期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
An Improved Steganographic Scheme Using the Contour Principle to Ensure the Privacy of Medical Data on Digital Images
1
作者 R.Bala Krishnan d.yuvaraj +4 位作者 P.Suthanthira Devi Varghese S.Chooralil N.Rajesh Kumar B.Karthikeyan G.Manikandan 《Computer Systems Science & Engineering》 SCIE EI 2023年第8期1563-1576,共14页
With the improvement of current online communication schemes,it is now possible to successfully distribute and transport secured digital Content via the communication channel at a faster transmission rate.Traditional ... With the improvement of current online communication schemes,it is now possible to successfully distribute and transport secured digital Content via the communication channel at a faster transmission rate.Traditional steganography and cryptography concepts are used to achieve the goal of concealing secret Content on a media and encrypting it before transmission.Both of the techniques mentioned above aid in the confidentiality of feature content.The proposed approach concerns secret content embodiment in selected pixels on digital image layers such as Red,Green,and Blue.The private Content originated from a medical client and was forwarded to a medical practitioner on the server end through the internet.The K-Means clustering principle uses the contouring approach to frame the pixel clusters on the image layers.The content embodiment procedure is performed on the selected pixel groups of all layers of the image using the Least Significant Bit(LSB)substitution technique to build the secret Content embedded image known as the stego image,which is subsequently transmitted across the internet medium to the server end.The experimental results are computed using the inputs from“Open-Access Medical Image Repositories(aylward.org)”and demonstrate the scheme’s impudence as the Content concealing procedure progresses. 展开更多
关键词 CONTOURING secret content embodiment least significant bit embedding medical data preservation secret content congregation pixel clustering
下载PDF
Shape, Color and Texture Based CBIR System Using Fuzzy LogicClassifier
2
作者 d.yuvaraj M.Sivaram +1 位作者 B.Karthikeyan Jihan Abdulazeez 《Computers, Materials & Continua》 SCIE EI 2019年第6期729-739,共11页
The perfect image retrieval and retrieval time are the two major challenges inCBIR systems. To improve the retrieval accuracy, the whole database is searched basedon many image characteristics such as color, shape, te... The perfect image retrieval and retrieval time are the two major challenges inCBIR systems. To improve the retrieval accuracy, the whole database is searched basedon many image characteristics such as color, shape, texture and edge information whichleads to more time consumption. This paper presents a new fuzzy based CBIR method,which utilizes colour, shape and texture attributes of the image. Fuzzy rule based systemis developed by combining color, shape, and texture feature for enhanced image recovery.In this approach, DWT is used to pull out the texture characteristics and the region basedmoment invariant is utilized to pull out the shape features of an image. Color similarityand texture attributes are extorted using customized Color Difference Histogram (CDH).The performance evaluation based on precision and BEP measures reveals the superiorityof the proposed method over renowned obtainable approaches. 展开更多
关键词 Image retrieval color histogram TEXTURE edge orientation retrieval accuracy
下载PDF
Enhanced Route Optimization for Wireless Networks Using Meta-Heuristic Engineering
3
作者 S.Navaneetha Krishnan P.Sundara Vadivel +4 位作者 d.yuvaraj T.Satyanarayana Murthy Sree Jagadeesh Malla S.Nachiyappan S.Shanmuga Priya 《Computer Systems Science & Engineering》 SCIE EI 2022年第10期17-26,共10页
Wireless Sensor Networks(WSN)are commonly used to observe and monitor precise environments.WSNs consist of a large number of inexpensive sensor nodes that have been separated and distributed in different environments.... Wireless Sensor Networks(WSN)are commonly used to observe and monitor precise environments.WSNs consist of a large number of inexpensive sensor nodes that have been separated and distributed in different environments.The base station received the amount of data collected by the numerous sensors.The current developments designate that the attentFgion in applications of WSNs has been increased and extended to a very large scale.The Trust-Based Adaptive Acknowledgement(TRAACK)Intrusion-Detection System for Wireless Sensor Networks(WSN)is described based on the number of active positive deliveries and The Kalman filter used in Modified Particle Swarm Optimization(MPSO)has been proposed to predict knot confidence.Simulations were run for non-malicious networks(0%malicious)and different percentages of malicious nodes were discussed.The findings suggest that the proposed method TRAACK Modified Particle Swarm Optimization(MPSO)packet delivery rate outperforms TRAACKPSO by 3.3%with 0%malicious nodes.Similarly,the packet delivery rate of TRAACKMPSO is 30%malicious,3.5%better than TRAACKPSO in WSN. 展开更多
关键词 Trust-based adaptive acknowledgment(TRAACK) modified particle swarm optimization(MPSO) intrusion detection system(IDS) kalman filter
下载PDF
Secure Key Management Based Mobile Authentication in Cloud
4
作者 S.Shanmuga Priya d.yuvaraj +4 位作者 T.Satyanarayana Murthy Varghese S.Chooralil S.Navaneetha Krishnan P.Banumathy P.SundaraVadivel 《Computer Systems Science & Engineering》 SCIE EI 2022年第12期887-896,共10页
Authentication is important to the security of user data in a mobilecloud environment. Because of the server’s user credentials, it is subject toattacks. To maintain data authentication, a novel authentication mechan... Authentication is important to the security of user data in a mobilecloud environment. Because of the server’s user credentials, it is subject toattacks. To maintain data authentication, a novel authentication mechanism is proposed. It consists of three independent phases: Registration, login, and authentication and key agreement. The user registers with the Registration Center (RC)by producing a secret number that isn’t stored in the phone, which protects againstprivileged insider attacks. The user and server generate a nonce for dynamic useridentity and agree on a session secret key for safe communication. The passwordsare not stored on the computer or provided in plain text, they are resistant toreplay, guessing, and stolen verification attacks. The suggested protocol uses aone-way hash function and XOR operations, with the client having remote accessto a large number of servers over a secure communication channel. Concentrateson HMAC and SHA3 for Collision Free Hashing and to overcome length extension attacks. HMACs are substantially less affected by collisions than their underlying hashing algorithms alone. So adding an HMAC to an MD5 or SHA hashwould make it substantially more difficult to break via a rainbow table. 展开更多
关键词 Registration center SIM IMEI
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部