Filters








14 Hits in 5.5 sec

Memetic Optimization with Cryptographic Encryption for Secure Medical Data Transmission in IoT-based Distributed Systems

Srinath Doss, Jothi Paranthaman, Suseendran Gopalakrishnan, Akila Duraisamy, Souvik Pal, Balaganesh Duraisamy, Chung Le Van, Dac-Nhuong Le
2021 Computers Materials & Continua  
The encrypted information is then inserted into the medical images using Discrete Wavelet Transform 1 level and 2 levels.  ...  In the healthcare system, the Internet of Things (IoT) based distributed systems play a vital role in transferring the medical-related documents and information among the organizations to reduce the replication  ...  On comparing the results between high packet and small packet sizes on Image 1, DWT 2L shows the improvement of 9.51% and DWT 1L with 22.75%.  ... 
doi:10.32604/cmc.2020.012379 fatcat:46jaqsnqljahtlxxjrjcyyvmlq

Internet of Things: IETF protocols, Algorithms and Applications

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
This paper focuses on explaining the concepts of the IETF protocols, password strength evaluation method and Steganography technique by using algorithms.  ...  In this provide privacy and security while transmitting data for health care IOT based applications, because the security is major problem in today's world.  ...  In this performs the both DWT steganography techniques i.e. DWT-1L and DWT-2L. It's run on the frequency realm. In this the image can be split into high and low recitation parts.  ... 
doi:10.35940/ijitee.k2410.0981119 fatcat:4473gmiqbfhd7iq5jjkwvfjhze

Evolutionary Computing Assisted Visually- Imperceptible Hybrid Cryptography and Steganography Model for Secure Data Communication over Cloud Environment

R. Denis, P. Madhubala
2020 International Journal of Computer Networks And Applications  
To perform LSB embedding we applied 2D-Discrete Wavelet Transform (2D-DWT-2L) method with 8×8 dimensional blockwise embedding.  ...  Thus, the VIHCS model achieves maximum possible imperceptibility and hence can avoid attacks-such as steganalysis based attack or RS-attacks.  ...  EndLoop Return Stego-Image End Algorithm 2 2D-DWT-2L Analysis and LSB Embedding Unlike major conventional Hybrid Cryptography and Steganography models where authors have either focused on increasing embedding  ... 
doi:10.22247/ijcna/2020/205321 fatcat:xzvlyfah3raadgvln3gcz4oahe

Signing and Verifying Encrypted Medical Images Using Double Random Phase Encryption

Hanaa A. Abdallah, Dalia H. ElKamchouchi
2022 Entropy  
This technique is used to verify the integrity and originality of images transmitted over insecure channels.  ...  The results are compared to those obtained using an approach that does not employ DWT.  ...  The model used either 2-D discrete wavelet transform 1 level (2D-DWT-1L) or 2-D discrete wavelet transform 2 level (2D-DWT-2L) steganography in addition to the encryption scheme.  ... 
doi:10.3390/e24040538 pmid:35455201 pmcid:PMC9025103 fatcat:svn3lx7myzdmbcfqttdyq7gt4m

Robust additive watermarking in the DTCWT domain based on perceptual masking

Khalil Zebbiche, Fouad Khelifi, Khaled Loukhaoukha
2018 Multimedia tools and applications  
This structure relies on the statistical modeling of high frequency DTCWT coefficients by the Generalized Gaussian distribution.  ...  In this work, we propose to evaluate local brightness of DTCWT sub-bands at a given level based on the magnitude of the low frequency sub-bands of that level.  ...  In this paper, the DWT-based and the DCT-based models are referred to as Cheng (DWT) and Cheng (DCT), respectively. • Kwitt et al.  ... 
doi:10.1007/s11042-017-5451-x fatcat:yfqgromaqzh2zeicvzlpifatve

Watermarking Techniques used in Medical Images: a Survey

Seyed Mojtaba Mousavi, Alireza Naghsh, S. A. R. Abu-Bakar
2014 Journal of digital imaging  
This paper aims to provide a useful survey on watermarking and offer a clear perspective for interested researchers by analyzing the strengths and weaknesses of different existing methods.  ...  Based on this review, DWT-based methods can model the human visual system (HVS) more accurately than DFT and DCT.  ...  Finally, by means of DWT, a second watermark was embedded into the border of RONI. This watermark contained information on the vertices to define ROI and the number of bits in the second watermark.  ... 
doi:10.1007/s10278-014-9700-5 pmid:24871349 pmcid:PMC4391065 fatcat:v2qv6ovu5fcsdggk2exoxxrag4

A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography

Rose Adee, Haralambos Mouratidis
2022 Sensors  
This paper's output is a four-step data security model based on Rivest–Shamir–Adleman, Advanced Encryption Standard, and identity-based encryption algorithms alongside Least Significant Bit steganography  ...  This paper aims to create a data security model based on cryptography and steganography for data in cloud computing that seeks to reduce existing security and privacy concerns, such as data loss, data  ...  The authors used the 2D-Discrete Wavelet Transform (2D-DWT-2L) approach with 8×8-dimensional block-wise embedding to accomplish LSB embedding.  ... 
doi:10.3390/s22031109 pmid:35161853 pmcid:PMC8839104 fatcat:kie3bre67fce3cvjv5gac4jdoq

Securing Copyright Using 3D Objects Blind Watermarking Scheme

Hussein Abulkasim, Mona Jamjoom, Safia Abbas
2022 Computers Materials & Continua  
The technique of blind extraction based on reversing the steps of the data embedding process is used.  ...  The implemented technique uses the features of the 3-D object vertex' discrete cosine transform to embed a grayscale image with high capacity.  ...  Reference [10] proposed a method on blind 3-D mesh watermarking which is based on the wavelet of copyright protection.  ... 
doi:10.32604/cmc.2022.027999 fatcat:eto4fbsumvhjveopddiehy43dy

New paradigms for effective multicasting and fingerprinting of entertainment media

W. Luh, D. Kundur
2005 IEEE Communications Magazine  
(based on DCT [6] and DWT [12] ), the visual quality does not degrade.  ...  Thus, a second level of security (which we call level 2 security) is required.  ... 
doi:10.1109/mcom.2005.1452834 fatcat:xpsd2hl24jhn3o75qljeteyb4e

A robust watermarking algorithm for medical images

Ahmed Nagm, Mohammed Safy
2020 Indonesian Journal of Electrical Engineering and Computer Science  
Moreover, the assessment technique shall include as well the color component changes since the algorithm is based on manipulation based on color components.  ...  In Abhilasha Sharma.2015 [13] , based on DWT and DCT to embed multiple watermarks into the cover image a water marking algorithm is proposed.  ... 
doi:10.11591/ijeecs.v20.i3.pp1601-1612 fatcat:zufvewnpevgbhdzxnflwccp3je

Towards New Multiwavelets: Associated Filters and Algorithms. Part I: Theoretical Framework and Investigation of Biomedical Signals, ECG and Coronavirus Cases [article]

Malika Jallouli, Makerem Zemni, Anouar Ben Mabrouk, Mohamed Ali Mahjoub
2021 arXiv   pre-print
One aim in the present work is to prove that Wavelets may be successful machinery to understand such phenomena by applying a step forward extension of wavelets to multiwavelets.  ...  Some extending results based on the present paper have also the object of another paper [64] , although based on the present one, but has been published before it due to the long process in the publication  ...  of the present one.  ... 
arXiv:2103.08657v1 fatcat:v6ivaaj5kjb2xcvqn4vk2ccqpi

Performance analysis of existing and new methods for data hiding with known-host information in additive channels

F. Perez-Gonzalez, F. Balado, J.R. Hernandez Martin
2003 IEEE Transactions on Signal Processing  
on measuring their probabilities of decoding error in the presence of channel distortions.  ...  For Dithered Modulation (DM) a novel technique that allows to obtain tighter bounds to the probability of error is presented.  ...  The second phase started with the recognition that the data hiding problem was in fact a particular case of communications [3] , clearing the way for using well-known techniques, such as spread-spectrum  ... 
doi:10.1109/tsp.2003.809368 fatcat:lroy3d7jerfc7a6rslxa3242t4

Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+36 others)
2016 unpublished
Comparing with S-box (substitution box) based block cipher, the ARX design concept uses the operations which is based on bit-level instead of word-level operations of S-box based design.  ...  The JPEG compression based on discrete cosine transform (DCT) and the JPEG2000 compression based on discrete wavelet transform (DWT) are transformed domain methods.  ...  Since then many cryptographic schemes have been proposed based on CL-PKC.  ... 
fatcat:xjcy7wc2hzbhzl3bfxwniqvjhy

Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+91 others)
2017 International Journal of Network Security   unpublished
s scheme, such as forward secrecy and the wrong password login problem, and proposed an enhanced user password authentication scheme based on smart card. However, we found weaknesses in their scheme.  ...  In order to satisfy the requirements of a remote user authentication scheme, the smart card has become an essential device, one that is widely used because of its low computational cost and expedient portability  ...  YCSZ2013069), the High Level Innovation Team of Guangxi Colleges and Universities, and the Program for Innovative Research Team of Guilin University of Electronic Technology.  ... 
fatcat:nev5sh4gw5c45hffrl3qmchnzi