Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (9)
  • Open Access

    REVIEW

    Robust Deep Image Watermarking: A Survey

    Yuanjing Luo, Xichen Tan, Zhiping Cai*

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 133-160, 2024, DOI:10.32604/cmc.2024.055150 - 15 October 2024

    Abstract In the era of internet proliferation, safeguarding digital media copyright and integrity, especially for images, is imperative. Digital watermarking stands out as a pivotal solution for image security. With the advent of deep learning, watermarking has seen significant advancements. Our review focuses on the innovative deep watermarking approaches that employ neural networks to identify robust embedding spaces, resilient to various attacks. These methods, characterized by a streamlined encoder-decoder architecture, have shown enhanced performance through the incorporation of novel training modules. This article offers an in-depth analysis of deep watermarking’s core technologies, current status, and prospective More >

  • Open Access

    REVIEW

    A Review on Security and Privacy Issues Pertaining to Cyber-Physical Systems in the Industry 5.0 Era

    Abdullah Alabdulatif1, Navod Neranjan Thilakarathne2,*, Zaharaddeen Karami Lawal3,4,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3917-3943, 2024, DOI:10.32604/cmc.2024.054150 - 12 September 2024

    Abstract The advent of Industry 5.0 marks a transformative era where Cyber-Physical Systems (CPSs) seamlessly integrate physical processes with advanced digital technologies. However, as industries become increasingly interconnected and reliant on smart digital technologies, the intersection of physical and cyber domains introduces novel security considerations, endangering the entire industrial ecosystem. The transition towards a more cooperative setting, including humans and machines in Industry 5.0, together with the growing intricacy and interconnection of CPSs, presents distinct and diverse security and privacy challenges. In this regard, this study provides a comprehensive review of security and privacy concerns pertaining… More >

  • Open Access

    ARTICLE

    Detecting Phishing Using a Multi-Layered Social Engineering Framework

    Kofi Sarpong Adu-Manu*, Richard Kwasi Ahiable

    Journal of Cyber Security, Vol.5, pp. 13-32, 2023, DOI:10.32604/jcs.2023.043359 - 19 October 2023

    Abstract As businesses develop and expand with a significant volume of data, data protection and privacy become increasingly important. Research has shown a tremendous increase in phishing activities during and after COVID-19. This research aimed to improve the existing approaches to detecting phishing activities on the internet. We designed a multi-layered phish detection algorithm to detect and prevent phishing applications on the internet using URLs. In the algorithm, we considered technical dimensions of phishing attack prevention and mitigation on the internet. In our approach, we merge, Phishtank, Blacklist, Blocklist, and Whitelist to form our framework. A More >

  • Open Access

    ARTICLE

    An Enhanced Security System Using Blockchain Technology for Strong FMC Relationship

    K. Meenakshi*, K. Sashi Rekha

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 111-128, 2023, DOI:10.32604/iasc.2023.025032 - 06 June 2022

    Abstract Blockchain technology is a shared database of logs of all consumer transactions which are registered on all machines on a network. Both transactions in the system are carried out by consensus processes and to preserve confidentiality all the files contained cannot be changed. Blockchain technology is the fundamental software behind digital currencies like Bitcoin, which is common in the marketplace. Cloud computing is a method of using a network of external machines to store, monitor, and process information, rather than using the local computer or a local personal computer. The software is currently facing multiple… More >

  • Open Access

    ARTICLE

    A Steganography Model Data Protection Method Based on Scrambling Encryption

    Xintao Duan1,*, Zhiqiang Shao1, Wenxin Wang1, En Zhang1, Dongli Yue1, Chuan Qin2, Haewoon Nam3

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5363-5375, 2022, DOI:10.32604/cmc.2022.027807 - 21 April 2022

    Abstract At present, the image steganography method based on CNN has achieved good results. The trained model and its parameters are of great value. Once leaked, the secret image will be exposed. To protect the security of steganographic network model parameters in the transmission process, an idea based on network model parameter scrambling is proposed in this paper. Firstly, the sender trains the steganography network and extraction network, encrypts the extraction network parameters with the key shared by the sender and the receiver, then sends the extraction network and parameters to the receiver through the public… More >

  • Open Access

    ARTICLE

    A Robust 3-D Medical Watermarking Based on Wavelet Transform for Data Protection

    Xiaorui Zhang1,3,*, Wenfang Zhang1, Wei Sun2, Xingming Sun1, Sunil Kumar Jha4

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1043-1056, 2022, DOI:10.32604/csse.2022.022305 - 10 November 2021

    Abstract In a telemedicine diagnosis system, the emergence of 3D imaging enables doctors to make clearer judgments, and its accuracy also directly affects doctors’ diagnosis of the disease. In order to ensure the safe transmission and storage of medical data, a 3D medical watermarking algorithm based on wavelet transform is proposed in this paper. The proposed algorithm employs the principal component analysis (PCA) transform to reduce the data dimension, which can minimize the error between the extracted components and the original data in the mean square sense. Especially, this algorithm helps to create a bacterial foraging More >

  • Open Access

    ARTICLE

    Security and Privacy Aspects of Cloud Computing: A Smart Campus Case Study

    Sajid Habib Gill1, Mirza Abdur Razzaq1, Muneer Ahmad2, Fahad M. Almansour3, Ikram Ul Haq4, NZ Jhanjhi5,*, Malik Zaib Alam6, Mehedi Masud7

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 117-128, 2022, DOI:10.32604/iasc.2022.016597 - 03 September 2021

    Abstract The trend of cloud computing is accelerating along with emerging technologies such as utility computing, grid computing, and distributed computing. Cloud computing is showing remarkable potential to provide flexible, cost-effective, and powerful resources across the internet, and is a driving force in today’s most prominent computing technologies. The cloud offers the means to remotely access and store data while virtual machines access data over a network resource. Furthermore, cloud computing plays a leading role in the fourth industrial revolution. Everyone uses the cloud daily life when accessing Dropbox, various Google services, and Microsoft Office 365.… More >

  • Open Access

    ARTICLE

    Trust Management-Based Service Recovery and Attack Prevention in MANET

    V. Nivedita1,*, N. Nandhagopal2

    Intelligent Automation & Soft Computing, Vol.29, No.3, pp. 771-786, 2021, DOI:10.32604/iasc.2021.017547 - 01 July 2021

    Abstract The mobile ad-hoc network (MANET) output is critically impaired by the versatility and resource constraint of nodes. Node mobility affects connection reliability, and node resource constraints can lead to congestion, which makes the design of a routing MANET protocol with quality of service (QoS) very difficult. An adaptive clustering reputation model (ACRM) method is proposed to improve energy efficiency with a cluster-based framework. The proposed framework is employed to overcome the problems of data protection, privacy, and policy. The proposed ACRM-MRT approach that includes direct and indirect node trust computation is introduced along with the… More >

  • Open Access

    ARTICLE

    An Effective Non-Commutative Encryption Approach with Optimized Genetic Algorithm for Ensuring Data Protection in Cloud Computing

    S. Jerald Nirmal Kumar1,*, S. Ravimaran2, M. M. Gowthul Alam3

    CMES-Computer Modeling in Engineering & Sciences, Vol.125, No.2, pp. 671-697, 2020, DOI:10.32604/cmes.2020.09361 - 12 October 2020

    Abstract Nowadays, succeeding safe communication and protection-sensitive data from unauthorized access above public networks are the main worries in cloud servers. Hence, to secure both data and keys ensuring secured data storage and access, our proposed work designs a Novel Quantum Key Distribution (QKD) relying upon a non-commutative encryption framework. It makes use of a Novel Quantum Key Distribution approach, which guarantees high level secured data transmission. Along with this, a shared secret is generated using Diffie Hellman (DH) to certify secured key generation at reduced time complexity. Moreover, a non-commutative approach is used, which effectively More >

Displaying 1-10 on page 1 of 9. Per Page