Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (15)
  • Open Access

    ARTICLE

    An Efficient Sleep Spindle Detection Algorithm Based on MP and LSBoost

    Fei Wang1,2, Li Li1, Yinxing Wan1, Zhuorong Li1, Lixian Luo3, Bangshun Hu1, Jiahui Pan1,2, Zhenfu Wen4, Haiyun Huang1,2,*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2301-2316, 2023, DOI:10.32604/cmc.2023.037727

    Abstract Sleep spindles are an electroencephalogram (EEG) biomarker of non-rapid eye movement (NREM) sleep and have important implications for clinical diagnosis and prognosis. However, it is challenging to accurately detect sleep spindles due to the complexity of the human brain and the uncertainty of neural mechanisms. To improve the reliability and objectivity of sleep spindle detection and to compensate for the limitations of manual annotation, this study proposes a new automatic detection algorithm based on Matching Pursuit (MP) and Least Squares Boosting (LSBoost), where the automatic sleep spindle detection algorithm can help reduce the visual annotation workload of sleep clinicians. Specifically,… More >

  • Open Access

    ARTICLE

    Comparative Analysis of Execution of CNN-Based Sanguine Data Transmission with LSB-SS and PVD-SS

    Alaknanda S. Patil1,*, G. Sundari1, Arun Kumar Sivaraman2

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1707-1721, 2023, DOI:10.32604/csse.2023.034270

    Abstract The intact data transmission to the authentic user is becoming crucial at every moment in the current era. Steganography; is a technique for concealing the hidden message in any cover media such as image, video; and audio to increase the protection of data. The resilience and imperceptibility are improved by choosing an appropriate embedding position. This paper gives a novel system to immerse the secret information in different videos with different methods. An audio and video steganography with novel amalgamations are implemented to immerse the confidential auditory information and the authentic user’s face image. A hidden message is first included… More >

  • Open Access

    ARTICLE

    Proposed Privacy Preservation Technique for Color Medical Images

    Walid El-Shafai1,2, Hayam A. Abd El-Hameed3, Noha A. El-Hag4, Ashraf A. M. Khalaf3, Naglaa F. Soliman5, Hussah Nasser AlEisa6,*, Fathi E. Abd El-Samie1

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 719-732, 2023, DOI:10.32604/iasc.2023.031079

    Abstract Nowadays, the security of images or information is very important. This paper introduces a proposed hybrid watermarking and encryption technique for increasing medical image security. First, the secret medical image is encrypted using Advanced Encryption Standard (AES) algorithm. Then, the secret report of the patient is embedded into the encrypted secret medical image with the Least Significant Bit (LSB) watermarking algorithm. After that, the encrypted secret medical image with the secret report is concealed in a cover medical image, using Kekre’s Median Codebook Generation (KMCG) algorithm. Afterwards, the stego-image obtained is split into 16 parts. Finally, it is sent to… More >

  • Open Access

    ARTICLE

    A Robust Data Hiding Reversible Technique for Improving the Security in e-Health Care System

    Saima Kanwal1, Feng Tao1,*, Ahmad Almogren2, Ateeq Ur Rehman3, Rizwan Taj1, Ayman Radwan4

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.1, pp. 201-219, 2023, DOI:10.32604/cmes.2022.020255

    Abstract The authenticity and integrity of healthcare is the primary objective. Numerous reversible watermarking schemes have been developed to improve the primary objective but increasing the quantity of embedding data leads to covering image distortion and visual quality resulting in data security detection. A trade-off between robustness, imperceptibility, and embedded capacity is difficult to achieve with current algorithms due to limitations in their ability. Keeping this purpose insight, an improved reversibility watermarking methodology is proposed to maximize data embedding capacity and imperceptibility while maintaining data security as a primary concern. A key is generated by a random path with minimum bit… More >

  • Open Access

    ARTICLE

    High Efficiency Crypto-Watermarking System Based on Clifford-Multiwavelet for 3D Meshes Security

    Wajdi Elhamzi1,2,*, Malika Jallouli3, Yassine Bouteraa1,4

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 4329-4347, 2022, DOI:10.32604/cmc.2022.030954

    Abstract Since 3D mesh security has become intellectual property, 3D watermarking algorithms have continued to appear to secure 3D meshes shared by remote users and saved in distant multimedia databases. The novelty of our approach is that it uses a new Clifford-multiwavelet transform to insert copyright data in a multiresolution domain, allowing us to greatly expand the size of the watermark. After that, our method does two rounds of insertion, each applying a different type of Clifford-wavelet transform. Before being placed into the Clifford-multiwavelet coefficients, the watermark, which is a mixture of the mesh description, source mesh signature (produced using SHA512),… More >

  • Open Access

    ARTICLE

    Pixel Based Steganography for Secure Information Hiding

    N. Shyla*, K. Kalimuthu

    Journal of Information Hiding and Privacy Protection, Vol.3, No.3, pp. 143-149, 2021, DOI:10.32604/jihpp.2021.026760

    Abstract The term “steganography” is derived from the Greek words steganos, which means “verified, concealed, or guaranteed”, and graphein, which means “writing”. The primary motivation for considering steganography is to prevent unapproved individuals from obtaining disguised data. With the ultimate goal of comprehending the fundamental inspiration driving the steganography procedures, there should be no significant change in the example report. The Least Significant Bit (LSB) system, which is one of the methodologies for concealing propelled picture data, is examined in this assessment. In this evaluation, another procedure for data stowing indefinitely is proposed with the ultimate goal of limiting the progressions… More >

  • Open Access

    ARTICLE

    Reversible Watermarking Method with Low Distortion for the Secure Transmission of Medical Images

    Rizwan Taj1, Feng Tao1,*, Shahzada Khurram2, Ateeq Ur Rehman3, Syed Kamran Haider4, Akber Abid Gardezi5, Saima Kanwal1

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.3, pp. 1309-1324, 2022, DOI:10.32604/cmes.2022.017650

    Abstract In telemedicine, the realization of reversible watermarking through information security is an emerging research field. However, adding watermarks hinders the distribution of pixels in the cover image because it creates distortions (which lead to an increase in the detection probability). In this article, we introduce a reversible watermarking method that can transmit medical images with minimal distortion and high security. The proposed method selects two adjacent gray pixels whose least significant bit (LSB) is different from the relevant message bit and then calculates the distortion degree. We use the LSB pairing method to embed the secret matrix of patient record into… More >

  • Open Access

    ARTICLE

    Scrambling Based Riffle Shift on Stego-Image to Channelize the Ensured Data

    R. Bala Krishnan1, M. M. Anishin Raj2, N. Rajesh Kumar1, B. Karthikeyan3, G. Manikandan3,*, N. R. Raajan4

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 221-235, 2022, DOI:10.32604/iasc.2022.021775

    Abstract In recent years information hiding has got much attention as it acts as an alternate option for secured communication. The Secret content would get imbedded with the image using various possible image embodiment techniques, in which the Least Significant Bit (LSB) substitution is one of the preferred content embodiment strategy; however, asserting the quality and the originality of the content embedded image (stego) is yet a grievous concern in the field of Information Security. In this article, a proficient Scrambling Based Haar Wavelet Transform (SBHWT) approach has been sought to ensure the novelty of the stego-image that supports the safe… More >

  • Open Access

    ARTICLE

    Novel Ransomware Hiding Model Using HEVC Steganography Approach

    Iman Almomani1,2,*, Aala AlKhayer1, Walid El-Shafai1,3

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1209-1228, 2022, DOI:10.32604/cmc.2022.018631

    Abstract Ransomware is considered one of the most threatening cyberattacks. Existing solutions have focused mainly on discriminating ransomware by analyzing the apps themselves, but they have overlooked possible ways of hiding ransomware apps and making them difficult to be detected and then analyzed. Therefore, this paper proposes a novel ransomware hiding model by utilizing a block-based High-Efficiency Video Coding (HEVC) steganography approach. The main idea of the proposed steganography approach is the division of the secret ransomware data and cover HEVC frames into different blocks. After that, the Least Significant Bit (LSB) based Hamming Distance (HD) calculation is performed amongst the… More >

  • Open Access

    ARTICLE

    Local Features-Based Watermarking for Image Security in Social Media

    Shady Y. El-mashad1, Amani M. Yassen1, Abdulwahab K. Alsammak1, Basem M. Elhalawany2,*

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3857-3870, 2021, DOI:10.32604/cmc.2021.018660

    Abstract The last decade shows an explosion of using social media, which raises several challenges related to the security of personal files including images. These challenges include modifying, illegal copying, identity fraud, copyright protection and ownership of images. Traditional digital watermarking techniques embed digital information inside another digital information without affecting the visual quality for security purposes. In this paper, we propose a hybrid digital watermarking and image processing approach to improve the image security level. Specifically, variants of the widely used Least-Significant Bit (LSB) watermarking technique are merged with a blob detection algorithm to embed information into the boundary pixels… More >

Displaying 1-10 on page 1 of 15. Per Page