期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
Remote Sensing Image Encryption Using Optimal Key Generation-Based Chaotic Encryption
1
作者 Mesfer Al Duhayyim Fatma S.Alrayes +5 位作者 Saud S.Alotaibi Sana Alazwari Nasser Allheeib Ayman Yafoz Raed Alsini Amira Sayed A.Aziz 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3209-3223,共15页
The Internet of Things(IoT)offers a new era of connectivity,which goes beyond laptops and smart connected devices for connected vehicles,smart homes,smart cities,and connected healthcare.The massive quantity of data g... The Internet of Things(IoT)offers a new era of connectivity,which goes beyond laptops and smart connected devices for connected vehicles,smart homes,smart cities,and connected healthcare.The massive quantity of data gathered from numerous IoT devices poses security and privacy concerns for users.With the increasing use of multimedia in communications,the content security of remote-sensing images attracted much attention in academia and industry.Image encryption is important for securing remote sensing images in the IoT environment.Recently,researchers have introduced plenty of algorithms for encrypting images.This study introduces an Improved Sine Cosine Algorithm with Chaotic Encryption based Remote Sensing Image Encryption(ISCACE-RSI)technique in IoT Environment.The proposed model follows a three-stage process,namely pre-processing,encryption,and optimal key generation.The remote sensing images were preprocessed at the initial stage to enhance the image quality.Next,the ISCACERSI technique exploits the double-layer remote sensing image encryption(DLRSIE)algorithm for encrypting the images.The DLRSIE methodology incorporates the design of Chaotic Maps and deoxyribonucleic acid(DNA)Strand Displacement(DNASD)approach.The chaotic map is employed for generating pseudorandom sequences and implementing routine scrambling and diffusion processes on the plaintext images.Then,the study presents three DNASD-related encryption rules based on the variety of DNASD,and those rules are applied for encrypting the images at the DNA sequence level.For an optimal key generation of the DLRSIE technique,the ISCA is applied with an objective function of the maximization of peak signal to noise ratio(PSNR).To examine the performance of the ISCACE-RSI model,a detailed set of simulations were conducted.The comparative study reported the better performance of the ISCACE-RSI model over other existing approaches. 展开更多
关键词 Remote sensing internet of things image encryption SECURITY optimal key generation
在线阅读 下载PDF
Wind Driven Optimization-Based Medical Image Encryption for Blockchain-Enabled Internet of Things Environment
2
作者 C.S.S.Anupama Raed Alsini +4 位作者 N.Supriya E.Laxmi Lydia Seifedine Kadry Sang-Soo Yeo Yongsung Kim 《Computers, Materials & Continua》 SCIE EI 2022年第11期3219-3233,共15页
Internet of Things(IoT)and blockchain receive significant interest owing to their applicability in different application areas such as healthcare,finance,transportation,etc.Medical image security and privacy become a ... Internet of Things(IoT)and blockchain receive significant interest owing to their applicability in different application areas such as healthcare,finance,transportation,etc.Medical image security and privacy become a critical part of the healthcare sector where digital images and related patient details are communicated over the public networks.This paper presents a new wind driven optimization algorithm based medical image encryption(WDOA-MIE)technique for blockchain enabled IoT environments.The WDOA-MIE model involves three major processes namely data collection,image encryption,optimal key generation,and data transmission.Initially,the medical images were captured from the patient using IoT devices.Then,the captured images are encrypted using signcryption technique.In addition,for improving the performance of the signcryption technique,the optimal key generation procedure was applied by WDOA algorithm.The goal of the WDOA-MIE algorithm is to derive a fitness function dependent upon peak signal to noise ratio(PSNR).Upon successful encryption of images,the IoT devices transmit to the closest server for storing it in the blockchain securely.The performance of the presented method was analyzed utilizing the benchmark medical image dataset.The security and the performance analysis determine that the presented technique offers better security with maximum PSNR of 60.7036 dB. 展开更多
关键词 Internet of things image security medical images ENCRYPTION optimal key generation blockchain
在线阅读 下载PDF
Novel Image Encryption and Compression Scheme for IoT Environment
3
作者 Mesfer Al Duhayyim Fahd N.Al-Wesabi +3 位作者 Radwa Marzouk Manar Ahmed Hamza Anwer Mustafa Hilal Majdy M.Eltahir 《Computers, Materials & Continua》 SCIE EI 2022年第4期1443-1457,共15页
Latest advancements made in the processing abilities of smartdevices have resulted in the designing of Intelligent Internet of Things (IoT)environment. This advanced environment enables the nodes to connect, collect, ... Latest advancements made in the processing abilities of smartdevices have resulted in the designing of Intelligent Internet of Things (IoT)environment. This advanced environment enables the nodes to connect, collect, perceive, and examine useful data from its surroundings. Wireless Multimedia Surveillance Networks (WMSNs) form a vital part in IoT-assistedenvironment since it contains visual sensors that examine the surroundingsfrom a number of overlapping views by capturing the images incessantly.Since IoT devices generate a massive quantity of digital media, it is thereforerequired to save the media, especially images, in a secure way. In order toachieve security, encryption techniques as well as compression techniques areemployed to reduce the amount of digital data, being communicated overthe network. Encryption Then Compression (ETC) techniques pave a wayfor secure and compact transmission of the available data to prevent unauthorized access. With this background, the current research paper presentsa new ETC technique to accomplish image security in IoT environment.The proposed model involves three major processes namely, IoT-based imageacquisition, encryption, and compression. The presented model involves optimal Signcryption Technique with Whale Optimization Algorithm (NMWOA)abbreviated as ST-NMWOA. The optimal key generation of signcryptiontechnique takes place with the help of NMWOA. Besides, the presented modelalso uses Discrete Fourier Transform (DFT) and Matrix Minimization (MM)algorithm-based compression technique. Extensive set of experimental analysis was conducted to validate the effective performance of the proposed model.The obtained values infer that the presented model is superior in terms of bothcompression efficiency and data secrecy in resource-limited IoT environment. 展开更多
关键词 Data compression image security ENCRYPTION SIGNCRYPTION optimal key generation
在线阅读 下载PDF
An Effective Signcryption with Optimization Algorithm for IoT-enabled Secure Data Transmission
4
作者 A.Chinnappa C.Vijayakumaran 《Computers, Materials & Continua》 SCIE EI 2022年第11期4017-4031,共15页
Internet of Things(IoT)allows several low resources and controlled devices to interconnect,calculate processes and make decisions in the communication network.In the heterogeneous environment for IoT devices,several c... Internet of Things(IoT)allows several low resources and controlled devices to interconnect,calculate processes and make decisions in the communication network.In the heterogeneous environment for IoT devices,several challenging issues such as energy,storage,efficiency,and security.The design of encryption techniques enables the transmission of the data in the IoT environment in a secured way.The proper selection of optimal keys helps to boost the encryption performance.With this motivation,the study presents a signcryption with quantum chaotic krill herd algorithm for secured data transmission(SCQCKH-SDT)in IoT environment.The proposed SCQCKHSDT technique aims to effectively encrypts the data by the use of optimal keys generated by the CQKH algorithm.The proposed SCQCKH-SDT technique initially employs the signcryption technique for the encryption of data.In order to optimize the secrecy,the optimal key generation process is carried out using Chaotic Krill Herd(CQKH)algorithm.The CQKH algorithm incorporates the concept of quantum computing and chaotic theory into the traditional KH algorithm.The performance validation of the SCQCKH-SDT technique is performed using benchmark dataset.An extensive comparative analysis reported the superior performance of the SCQCKH-SDT technique over the recent approaches. 展开更多
关键词 Security Internet of Things ENCRYPTION optimal key generation metaheuristics
在线阅读 下载PDF
An Identity-Based Secure and Optimal Authentication Scheme for the Cloud Computing Environment
5
作者 K.Raju M.Chinnadurai 《Computers, Materials & Continua》 SCIE EI 2021年第10期1057-1072,共16页
Security is a critical issue in cloud computing(CC)because attackers can fabricate data by creating,copying,or deleting data with no user authorization.Most of the existing techniques make use of password-based authen... Security is a critical issue in cloud computing(CC)because attackers can fabricate data by creating,copying,or deleting data with no user authorization.Most of the existing techniques make use of password-based authentication for encrypting data.Password-based schemes suffer from several issues and can be easily compromised.This paper presents a new concept of hybrid metaheuristic optimization as an identity-based secure and optimal authentication(HMO-ISOA)scheme for CC environments.The HMOISOA technique makes use of iris and fingerprint biometrics.Initially,the HMO-ISOA technique involves a directional local ternary quantized extrema pattern–based feature extraction process to extract features from the iris and fingerprint.Next,the features are fed into the hybrid social spider using the dragon fly algorithm to determine the optimal solution.This optimal solution acts as a key for an advanced encryption standard to encrypt and decrypt the data.A central benefit of determining the optimal value in this way is that the intruder cannot determine this value.The attacker also cannot work out which specific part of the fingerprint and iris feature values are acted upon as a key for the AES technique.Finally,the encrypted data can be saved in the cloud using a cloud simulator.Experimental analysis was performed on five fingerprint and iris images for a man-in-the-middle attack.The simulation outcome validated that the presented HMO-ISOA model achieved better results compared with other existing methods. 展开更多
关键词 Data security AUTHENTICATION identity-based authentication optimal key generation BIOMETRIC
在线阅读 下载PDF
Improved Multileader Optimization with Shadow Encryption for Medical Images in IoT Environment
6
作者 Mesfer Al Duhayyim Mohammed Maray +5 位作者 Ayman Qahmash Fatma S.Alrayes Nuha Alshuqayran Jaber S.Alzahrani Mohammed Alghamdi Abdullah Mohamed 《Computers, Materials & Continua》 SCIE EI 2023年第2期3133-3149,共17页
Nowadays,security plays an important role in Internet of Things(IoT)environment especially in medical services’domains like disease prediction and medical data storage.In healthcare sector,huge volumes of data are ge... Nowadays,security plays an important role in Internet of Things(IoT)environment especially in medical services’domains like disease prediction and medical data storage.In healthcare sector,huge volumes of data are generated on a daily basis,owing to the involvement of advanced health care devices.In general terms,health care images are highly sensitive to alterations due to which any modifications in its content can result in faulty diagnosis.At the same time,it is also significant to maintain the delicate contents of health care images during reconstruction stage.Therefore,an encryption system is required in order to raise the privacy and security of healthcare data by not leaking any sensitive data.The current study introduces Improved Multileader Optimization with Shadow Image Encryption for Medical Image Security(IMLOSIE-MIS)technique for IoT environment.The aim of the proposed IMLOSIE-MIS model is to accomplish security by generating shadows and encrypting them effectively.To do so,the presented IMLOSIE-MIS model initially generates a set of shadows for every input medical image.Besides,shadow image encryption process takes place with the help of Multileader Optimization(MLO)withHomomorphic Encryption(IMLO-HE)technique,where the optimal keys are generated with the help of MLO algorithm.On the receiver side,decryption process is initially carried out and shadow image reconstruction process is conducted.The experimentation analysis was carried out on medical images and the results inferred that the proposed IMLOSIE-MIS model is an excellent performer compared to other models.The comparison study outcomes demonstrate that IMLOSIE-MIS model is robust and offers high security in IoT-enabled healthcare environment. 展开更多
关键词 Medical image security image encryption shadow images homomorphic encryption optimal key generation
在线阅读 下载PDF
Encryption with User Authentication Model for Internet of Medical Things Environment
7
作者 K.S.Riya R.Surendran +1 位作者 Carlos Andrés Tavera Romero M.Sadish Sendil 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期507-520,共14页
Internet of Medical Things(IoMT)enabled e-healthcare has the potential to greately improve conventional healthcare services significantly.However,security and privacy become major issues of IoMT because of the restric... Internet of Medical Things(IoMT)enabled e-healthcare has the potential to greately improve conventional healthcare services significantly.However,security and privacy become major issues of IoMT because of the restricted processing abilities,storage,and energy constraints of the sensors.Therefore,it leads to infeasibility of developing traditional cryptographic solutions to the IoMT sensors.In order to ensure security on sensitive medical data,effective encryption and authentication techniques need to be designed to assure security of the patients and healthcare service providers.In this view,this study designs an effective metaheuristic optimization based encryption with user authentication(EMOE-UA)technique for IoMT environment.This work proposes an EMOE-UA technique aims to accomplish mutual authentication for addressing the security issues and reducing the computational complexity.Moreover,the EMOE-UA technique employs optimal multikey homomorphic encryption(OMKHE)technique to encrypt the IoMT data.Furthermore,the improved social spider optimization algorithm(ISSOA)was employed for the optimal multikey generation of the MKHE technique.The experimental result analysis of the EMOE-UA technique takes place using benchmark data and the results are examined under various aspects.The simulation results reported the considerably better performance of the EMOE-UA technique over the existing techniques. 展开更多
关键词 User authentication SECURITY PRIVACY internet of medical things homomorphic encryption optimal key generation
在线阅读 下载PDF
Cloud data security with deep maxout assisted data sanitization and restoration process
8
作者 Shrikant D.Dhamdhere M.Sivakkumar V.Subramanian 《High-Confidence Computing》 2025年第1期68-81,共14页
The potential of cloud computing,an emerging concept to minimize the costs associated with computing has recently drawn the interest of a number of researchers.The fast advancements in cloud computing techniques led t... The potential of cloud computing,an emerging concept to minimize the costs associated with computing has recently drawn the interest of a number of researchers.The fast advancements in cloud computing techniques led to the amazing arrival of cloud services.But data security is a challenging issue for modern civilization.The main issues with cloud computing are cloud security as well as effective cloud distribution over the network.Increasing the privacy of data with encryption methods is the greatest approach,which has highly progressed in recent times.In this aspect,sanitization is also the process of confidentiality of data.The goal of this work is to present a deep learning-assisted data sanitization procedure for data security.The proposed data sanitization process involves the following steps:data preprocessing,optimal key generation,deep learning-assisted key fine-tuning,and Kronecker product.Here,the data preprocessing considers original data as well as the extracted statistical feature.Key generation is the subsequent process,for which,a self-adaptive Namib beetle optimization(SANBO)algorithm is developed in this research.Among the generated keys,appropriate keys are fine-tuned by the improved Deep Maxout classifier.Then,the Kronecker product is done in the sanitization process.Reversing the sanitization procedure will yield the original data during the data restoration phase.The study part notes that the suggested data sanitization technique guarantees cloud data security against malign attacks.Also,the analysis of proposed work in terms of restoration effectiveness and key sensitivity analysis is also done. 展开更多
关键词 Adopted data sanitization Cloud data security RESTORATION Improved deep maxout Optimal key generation
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部