期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
A classification-based privacy-preserving decision-making for secure data sharing in Internet of Things assisted applications 被引量:2
1
作者 Alaa Omran Almagrabi a.k.bashir 《Digital Communications and Networks》 SCIE CSCD 2022年第4期436-445,共10页
The introduction of the Internet of Things(IoT)paradigm serves as pervasive resource access and sharing platform for different real-time applications.Decentralized resource availability,access,and allocation provide a... The introduction of the Internet of Things(IoT)paradigm serves as pervasive resource access and sharing platform for different real-time applications.Decentralized resource availability,access,and allocation provide a better quality of user experience regardless of the application type and scenario.However,privacy remains an open issue in this ubiquitous sharing platform due to massive and replicated data availability.In this paper,privacy-preserving decision-making for the data-sharing scheme is introduced.This scheme is responsible for improving the security in data sharing without the impact of replicated resources on communicating users.In this scheme,classification learning is used for identifying replicas and accessing granted resources independently.Based on the trust score of the available resources,this classification is recurrently performed to improve the reliability of information sharing.The user-level decisions for information sharing and access are made using the classification of the resources at the time of availability.This proposed scheme is verified using the metrics access delay,success ratio,computation complexity,and sharing loss. 展开更多
关键词 Classification learning Data mining IoT PRIVACY-PRESERVING Resource replication
在线阅读 下载PDF
Secure Watermarking Scheme for Color DICOM Images in Telemedicine Applications 被引量:1
2
作者 Kamred Udham Singh Hatem Salem Abu-Hamatta +3 位作者 Abhishek Kumar Achintya Singhal Mamoon Rashid a.k.bashir 《Computers, Materials & Continua》 SCIE EI 2022年第2期2525-2542,共18页
Teleradiology plays a vital role in the medical field,which permits transmitting medical and imaging data over a communication network.It ensures data reliability and provides convenient communication for clinical int... Teleradiology plays a vital role in the medical field,which permits transmitting medical and imaging data over a communication network.It ensures data reliability and provides convenient communication for clinical interpretation and diagnostic purposes.The transmission of this medical data over a network raises the problems of legal,ethical issues,privacy,and copyright authenticity.The copyright protection of medical images is a significant issue in the medical field.Watermarking schemes are used to address these issues.A gray-level or binary image is used as a watermark frequently in color image watermarking schemes.In this paper,the authors propose a novel non-blind medical image watermarking scheme based on 2-D LiftingWavelet Transform(LWT),Multiresolution Singular Value Decomposition(MSVD),and LU factorization to improve the robustness and authenticity of medical images.In this scheme,multiple color watermarks are embedded into the colored DICOM(Digital Imaging and Communications inMedicine)images obtained from Color Doppler images(DICOM format),and the average results achieved by our proposed scheme is 46.84 db for Peak Signal-to-Noise Ratio(PSNR),37.46 db for Signal-to-Noise Ratio(SNR),0.99 for Quality of Image and 0.998 for Normalized Correlation for various image processing attacks.These results make our watermarking technique an ideal candidate for medical image watermarking. 展开更多
关键词 Digital imaging MEDICINE MULTIRESOLUTION medical image WATERMARKING
在线阅读 下载PDF
Service-Aware Access Control Procedure for Blockchain Assisted Real-Time Applications 被引量:1
3
作者 Alaa Omran Almagrabi a.k.bashir 《Computers, Materials & Continua》 SCIE EI 2021年第6期3649-3667,共19页
The design of distributed ledger,Asymmetric Key Algorithm(AKA)blockchain systems,is prominent in administering security and access control in various real-time services and applications.The assimilation of blockchain ... The design of distributed ledger,Asymmetric Key Algorithm(AKA)blockchain systems,is prominent in administering security and access control in various real-time services and applications.The assimilation of blockchain systems leverages the reliable access and secure service provisioning of the services.However,the distributed ledger technology’s access control and chained decisions are defaced by pervasive and service unawareness.It results in degrading security through unattended access control for limited-service users.In this article,a service-aware access control procedure(SACP)is introduced to address the afore-mentioned issue.The proposed SACP denes attended access control for all the service session by identifying the users and service provider availability.The distributed nature of the ledger systems and classication tree learning are combined to determine unattended access.The sole access is determined by summarizing the closed and open access requests and the service provider’s availability and integrity checks.In this process,the learning process classies the secured access request and completed the integrity checks of the current and previous service dissemination.This classication-based access administration reduces the service disconnections and false access rate of the applications. 展开更多
关键词 Access control blockchain classication trees service dissemination unattended access
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部