Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (8)
  • Open Access

    ARTICLE

    Secure Transmission Scheme for Blocks in Blockchain-Based Unmanned Aerial Vehicle Communication Systems

    Ting Chen1, Shuna Jiang2, Xin Fan3,*, Jianchuan Xia2, Xiujuan Zhang2, Chuanwen Luo3, Yi Hong3

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2195-2217, 2024, DOI:10.32604/cmc.2024.056960 - 18 November 2024

    Abstract In blockchain-based unmanned aerial vehicle (UAV) communication systems, the length of a block affects the performance of the blockchain. The transmission performance of blocks in the form of finite character segments is also affected by the block length. Therefore, it is crucial to balance the transmission performance and blockchain performance of blockchain communication systems, especially in wireless environments involving UAVs. This paper investigates a secure transmission scheme for blocks in blockchain-based UAV communication systems to prevent the information contained in blocks from being completely eavesdropped during transmission. In our scheme, using a friendly jamming UAV… More >

  • Open Access

    ARTICLE

    Deep Learning-Based Secure Transmission Strategy with Sensor-Transmission-Computing Linkage for Power Internet of Things

    Bin Li*, Linghui Kong, Xiangyi Zhang, Bochuo Kou, Hui Yu, Bowen Liu

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3267-3282, 2024, DOI:10.32604/cmc.2024.047193 - 26 March 2024

    Abstract The automatic collection of power grid situation information, along with real-time multimedia interaction between the front and back ends during the accident handling process, has generated a massive amount of power grid data. While wireless communication offers a convenient channel for grid terminal access and data transmission, it is important to note that the bandwidth of wireless communication is limited. Additionally, the broadcast nature of wireless transmission raises concerns about the potential for unauthorized eavesdropping during data transmission. To address these challenges and achieve reliable, secure, and real-time transmission of power grid data, an intelligent… More >

  • Open Access

    ARTICLE

    Secure Transmission of Compressed Medical Image Sequences on Communication Networks Using Motion Vector Watermarking

    Rafi Ullah1,*, Mohd Hilmi bin Hasan1, Sultan Daud Khan2, Mussadiq Abdul Rahim3

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3283-3301, 2024, DOI:10.32604/cmc.2024.046305 - 26 March 2024

    Abstract Medical imaging plays a key role within modern hospital management systems for diagnostic purposes. Compression methodologies are extensively employed to mitigate storage demands and enhance transmission speed, all while upholding image quality. Moreover, an increasing number of hospitals are embracing cloud computing for patient data storage, necessitating meticulous scrutiny of server security and privacy protocols. Nevertheless, considering the widespread availability of multimedia tools, the preservation of digital data integrity surpasses the significance of compression alone. In response to this concern, we propose a secure storage and transmission solution for compressed medical image sequences, such as… More >

  • Open Access

    ARTICLE

    Intrusion Detection Model Using Chaotic MAP for Network Coding Enabled Mobile Small Cells

    Chanumolu Kiran Kumar, Nandhakumar Ramachandran*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3151-3176, 2024, DOI:10.32604/cmc.2023.043534 - 26 March 2024

    Abstract Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions, vulnerabilities, and assaults. Complex security systems, such as Intrusion Detection Systems (IDS), are essential due to the limitations of simpler security measures, such as cryptography and firewalls. Due to their compact nature and low energy reserves, wireless networks present a significant challenge for security procedures. The features of small cells can cause threats to the network. Network Coding (NC) enabled small cells are vulnerable to various types of attacks. Avoiding attacks and performing secure “peer” to “peer” data transmission is… More >

  • Open Access

    ARTICLE

    Optimal Beamforming for Secure Transmit in Practical Wireless Networks

    Qiuqin Yang1, Linfang Li1, Ming-Xing Luo1,*, Xiaojun Wang2

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1863-1877, 2022, DOI:10.32604/cmc.2022.027120 - 18 May 2022

    Abstract In real communication systems, secure and low-energy transmit scheme is very important. So far, most of schemes focus on secure transmit in special scenarios. In this paper, our goal is to propose a secure protocol in wireless networks involved various factors including artificial noise (AN), the imperfect receiver and imperfect channel state information (CSI) of eavesdropper, weight of beamforming (BF) vector, cooperative jammers (CJ), multiple receivers, and multiple eavesdroppers, and the analysis shows that the protocol can reduce the transmission power, and at the same time the safe reachability rate is greater than our pre-defined… More >

  • Open Access

    ARTICLE

    Reversible Watermarking Method with Low Distortion for the Secure Transmission of Medical Images

    Rizwan Taj1, Feng Tao1,*, Shahzada Khurram2, Ateeq Ur Rehman3, Syed Kamran Haider4, Akber Abid Gardezi5, Saima Kanwal1

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.3, pp. 1309-1324, 2022, DOI:10.32604/cmes.2022.017650 - 30 December 2021

    Abstract In telemedicine, the realization of reversible watermarking through information security is an emerging research field. However, adding watermarks hinders the distribution of pixels in the cover image because it creates distortions (which lead to an increase in the detection probability). In this article, we introduce a reversible watermarking method that can transmit medical images with minimal distortion and high security. The proposed method selects two adjacent gray pixels whose least significant bit (LSB) is different from the relevant message bit and then calculates the distortion degree. We use the LSB pairing method to embed the secret… More >

  • Open Access

    ARTICLE

    Dynamic Encryption and Secure Transmission of Terminal Data Files

    Ruchun Jia1,*, Yang Xin2, Bo Liu3, Qin Qin4

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1221-1232, 2022, DOI:10.32604/cmc.2022.019318 - 03 November 2021

    Abstract Data is the last defense line of security, in order to prevent data loss, no matter where the data is stored, copied or transmitted, it is necessary to accurately detect the data type, and further clarify the form and encryption structure of the data transmission process to ensure the accuracy of the data, so as to prevent data leakage, take the data characteristics as the core, use transparent encryption and decryption technology as the leading, and According to the data element characteristics such as identity authentication, authority management, outgoing management, file audit and external device… More >

  • Open Access

    ARTICLE

    Analytic Beta-Wavelet Transform-Based Digital Image Watermarking for Secure Transmission

    Hesham Alhumyani1,*, Ibrahim Alrube1, Sameer Alsharif1, Ashraf Afifi1, Chokri Ben Amar1, Hala S. El-Sayed2, Osama S. Faragallah3

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4657-4673, 2022, DOI:10.32604/cmc.2022.020338 - 11 October 2021

    Abstract The rapid development in the information technology field has introduced digital watermark technologies as a solution to prevent unauthorized copying and redistribution of data. This article introduces a self-embedded image verification and integrity scheme. The images are firstly split into dedicated segments of the same block sizes. Then, different Analytic Beta-Wavelet (ABW) orthogonal filters are utilized for embedding a self-segment watermark for image segment using a predefined method. ABW orthogonal filter coefficients are estimated to improve image reconstruction under different block sizes. We conduct a comparative study comparing the watermarked images using three kinds of More >

Displaying 1-10 on page 1 of 8. Per Page