Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    ARTICLE

    A Linked List Encryption Scheme for Image Steganography without Embedding

    Pengbiao Zhao1, Qi Zhong2, Jingxue Chen1, Xiaopei Wang3, Zhen Qin1, Erqiang Zhou1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 331-352, 2024, DOI:10.32604/cmes.2024.050148 - 20 August 2024

    Abstract Information steganography has received more and more attention from scholars nowadays, especially in the area of image steganography, which uses image content to transmit information and makes the existence of secret information undetectable. To enhance concealment and security, the Steganography without Embedding (SWE) method has proven effective in avoiding image distortion resulting from cover modification. In this paper, a novel encrypted communication scheme for image SWE is proposed. It reconstructs the image into a multi-linked list structure consisting of numerous nodes, where each pixel is transformed into a single node with data and pointer domains.… More >

  • Open Access

    ARTICLE

    Hash Table Assisted Efficient File Level De-Duplication Scheme in SD-IoV Assisted Sensing Devices

    Ghawar Said1, Ata Ullah2, Anwar Ghani1,*, Muhammad Azeem1, Khalid Yahya3, Muhammad Bilal4, Sayed Chhattan Shah5,*

    Intelligent Automation & Soft Computing, Vol.38, No.1, pp. 83-99, 2023, DOI:10.32604/iasc.2023.036079 - 26 January 2024

    Abstract The Internet of Things (IoT) and cloud technologies have encouraged massive data storage at central repositories. Software-defined networks (SDN) support the processing of data and restrict the transmission of duplicate values. It is necessary to use a data de-duplication mechanism to reduce communication costs and storage overhead. Existing State of the art schemes suffer from computational overhead due to deterministic or random tree-based tags generation which further increases as the file size grows. This paper presents an efficient file-level de-duplication scheme (EFDS) where the cost of creating tags is reduced by employing a hash table More >

  • Open Access

    ARTICLE

    Optimizing Storage for Energy Conservation in Tracking Wireless Sensor Network Objects

    Vineet Sharma1, Mohammad Zubair Khan2,*, Shivani Batra1, Abdullah Alsaeedi3, Prakash Srivastava4

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1211-1231, 2023, DOI:10.32604/csse.2023.029184 - 03 November 2022

    Abstract The amount of needed control messages in wireless sensor networks (WSN) is affected by the storage strategy of detected events. Because broadcasting superfluous control messages consumes excess energy, the network lifespan can be extended if the quantity of control messages is decreased. In this study, an optimized storage technique having low control overhead for tracking the objects in WSN is introduced. The basic concept is to retain observed events in internal memory and preserve the relationship between sensed information and sensor nodes using a novel inexpensive data structure entitled Ordered Binary Linked List (OBLL). Whenever More >

  • Open Access

    ARTICLE

    Research on Higher Education Collaborative Management Platform Based on Relationship Graph

    Wu Aiyan*

    Journal on Artificial Intelligence, Vol.4, No.2, pp. 77-84, 2022, DOI:10.32604/jai.2022.028511 - 18 July 2022

    Abstract According to the current problems of higher education management informatization, this paper puts forward a development scheme of collaborative platform on education management. The main technology includes three parts. First, integrate the distributed database and use two-tier linked list to realize dynamic data access. Second, the relation graph is used to display the data of each student, so as to realize the visual sharing of data. Third, realize the collaborative information security mechanism from three aspects to ensure the legal sharing of data. Finally, the platform development is completed with Java. It can help to More >

Displaying 1-10 on page 1 of 4. Per Page