Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (9)
  • Open Access

    ARTICLE

    AI-Powered Image Security: Utilizing Autoencoders for Advanced Medical Image Encryption

    Fehaid Alqahtani*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1709-1724, 2024, DOI:10.32604/cmes.2024.054976 - 27 September 2024

    Abstract With the rapid advancement in artificial intelligence (AI) and its application in the Internet of Things (IoT), intelligent technologies are being introduced in the medical field, giving rise to smart healthcare systems. The medical imaging data contains sensitive information, which can easily be stolen or tampered with, necessitating secure encryption schemes designed specifically to protect these images. This paper introduces an artificial intelligence-driven novel encryption scheme tailored for the secure transmission and storage of high-resolution medical images. The proposed scheme utilizes an artificial intelligence-based autoencoder to compress high-resolution medical images and to facilitate fast encryption… More >

  • Open Access

    ARTICLE

    Improved Multileader Optimization with Shadow Encryption for Medical Images in IoT Environment

    Mesfer Al Duhayyim1,*, Mohammed Maray2, Ayman Qahmash2, Fatma S. Alrayes3, Nuha Alshuqayran4, Jaber S. Alzahrani5, Mohammed Alghamdi2,6, Abdullah Mohamed7

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3133-3149, 2023, DOI:10.32604/cmc.2023.032740 - 31 October 2022

    Abstract Nowadays, security plays an important role in Internet of Things (IoT) environment especially in medical services’ domains like disease prediction and medical data storage. In healthcare sector, huge volumes of data are generated on a daily basis, owing to the involvement of advanced health care devices. In general terms, health care images are highly sensitive to alterations due to which any modifications in its content can result in faulty diagnosis. At the same time, it is also significant to maintain the delicate contents of health care images during reconstruction stage. Therefore, an encryption system is… More >

  • Open Access

    ARTICLE

    Wind Driven Optimization-Based Medical Image Encryption for Blockchain-Enabled Internet of Things Environment

    C. S. S. Anupama1, Raed Alsini2, N. Supriya3, E. Laxmi Lydia4, Seifedine Kadry5, Sang-Soo Yeo6, Yongsung Kim7,*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3219-3233, 2022, DOI:10.32604/cmc.2022.030267 - 16 June 2022

    Abstract Internet of Things (IoT) and blockchain receive significant interest owing to their applicability in different application areas such as healthcare, finance, transportation, etc. Medical image security and privacy become a critical part of the healthcare sector where digital images and related patient details are communicated over the public networks. This paper presents a new wind driven optimization algorithm based medical image encryption (WDOA-MIE) technique for blockchain enabled IoT environments. The WDOA-MIE model involves three major processes namely data collection, image encryption, optimal key generation, and data transmission. Initially, the medical images were captured from the… More >

  • Open Access

    ARTICLE

    Competitive Swarm Optimization with Encryption Based Steganography for Digital Image Security

    Ala’ A. Eshmawi1, Suliman A. Alsuhibany2, Sayed Abdel-Khalek3, Romany F. Mansour4,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 4173-4184, 2022, DOI:10.32604/cmc.2022.028008 - 29 March 2022

    Abstract Digital image security is a fundamental and tedious process on shared communication channels. Several methods have been employed for accomplishing security on digital image transmission, such as encryption, steganography, and watermarking. Image stenography and encryption are commonly used models to achieve improved security. Besides, optimal pixel selection process (OPSP) acts as a vital role in the encryption process. With this motivation, this study designs a new competitive swarm optimization with encryption based stenographic technique for digital image security, named CSOES-DIS technique. The proposed CSOES-DIS model aims to encrypt the secret image prior to the embedding More >

  • Open Access

    ARTICLE

    Robust Watermarking Scheme for NIfTI Medical Images

    Abhishek Kumar1,5, Kamred Udham Singh2, Visvam Devadoss Ambeth Kumar3, Tapan Kant4, Abdul Khader Jilani Saudagar5,*, Abdullah Al Tameem5, Mohammed Al Khathami5, Muhammad Badruddin Khan5, Mozaherul Hoque Abul Hasanat5, Khalid Mahmood Malik6

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3107-3125, 2022, DOI:10.32604/cmc.2022.022817 - 07 December 2021

    Abstract Computed Tomography (CT) scan and Magnetic Resonance Imaging (MRI) technologies are widely used in medical field. Within the last few months, due to the increased use of CT scans, millions of patients have had their CT scans done. So, as a result, images showing the Corona Virus for diagnostic purposes were digitally transmitted over the internet. The major problem for the world health care system is a multitude of attacks that affect copyright protection and other ethical issues as images are transmitted over the internet. As a result, it is important to apply a robust… More >

  • Open Access

    ARTICLE

    Novel Image Encryption and Compression Scheme for IoT Environment

    Mesfer Al Duhayyim1, Fahd N. Al-Wesabi2, Radwa Marzouk3, Manar Ahmed Hamza4, Anwer Mustafa Hilal4,*, Majdy M. Eltahir2

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1443-1457, 2022, DOI:10.32604/cmc.2022.021873 - 03 November 2021

    Abstract Latest advancements made in the processing abilities of smart devices have resulted in the designing of Intelligent Internet of Things (IoT) environment. This advanced environment enables the nodes to connect, collect, perceive, and examine useful data from its surroundings. Wireless Multimedia Surveillance Networks (WMSNs) form a vital part in IoT-assisted environment since it contains visual sensors that examine the surroundings from a number of overlapping views by capturing the images incessantly. Since IoT devices generate a massive quantity of digital media, it is therefore required to save the media, especially images, in a secure way.… More >

  • Open Access

    ARTICLE

    A Fractional Fourier Based Medical Image Authentication Approach

    Fayez Alqahtani1,*, Mohammed Amoon2,3, Walid El-Shafai4

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3133-3150, 2022, DOI:10.32604/cmc.2022.020454 - 27 September 2021

    Abstract Patient medical information in all forms is crucial to keep private and secure, particularly when medical data communication occurs through insecure channels. Therefore, there is a bad need for protecting and securing the color medical images against impostors and invaders. In this paper, an optical medical image security approach is introduced. It is based on the optical bit-plane Jigsaw Transform (JT) and Fractional Fourier Transform (FFT). Different kernels with a lone lens and a single arbitrary phase code are exploited in this security approach. A preceding bit-plane scrambling process is conducted on the input color… More >

  • Open Access

    ARTICLE

    Secure and Robust Optical Multi-Stage Medical Image Cryptosystem

    Walid El-Shafai1, Moustafa H. Aly2, Abeer D. Algarni3,*, Fathi E. Abd El-Samie1,3, Naglaa F. Soliman3,4

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 895-913, 2022, DOI:10.32604/cmc.2022.018545 - 07 September 2021

    Abstract Due to the rapid growth of telemedicine and healthcare services, color medical image security applications have been expanded precipitously. In this paper, an asymmetric PTFrFT (Phase Truncated Fractional Fourier Transform)-based color medical image cryptosystem is suggested. Two different phases in the fractional Fourier and output planes are provided as deciphering keys. Accordingly, the ciphering keys will not be employed for the deciphering procedure. Thus, the introduced PTFrFT algorithm comprises asymmetric ciphering and deciphering processes in contrast to the traditional optical symmetric OSH (Optical Scanning Holography) and DRPE (Double Random Phase Encoding) algorithms. One of the More >

  • Open Access

    ARTICLE

    Local Features-Based Watermarking for Image Security in Social Media

    Shady Y. El-mashad1, Amani M. Yassen1, Abdulwahab K. Alsammak1, Basem M. Elhalawany2,*

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3857-3870, 2021, DOI:10.32604/cmc.2021.018660 - 24 August 2021

    Abstract The last decade shows an explosion of using social media, which raises several challenges related to the security of personal files including images. These challenges include modifying, illegal copying, identity fraud, copyright protection and ownership of images. Traditional digital watermarking techniques embed digital information inside another digital information without affecting the visual quality for security purposes. In this paper, we propose a hybrid digital watermarking and image processing approach to improve the image security level. Specifically, variants of the widely used Least-Significant Bit (LSB) watermarking technique are merged with a blob detection algorithm to embed More >

Displaying 1-10 on page 1 of 9. Per Page