by modified radial basis functions with time-dependent coefficients. An More >

  • Open Access

    ARTICLE

    Numerical simulation of the effect of gradual substitution of sulfur with selenium or tin with germanium in Cu2ZnSnS4 absorber layer on kesterite solar cell efficiency

    N. Messeia,*, M. S. Aidab, A. Attafa, N. Hamania, S. Laznekc

    Chalcogenide Letters, Vol.20, No.2, pp. 165-175, 2023, DOI:10.15251/CL.2023.202.165

    Abstract To enhance the efficiency of kesterite Cu2ZnSnS4 solar cell, different gradient strategies are investigated. Absorber layer gradient is obtained by partial substitution of sulfur with selenium or tin with germanium. The PV Parameters are calculated using the SCAPS1D program. The effect of the front, back, and double gradient on the cell parameters was investigated. We proposed also the fully graded gap absorber layer profile. The opencircuit voltage has increased to 1.040V, the fill factor has increased to 71.69%, and the efficiency has exceeded 22.95%. In contrast to other types of gradients, the short-circuit current density remains More >

  • Open Access

    ARTICLE

    A Mathematical Approach for Generating a Highly Non-Linear Substitution Box Using Quadratic Fractional Transformation

    Abid Mahboob1, Muhammad Asif2, Rana Muhammad Zulqarnain3,*, Imran Saddique4, Hijaz Ahmad5, Sameh Askar6

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2565-2578, 2023, DOI:10.32604/cmc.2023.040371 - 29 November 2023

    Abstract Nowadays, one of the most important difficulties is the protection and privacy of confidential data. To address these problems, numerous organizations rely on the use of cryptographic techniques to secure data from illegal activities and assaults. Modern cryptographic ciphers use the non-linear component of block cipher to ensure the robust encryption process and lawful decoding of plain data during the decryption phase. For the designing of a secure substitution box (S-box), non-linearity (NL) which is an algebraic property of the S-box has great importance. Consequently, the main focus of cryptographers is to achieve the S-box… More >

  • Open Access

    ARTICLE

    A Wrapping Encryption Based on Double Randomness Mechanism

    Yi-Li Huang1, Fang-Yie Leu1,2,*, Ruey-Kai Sheu1, Jung-Chun Liu1, Chi-Jan Huang2,3

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 1143-1164, 2023, DOI:10.32604/cmc.2023.037161 - 31 October 2023

    Abstract Currently, data security mainly relies on password (PW) or system channel key (SKCH) to encrypt data before they are sent, no matter whether in broadband networks, the 5th generation (5G) mobile communications, satellite communications, and so on. In these environments, a fixed password or channel key (e.g., PW/SKCH) is often adopted to encrypt different data, resulting in security risks since this PW/SKCH may be solved after hackers collect a huge amount of encrypted data. Actually, the most popularly used security mechanism Advanced Encryption Standard (AES) has its own problems, e.g., several rounds have been solved. On the… More >

  • Open Access

    ARTICLE

    Securing Healthcare Data in IoMT Network Using Enhanced Chaos Based Substitution and Diffusion

    Musheer Ahmad1, Reem Ibrahim Alkanhel2,*, Naglaa F. Soliman2, Abeer D. Algarni2, Fathi E. Abd El-Samie3, Walid El-Shafai3,4

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2361-2380, 2023, DOI:10.32604/csse.2023.038439 - 28 July 2023

    Abstract Patient privacy and data protection have been crucial concerns in E-healthcare systems for many years. In modern-day applications, patient data usually holds clinical imagery, records, and other medical details. Lately, the Internet of Medical Things (IoMT), equipped with cloud computing, has come out to be a beneficial paradigm in the healthcare field. However, the openness of networks and systems leads to security threats and illegal access. Therefore, reliable, fast, and robust security methods need to be developed to ensure the safe exchange of healthcare data generated from various image sensing and other IoMT-driven devices in… More >

Displaying 1-10 on page 1 of 32. Per Page