Concerns related to the proliferation of automated face recognition technology with the intent of solving or preventing crimes continue to mount. The technology being implicated in wrongful arrest following 1-to-many ...
详细信息
With growing awareness of privacy protection, Federated Learning (FL) in vehicular network scenarios effectively addresses privacy concerns, leading to the development of Federated Vehicular Networks (FVN). In FVN, ve...
详细信息
The main control objective for the quad-rotor system is the attitude and position tracking control which is accomplished in this article using the backstepping fractional-order sliding mode control approach combined w...
详细信息
This study proposes a decentralized frequency scheduling method to achieve SoC balancing with no communication protocol. Since the frequency scheduling method is based on modifying droop control of inverter, to make t...
详细信息
Unstructured Numerical Image Dataset Separation (UNIDS) method employing an enhanced unsupervised clustering technique. The objective is to delineate an optimal number of distinct groups within the input grayscale (G-...
详细信息
This article proposes three-level (TL) buck-boost direct ac-ac converters based on switching-cell configuration with coupled magnetics. The proposed converters use only six active switches and can produce noninverting...
详细信息
作者:
Sim, SeungminKim, JinwoongLee, Jemin
Department of Electrical and Computer Engineering Korea Republic of
Department of Electrical Engineering and Computer Science Korea Republic of
In this paper, we analyze covert amplify-and-forward (AF) relay networks with a metric for measuring the data freshness, i.e, age of information (AoI), with aid of the cooperative jammer that generates artificial nois...
详细信息
A global public health concern, Chronic Kidney Disease causes renal failure, cardiovascular disease, and premature death. Given the frequency of kidney diseases and their significant impact on public health, detection...
详细信息
Fruit safety is a critical component of the global economy, particularly within the agricultural sector. There has been a recent surge in the incidence of diseases affecting fruits, leading to economic setbacks in agr...
详细信息
In telemedicine applications, it is crucial to ensure the authentication, confidentiality, and privacy of medical data due to its sensitive nature and the importance of the patient information it contains. Communicati...
详细信息
In telemedicine applications, it is crucial to ensure the authentication, confidentiality, and privacy of medical data due to its sensitive nature and the importance of the patient information it contains. Communication through open networks is insecure and has many vulnerabilities, making it susceptible to unauthorized access and misuse. Encryption models are used to secure medical data from unauthorized access. In this work, we propose a bit-level encryption model having three phases: preprocessing, confusion, and diffusion. This model is designed for different types of medical data including patient information, clinical data, medical signals, and images of different modalities. Also, the proposed model is effectively implemented for grayscale and color images with varying aspect ratios. Preprocessing has been applied based on the type of medical data. A random permutation has been used to scramble the data values to remove the correlation, and multilevel chaotic maps are fused with the cyclic redundancy check method. A circular shift is used in the diffusion phase to increase randomness and security, providing protection against potential attacks. The CRC method is further used at the receiver side for error detection. The performance efficiency of the proposed encryption model is proved in terms of histogram analysis, information entropy, correlation analysis, signal-to-noise ratio, peak signal-to-noise ratio, number of pixels changing rate, and unified average changing intensity. The proposed bit-level encryption model therefore achieves information entropy values ranging from 7.9669 to 8.000, which is close to the desired value of 8. Correlation coefficient values of the encrypted data approach to zero or are negative, indicating minimal correlation in encrypted data. Resistance against differential attacks is demonstrated by NPCR and UACI values exceeding 0.9960 and 0.3340, respectively. The key space of the proposed model is 1096, which is substantially mor
暂无评论