The security of data transmission across networks is paramount, where encryption poses a formidable challenge in network security. While chaos-based image encryption algorithms have garnered considerable research atte...
详细信息
The low level regulation of cryptocurrency market as well as crucial role of trust and digital market specificity makes it a good environment for anonymous transactions without identity verification, therefore fraudul...
详细信息
The security of multimedia data and its applications has become a building block of any digital communication technology. The extensive use of multimedia content over wireless networks makes the applications exposed t...
详细信息
The security of multimedia data and its applications has become a building block of any digital communication technology. The extensive use of multimedia content over wireless networks makes the applications exposed to different types of network attacks. Cryptography is the main technology that provides security and confidentiality to prevent unauthorised data access. A suitable design of an encryption system must be chosen to fully secure and maintain the privacy of data. On the other hand, the large size of data will be the prominent issue. In order to maintain a better performance of Internet of Things (IoT) applications, an appropriate compressionencryption scheme has to be used to ensure a secure and fast scheme without increasing the cryptosystem complexity to achieve a large encryption capacity. Therefore, this presents a hybrid scheme of H.264/MVC compression procedure and an encryption process of Latin Square Cipher (LSC) using symmetric keys. The Latin square whitening and Latin square substitution and permutation operations are included in the encryption algorithm. The simulation results and analysis of different RGB video frames using MATLAB show that the proposed scheme achieves high protection, integrity, and security performance for different transmitted video frames, high robustness performance against different network attacks, and high-security accomplishment compared to the state-of-the-art algorithms.
With the entry of large-scale commercial power users into the market, the electricity trading retail market faces a surge in the number of users, agency relationships, and retail-side settlement. All these pose huge c...
详细信息
ISBN:
(纸本)9781665489577
With the entry of large-scale commercial power users into the market, the electricity trading retail market faces a surge in the number of users, agency relationships, and retail-side settlement. All these pose huge challenges to the support capability of the retail side business of power transactions, the system's ability to process concurrently with big data, and the compliance and electronization of business processes. block chain technology has technical characteristics such as anti-tampering and node sharing, which can well solve the difficulties and pain points in the process of electricity retail transactions. The block chain technology is integrated into the research and application of electricity market transactions, and the technology can not be tampered with., high reliability and advantages, and then properly solve the current problems of privacy protection, transaction security and low transaction efficiency, while reducing transmission costs.
Hybrid encryption algorithms are flexible tools for modeling the correlation of random variables. They cover the scope from completely negative correlation to positive correlation, including independent cases and cont...
详细信息
ISBN:
(数字)9781510646131
ISBN:
(纸本)9781510646131;9781510646124
Hybrid encryption algorithms are flexible tools for modeling the correlation of random variables. They cover the scope from completely negative correlation to positive correlation, including independent cases and contain asymmetric correlation and broadly employed Gaussian correlation structure. The pair-encryption algorithm of the hybrid encryption algorithm takes advantage of the ease of use of the two-variable encryption algorithm, and it is recommended to decompose the hybrid encryption algorithm into a set of two-variable encryption algorithms. We have successfully applied this method to spatial data and established a powerful interpolation method on basis of spatial logarithm.
Coronavirus disease (COVID 19) is the dangerous pandemic that scares the world from November 2019 affects more than 50% of the world population. Internet of things (IoT) is coming as a survivor to manage the pandemic ...
详细信息
Coronavirus disease (COVID 19) is the dangerous pandemic that scares the world from November 2019 affects more than 50% of the world population. Internet of things (IoT) is coming as a survivor to manage the pandemic situation because of its controlling and monitoring capability without human intervention. In this paper, Secure IoT integrated with wireless sensor network (WSN) for COVID 19 is implemented to monitor the infected patient's health condition. The sensor node's monitored data are encrypted using the different existing encryption algorithms to secure the health care data. Triad parallel advanced encryption standard (AES) algorithmis novel encryption algorithm proposed to encrypt the data in the internet server that improves the security of the stored data and the parallel processing reduces the execution time of the algorithm in insignificant amount. In this proposed work, the performance evaluation of the network in different encryption algorithms are carried out.
Two new encryption algorithms for secure video transmission are proposed in this paper. The two algorithms employ different types of chaotic maps to generate the keystream for encrypting the video frames. Both algorit...
详细信息
Two new encryption algorithms for secure video transmission are proposed in this paper. The two algorithms employ different types of chaotic maps to generate the keystream for encrypting the video frames. Both algorithms involve a substitution step and a permutation step to achieve confusion and diffusion requirements. For efficient transmission, the video file is compressed before being encrypted. In the basic implementation of both algorithms, MPEG-2 standard is used for compression. However, the algorithms are shown to be compliant with other compression techniques. In the permutation step, the effect of the block size used in the shuffling process is examined. Smaller blocks result in increasing the processing time, while reducing both the correlation between adjacent pixels and the peak-signal-to noise ratio of an encrypted frame. The use of a Feistel structure is investigated to enhance security and its negative impact on the encryption time is demonstrated. The experimental results of the two proposed schemes confirm that they represent different tradeoffs between security and computational efficiency. Both schemes are sensitive to slight variations in the encryption key as apparent from the obtained differential measures. The conducted comparative study shows the competitiveness of the proposed schemes to existing schemes in literature.
With the rapid development of Internet of Things (IoT) technology, interconnectivity between devices has become increasingly widespread. However, traditional IoT security measures struggle to cope with increasingly co...
详细信息
Nowadays, man-in-the-middle (MITM) attacks have become a large problem due to the advancement of computational power and interactive mobile technologies. Message security is a crucial concern that ought to be managed ...
详细信息
The RSA technique provides security for every user connected across the network. The mathematical factorization problem, which demonstrates how challenging it is to find two prime numbers whose product equals a partic...
详细信息
暂无评论