The introduction of the Internet of Things(IoT)paradigm serves as pervasive resource access and sharing platform for different real-time applications.Decentralized resource availability,access,and allocation provide a...The introduction of the Internet of Things(IoT)paradigm serves as pervasive resource access and sharing platform for different real-time applications.Decentralized resource availability,access,and allocation provide a better quality of user experience regardless of the application type and scenario.However,privacy remains an open issue in this ubiquitous sharing platform due to massive and replicated data availability.In this paper,privacy-preserving decision-making for the data-sharing scheme is introduced.This scheme is responsible for improving the security in data sharing without the impact of replicated resources on communicating users.In this scheme,classification learning is used for identifying replicas and accessing granted resources independently.Based on the trust score of the available resources,this classification is recurrently performed to improve the reliability of information sharing.The user-level decisions for information sharing and access are made using the classification of the resources at the time of availability.This proposed scheme is verified using the metrics access delay,success ratio,computation complexity,and sharing loss.展开更多
Teleradiology plays a vital role in the medical field,which permits transmitting medical and imaging data over a communication network.It ensures data reliability and provides convenient communication for clinical int...Teleradiology plays a vital role in the medical field,which permits transmitting medical and imaging data over a communication network.It ensures data reliability and provides convenient communication for clinical interpretation and diagnostic purposes.The transmission of this medical data over a network raises the problems of legal,ethical issues,privacy,and copyright authenticity.The copyright protection of medical images is a significant issue in the medical field.Watermarking schemes are used to address these issues.A gray-level or binary image is used as a watermark frequently in color image watermarking schemes.In this paper,the authors propose a novel non-blind medical image watermarking scheme based on 2-D LiftingWavelet Transform(LWT),Multiresolution Singular Value Decomposition(MSVD),and LU factorization to improve the robustness and authenticity of medical images.In this scheme,multiple color watermarks are embedded into the colored DICOM(Digital Imaging and Communications inMedicine)images obtained from Color Doppler images(DICOM format),and the average results achieved by our proposed scheme is 46.84 db for Peak Signal-to-Noise Ratio(PSNR),37.46 db for Signal-to-Noise Ratio(SNR),0.99 for Quality of Image and 0.998 for Normalized Correlation for various image processing attacks.These results make our watermarking technique an ideal candidate for medical image watermarking.展开更多
The design of distributed ledger,Asymmetric Key Algorithm(AKA)blockchain systems,is prominent in administering security and access control in various real-time services and applications.The assimilation of blockchain ...The design of distributed ledger,Asymmetric Key Algorithm(AKA)blockchain systems,is prominent in administering security and access control in various real-time services and applications.The assimilation of blockchain systems leverages the reliable access and secure service provisioning of the services.However,the distributed ledger technology’s access control and chained decisions are defaced by pervasive and service unawareness.It results in degrading security through unattended access control for limited-service users.In this article,a service-aware access control procedure(SACP)is introduced to address the afore-mentioned issue.The proposed SACP denes attended access control for all the service session by identifying the users and service provider availability.The distributed nature of the ledger systems and classication tree learning are combined to determine unattended access.The sole access is determined by summarizing the closed and open access requests and the service provider’s availability and integrity checks.In this process,the learning process classies the secured access request and completed the integrity checks of the current and previous service dissemination.This classication-based access administration reduces the service disconnections and false access rate of the applications.展开更多
基金supported by the Deanship of Scientific Research(DSR),King Abdulaziz University,Jeddah,under grant No.(DF-203-611-1441)。
文摘The introduction of the Internet of Things(IoT)paradigm serves as pervasive resource access and sharing platform for different real-time applications.Decentralized resource availability,access,and allocation provide a better quality of user experience regardless of the application type and scenario.However,privacy remains an open issue in this ubiquitous sharing platform due to massive and replicated data availability.In this paper,privacy-preserving decision-making for the data-sharing scheme is introduced.This scheme is responsible for improving the security in data sharing without the impact of replicated resources on communicating users.In this scheme,classification learning is used for identifying replicas and accessing granted resources independently.Based on the trust score of the available resources,this classification is recurrently performed to improve the reliability of information sharing.The user-level decisions for information sharing and access are made using the classification of the resources at the time of availability.This proposed scheme is verified using the metrics access delay,success ratio,computation complexity,and sharing loss.
文摘Teleradiology plays a vital role in the medical field,which permits transmitting medical and imaging data over a communication network.It ensures data reliability and provides convenient communication for clinical interpretation and diagnostic purposes.The transmission of this medical data over a network raises the problems of legal,ethical issues,privacy,and copyright authenticity.The copyright protection of medical images is a significant issue in the medical field.Watermarking schemes are used to address these issues.A gray-level or binary image is used as a watermark frequently in color image watermarking schemes.In this paper,the authors propose a novel non-blind medical image watermarking scheme based on 2-D LiftingWavelet Transform(LWT),Multiresolution Singular Value Decomposition(MSVD),and LU factorization to improve the robustness and authenticity of medical images.In this scheme,multiple color watermarks are embedded into the colored DICOM(Digital Imaging and Communications inMedicine)images obtained from Color Doppler images(DICOM format),and the average results achieved by our proposed scheme is 46.84 db for Peak Signal-to-Noise Ratio(PSNR),37.46 db for Signal-to-Noise Ratio(SNR),0.99 for Quality of Image and 0.998 for Normalized Correlation for various image processing attacks.These results make our watermarking technique an ideal candidate for medical image watermarking.
基金supported by the Deanship of Scientic Research(DSR),King Abdulaziz University,Jeddah,under Grant No.(DF-444-611-1441)。
文摘The design of distributed ledger,Asymmetric Key Algorithm(AKA)blockchain systems,is prominent in administering security and access control in various real-time services and applications.The assimilation of blockchain systems leverages the reliable access and secure service provisioning of the services.However,the distributed ledger technology’s access control and chained decisions are defaced by pervasive and service unawareness.It results in degrading security through unattended access control for limited-service users.In this article,a service-aware access control procedure(SACP)is introduced to address the afore-mentioned issue.The proposed SACP denes attended access control for all the service session by identifying the users and service provider availability.The distributed nature of the ledger systems and classication tree learning are combined to determine unattended access.The sole access is determined by summarizing the closed and open access requests and the service provider’s availability and integrity checks.In this process,the learning process classies the secured access request and completed the integrity checks of the current and previous service dissemination.This classication-based access administration reduces the service disconnections and false access rate of the applications.