A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Memetic Optimization with Cryptographic Encryption for Secure Medical Data Transmission in IoT-based Distributed Systems
2021
Computers Materials & Continua
The encrypted information is then inserted into the medical images using Discrete Wavelet Transform 1 level and 2 levels. ...
In the healthcare system, the Internet of Things (IoT) based distributed systems play a vital role in transferring the medical-related documents and information among the organizations to reduce the replication ...
On comparing the results between high packet and small packet sizes on Image 1, DWT 2L shows the improvement of 9.51% and DWT 1L with 22.75%. ...
doi:10.32604/cmc.2020.012379
fatcat:46jaqsnqljahtlxxjrjcyyvmlq
Internet of Things: IETF protocols, Algorithms and Applications
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
This paper focuses on explaining the concepts of the IETF protocols, password strength evaluation method and Steganography technique by using algorithms. ...
In this provide privacy and security while transmitting data for health care IOT based applications, because the security is major problem in today's world. ...
In this performs the both DWT steganography techniques i.e. DWT-1L and DWT-2L. It's run on the frequency realm. In this the image can be split into high and low recitation parts. ...
doi:10.35940/ijitee.k2410.0981119
fatcat:4473gmiqbfhd7iq5jjkwvfjhze
Evolutionary Computing Assisted Visually- Imperceptible Hybrid Cryptography and Steganography Model for Secure Data Communication over Cloud Environment
2020
International Journal of Computer Networks And Applications
To perform LSB embedding we applied 2D-Discrete Wavelet Transform (2D-DWT-2L) method with 8×8 dimensional blockwise embedding. ...
Thus, the VIHCS model achieves maximum possible imperceptibility and hence can avoid attacks-such as steganalysis based attack or RS-attacks. ...
EndLoop Return Stego-Image End Algorithm 2 2D-DWT-2L Analysis and LSB Embedding Unlike major conventional Hybrid Cryptography and Steganography models where authors have either focused on increasing embedding ...
doi:10.22247/ijcna/2020/205321
fatcat:xzvlyfah3raadgvln3gcz4oahe
Signing and Verifying Encrypted Medical Images Using Double Random Phase Encryption
2022
Entropy
This technique is used to verify the integrity and originality of images transmitted over insecure channels. ...
The results are compared to those obtained using an approach that does not employ DWT. ...
The model used either 2-D discrete wavelet transform 1 level (2D-DWT-1L) or 2-D discrete wavelet transform 2 level (2D-DWT-2L) steganography in addition to the encryption scheme. ...
doi:10.3390/e24040538
pmid:35455201
pmcid:PMC9025103
fatcat:svn3lx7myzdmbcfqttdyq7gt4m
Robust additive watermarking in the DTCWT domain based on perceptual masking
2018
Multimedia tools and applications
This structure relies on the statistical modeling of high frequency DTCWT coefficients by the Generalized Gaussian distribution. ...
In this work, we propose to evaluate local brightness of DTCWT sub-bands at a given level based on the magnitude of the low frequency sub-bands of that level. ...
In this paper, the DWT-based and the DCT-based models are referred to as Cheng (DWT) and Cheng (DCT), respectively. • Kwitt et al. ...
doi:10.1007/s11042-017-5451-x
fatcat:yfqgromaqzh2zeicvzlpifatve
Watermarking Techniques used in Medical Images: a Survey
2014
Journal of digital imaging
This paper aims to provide a useful survey on watermarking and offer a clear perspective for interested researchers by analyzing the strengths and weaknesses of different existing methods. ...
Based on this review, DWT-based methods can model the human visual system (HVS) more accurately than DFT and DCT. ...
Finally, by means of DWT, a second watermark was embedded into the border of RONI. This watermark contained information on the vertices to define ROI and the number of bits in the second watermark. ...
doi:10.1007/s10278-014-9700-5
pmid:24871349
pmcid:PMC4391065
fatcat:v2qv6ovu5fcsdggk2exoxxrag4
A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography
2022
Sensors
This paper's output is a four-step data security model based on Rivest–Shamir–Adleman, Advanced Encryption Standard, and identity-based encryption algorithms alongside Least Significant Bit steganography ...
This paper aims to create a data security model based on cryptography and steganography for data in cloud computing that seeks to reduce existing security and privacy concerns, such as data loss, data ...
The authors used the 2D-Discrete Wavelet Transform (2D-DWT-2L) approach with 8×8-dimensional block-wise embedding to accomplish LSB embedding. ...
doi:10.3390/s22031109
pmid:35161853
pmcid:PMC8839104
fatcat:kie3bre67fce3cvjv5gac4jdoq
Securing Copyright Using 3D Objects Blind Watermarking Scheme
2022
Computers Materials & Continua
The technique of blind extraction based on reversing the steps of the data embedding process is used. ...
The implemented technique uses the features of the 3-D object vertex' discrete cosine transform to embed a grayscale image with high capacity. ...
Reference [10] proposed a method on blind 3-D mesh watermarking which is based on the wavelet of copyright protection. ...
doi:10.32604/cmc.2022.027999
fatcat:eto4fbsumvhjveopddiehy43dy
New paradigms for effective multicasting and fingerprinting of entertainment media
2005
IEEE Communications Magazine
(based on DCT [6] and DWT [12] ), the visual quality does not degrade. ...
Thus, a second level of security (which we call level 2 security) is required. ...
doi:10.1109/mcom.2005.1452834
fatcat:xpsd2hl24jhn3o75qljeteyb4e
A robust watermarking algorithm for medical images
2020
Indonesian Journal of Electrical Engineering and Computer Science
Moreover, the assessment technique shall include as well the color component changes since the algorithm is based on manipulation based on color components. ...
In Abhilasha Sharma.2015 [13] , based on DWT and DCT to embed multiple watermarks into the cover image a water marking algorithm is proposed. ...
doi:10.11591/ijeecs.v20.i3.pp1601-1612
fatcat:zufvewnpevgbhdzxnflwccp3je
Towards New Multiwavelets: Associated Filters and Algorithms. Part I: Theoretical Framework and Investigation of Biomedical Signals, ECG and Coronavirus Cases
[article]
2021
arXiv
pre-print
One aim in the present work is to prove that Wavelets may be successful machinery to understand such phenomena by applying a step forward extension of wavelets to multiwavelets. ...
Some extending results based on the present paper have also the object of another paper [64] , although based on the present one, but has been published before it due to the long process in the publication ...
of the present one. ...
arXiv:2103.08657v1
fatcat:v6ivaaj5kjb2xcvqn4vk2ccqpi
Performance analysis of existing and new methods for data hiding with known-host information in additive channels
2003
IEEE Transactions on Signal Processing
on measuring their probabilities of decoding error in the presence of channel distortions. ...
For Dithered Modulation (DM) a novel technique that allows to obtain tighter bounds to the probability of error is presented. ...
The second phase started with the recognition that the data hiding problem was in fact a particular case of communications [3] , clearing the way for using well-known techniques, such as spread-spectrum ...
doi:10.1109/tsp.2003.809368
fatcat:lroy3d7jerfc7a6rslxa3242t4
Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet
2016
unpublished
Comparing with S-box (substitution box) based block cipher, the ARX design concept uses the operations which is based on bit-level instead of word-level operations of S-box based design. ...
The JPEG compression based on discrete cosine transform (DCT) and the JPEG2000 compression based on discrete wavelet transform (DWT) are transformed domain methods. ...
Since then many cryptographic schemes have been proposed based on CL-PKC. ...
fatcat:xjcy7wc2hzbhzl3bfxwniqvjhy
Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet
2017
International Journal of Network Security
unpublished
s scheme, such as forward secrecy and the wrong password login problem, and proposed an enhanced user password authentication scheme based on smart card. However, we found weaknesses in their scheme. ...
In order to satisfy the requirements of a remote user authentication scheme, the smart card has become an essential device, one that is widely used because of its low computational cost and expedient portability ...
YCSZ2013069), the High Level Innovation Team of Guangxi Colleges and Universities, and the Program for Innovative Research Team of Guilin University of Electronic Technology. ...
fatcat:nev5sh4gw5c45hffrl3qmchnzi