-
81
Reversible Data Hiding in Encrypted Images Based on Edge-Directed Prediction and Multi-MSB Self-Prediction
Published 2025-01-01“…After being losslessly compressed using the Joint Bi-level Image Experts Group (JBIG) algorithm, the location maps are embedded into the encrypted image as auxiliary data, thereby creating ample room for embedding additional data. …”
Get full text
Article -
82
Hybrid Cryptographic End-to-End Encryption Method for Protecting IoT Devices Against MitM Attacks
Published 2024-12-01“…Additionally, through a comparison of RSA, AES, and ChaCha20 algorithms, AES-256 emerges as the optimal encryption choice, demonstrating the fastest encryption and decryption times for publishing 0.2758 ms and 0.1781 ms, respectively and for subscribing, with encryption at 0.2542 ms and decryption at 0.1577 ms. …”
Get full text
Article -
83
Research on Lightweight Dynamic Security Protocol for Intelligent In-Vehicle CAN Bus
Published 2025-05-01“…To address these issues, we propose an improved dynamic compression algorithm that achieves higher compression rates and efficiency by optimizing header information processing during data reorganization. …”
Get full text
Article -
84
Deep convolutional neural network based archimedes optimization algorithm for heart disease prediction based on secured IoT enabled health care monitoring system
Published 2025-07-01“…Finally, the Deep Convolutional Neural Network-based Archimedes Optimization (DCNN-AO) algorithm classifies the normal and abnormal classes of heart disease. …”
Get full text
Article -
85
Symmetric Cryptography With Shift 2<sup>n-1</sup>, Hash Transformation, Optimization-Based Controller for Medical Image Infosecurity: Case Study in Mammographic Image
Published 2020-01-01“…Then, swarm optimization-based controllers, which are based on particle swarm optimization (PSO) and firefly algorithm (FA), are implemented to search the decryption key parameters. …”
Get full text
Article -
86
Constructing resource-efficient quantum circuits for AES
Published 2025-04-01“…An efficient quantum implementation of the advanced encryption standard (AES) is crucial for reducing the complexity of implementing an exhaustive key search through Grover’s algorithm. …”
Get full text
Article -
87
Separable Reversible Data Hiding in Encrypted 3D Mesh Models Based on Spatial Clustering and Multi-MSB Prediction
Published 2025-07-01“…Input model vertices are partitioned into exclusive clusters through spatial clustering, ensuring close proximity within each cluster. An optimal reference vertex search algorithm is then used to identify the best reference vertex in each cluster to maximize embeddable capacity, and multi-MSB prediction determines the embedding length for each embeddable vertex. …”
Get full text
Article -
88
A Secure COVID Affected CT Scan Image Encryption Scheme Using Hybrid MLSCM for IoMT Environment
Published 2025-01-01“…In this study, we presented an encryption system for COVID-19 CT images to address this problem. …”
Get full text
Article -
89
Pseudorandom Number Generator Based on Three Kinds of Four-Wing Memristive Hyperchaotic System and Its Application in Image Encryption
Published 2020-01-01“…In addition, PRNG has passed the NIST 800.22 and ENT test, which shows that PRNG has good statistical characteristics. Finally, an image encryption algorithm based on PRNG is adopted. In the encryption algorithm, the optimized Arnold matrix scrambling method and the diffusion processing based on XOR are used to obtain the final encrypted image. …”
Get full text
Article -
90
A Hybrid Approach to Cloud Data Security Using ChaCha20 and ECDH for Secure Encryption and Key Exchange
Published 2025-03-01“…This research proposes a hybrid encryption model that combines the high-speed ChaCha20 algorithm for data encryption with the Elliptic Curve Diffie-Hellman (ECDH) protocol for secure key exchange. …”
Get full text
Article -
91
Enhancing Security in CPS Industry 5.0 using Lightweight MobileNetV3 with Adaptive Optimization Technique
Published 2025-05-01Get full text
Article -
92
QuantumGS-Box—A Key-Dependent GA and QRNG-Based S-Box for High-Speed Cloud-Based Storage Encryption
Published 2024-12-01“…In this paper, we propose the QuantumGS-box, which is a dynamic S-box for high-speed cloud-based storage encryption generated by bit shuffling with a genetic algorithm and a quantum random number generator (QRNG). …”
Get full text
Article -
93
A deep learning based intrusion detection system for CAN vehicle based on combination of triple attention mechanism and GGO algorithm
Published 2025-06-01“…The current work utilizes a novel Greylag Goose Optimization algorithm for optimal selection of the network hyperparameters. …”
Get full text
Article -
94
Boosting Cyberattack Detection Using Binary Metaheuristics With Deep Learning on Cyber-Physical System Environment
Published 2025-01-01“…Furthermore, the Archimedes Optimization Algorithm (AOA) model is employed to select the optimum hyperparameter for the EESNN model. …”
Get full text
Article -
95
A Secure and Reliable Fog-Enabled Architecture Using Blockchain With Functional Biased Elliptic Curve Cryptography Algorithm for Healthcare Services
Published 2024-12-01“…We propose a Functional Biased Elliptic Curve Cryptography Algorithm (FB-ECC) to encrypt the data. The optimization is performed using Galactic Bee Colony Optimization Algorithm (GBCOA) to enhance the procedure of encryption. …”
Get full text
Article -
96
Distributed and efficient identity authentication based on consortium blockchain
Published 2022-03-01“…The experimental results show that the blockchain-based authentication mechanism and optimized PBFT algorithm improve the reliability of the authentication system and ensure its efficiency.…”
Get full text
Article -
97
Facial Expression Recognition and Digital Images Infosecurity for Prevention Care System Application in Sudden Infant Death Syndrome Monitoring
Published 2025-01-01“…The stochastic gradient descent (SGD) algorithm was employed to optimize the classifier’s model parameters for further enhancing accuracy for the intended purposes. …”
Get full text
Article -
98
Impossible differential distinguisher analysis of GRANULE and MANTRA algorithm
Published 2020-01-01“…The lightweight block cipher algorithms called GRANULE and MANTRA have a simple structure,fast encryption speed,and they can be easy implemented in software and hardware.Two algorithms are especially suitable for resource-constrained environments.To analyze the security of two algorithms,an automatic search method of impossible differential distinguishers was proposed.Based on the structural characteristics of the GRANALE and MANTRA,the S-box differential characteristics were obtained by analyzing the S-box differential distribution table,and then the idea of intermediate encounter was used to traverse from the difference path obtained from the encryption/decryption direction seperately to select the optimal differential path with probability 0.The analysis results show that there are 144 different 7-round impossible differential distinguishers in the GRANULE,and 52 different 9-round impossible differential distinguishers in the MANTRA.Compared with the existing results,the rounds of the proposed distinguisher is currently the highest.…”
Get full text
Article -
99
Full lifecycle security management scheme for terminal keys under power IoT
Published 2025-01-01“…Firstly, the two-stage key distribution architecture based on the state secret algorithm is adopted in the scheme to achieve secure access authentication of power terminals at different stages. …”
Get full text
Article -
100
Using the Genetic Algorithm in Developing a Method for Steganography
Published 2013-12-01“…This paper has developed a method for hiding in images, as it was first encrypt the secret message chaoticlly using the chaotic encryption algorithm and secondly execute the steganography in two phases, the first divide the cover image (.BMP, .PNG) to a group of sections (Blocks) with the diagonal sequence and make hiding using the cell of the least Significant Bit (LSB) within (Bytes) of certain randomly, and then using the Genetic Algorithm (GA) and working at the expense of Peak Signal to Noise Ratio(PSNR) for each section after the steganography and then get the best PSNR value of the optimal section (ie, a better distribution of the random sites). …”
Get full text
Article