Coronavirus(COVID-19)is a contagious disease that causes exceptional effect on healthcare organizationsworldwide with dangerous impact on medical services within the hospitals.Because of the fast spread of COVID-19,th...Coronavirus(COVID-19)is a contagious disease that causes exceptional effect on healthcare organizationsworldwide with dangerous impact on medical services within the hospitals.Because of the fast spread of COVID-19,the healthcare facilities could be a big source of disease infection.So,healthcare video consultations should be used to decrease face-to-face communication between clinician and patients.Healthcare video consultations may be beneficial for some COVID-19 conditions and reduce the need for faceto-face contact with a potentially positive patient without symptoms.These conditions are like top clinicians who provide remote consultations to develop treatment methodology and follow-up remotely,patients who consult about COVID-19,and those who have mild symptoms suggestive of the COVID-19 virus.Video consultations are a supplement to,and not a substitute for,telephone consultations.It may also form part of a broader COVID-19 distance care strategy that contains computerized screening,separation of possibly infectious patients within medical services,and computerized video-intensive observing of their intensive care that helps reduce mixing.Nowadays,the spread of the COVID-19 virus helps to expand the use of video healthcare consultations because it helps to exchange experiences and remote medical consultations,save costs and health procedures used to cope with the pandemic of the COVID-19 virus,and monitor the progress of treatment plans,moment by moment from a distance with precision,clarity and ease.From this perspective,this paper introduces a high-efficiency video coding(HEVC)ChaCha20-based selective encryption(SE)scheme for secure healthcare video Consultations.The proposed HEVC ChaCha20-based SE scheme uses the ChaCha20 for encrypting the sign bits of the Discrete Cosine Transform(DCT)and Motion Vector Difference(MVD)in the HEVC entropy phase.The main achievement of HEVC ChaCha20-based SE scheme is encrypting the most sensitive video bits with keeping low delay time,fixed bit rate of the HEVC,and format compliance.Experimental tests guarantee that the proposed HEVC ChaCha20-based SE scheme can ensure the confidentiality of the healthcare video consultations which has become easy to transmit through the internet.展开更多
The rapid development in the information technology field has introduced digital watermark technologies as a solution to prevent unauthorized copying and redistribution of data.This article introduces a self-embedded ...The rapid development in the information technology field has introduced digital watermark technologies as a solution to prevent unauthorized copying and redistribution of data.This article introduces a self-embedded image verification and integrity scheme.The images are firstly split into dedicated segments of the same block sizes.Then,different Analytic Beta-Wavelet(ABW)orthogonal filters are utilized for embedding a self-segment watermark for image segment using a predefined method.ABW orthogonal filter coefficients are estimated to improve image reconstruction under different block sizes.We conduct a comparative study comparing the watermarked images using three kinds of ABW filters for block sizes 64×64,128×128,and 256×256.We embed the watermark using the ABW-based image watermarking method in the 2-level middle frequency sub-bands of the ABW digital image coefficients.The imperceptibility and robustness of the ABW-based image watermarking method image is evaluated based on the Peak Signal to Noise Ratio(PSNR)and Correlation coefficient values.From the implementation results,we came to know that this ABW-based image watermarking method can withstand many image manipulations compared to other existing methods.展开更多
Audio communications and computer networking play essential roles in our daily lives,including many domains with different scopes.Developments in these technologies are quick.In consequence,there is a dire need to sec...Audio communications and computer networking play essential roles in our daily lives,including many domains with different scopes.Developments in these technologies are quick.In consequence,there is a dire need to secure these technologies up to date.This paper presents an efficient model for secure audio signal transmission over the wireless noisy uncorrelated Rayleigh fading channel.Also,the performance of the utilized multiple secret keys-based audio cryptosystem is analyzed in different transformation domains.The discrete cosine transform(DCT),the discrete sine transform(DST),and the discrete wavelet transform(DWT)are investigated in the utilizedmultiple secret key-based audio cryptosystem.Simulation results show consistent results with the wireless noisy channel.The performance of the proposed multiple secret keys-based audio cryptosystem can be ranked concerning the employed domain as DWT,DCT,and DST transform techniques.The simulation experiments proved that the presented multiple secret keysbased audio cryptosystemfor audio signals transmitted over the wireless noisy uncorrelatedRayleigh fading channel achieves reliable and secure wireless link utilizing combined multi security layers.展开更多
Remote sensing image processing engaged researchers’attentiveness in recent years,especially classification.The main problem in classification is the ratio of the correct predictions after training.Feature extraction...Remote sensing image processing engaged researchers’attentiveness in recent years,especially classification.The main problem in classification is the ratio of the correct predictions after training.Feature extraction is the foremost important step to build high-performance image classifiers.The convolution neural networks can extract images’features that significantly improve the image classifiers’accuracy.This paper proposes two efficient approaches for remote sensing images classification that utilizes the concatenation of two convolution channels’outputs as a features extraction using two classic convolution models;these convolution models are the ResNet 50 and the DenseNet 169.These elicited features have been used by the fully connected neural network classifier and support vector machine classifier as input features.The results of the proposed methods are compared with other antecedent approaches in the same experimental environments.Evaluation is based on learning curves plotted during the training of the proposed classifier that is based on a fully connected neural network and measuring the overall accuracy for the both proposed classifiers.The proposed classifiers are used with their trained weights to predict a big remote sensing scene’s classes for a developed test.Experimental results ensure that,compared with the other traditional classifiers,the proposed classifiers are further accurate.展开更多
In the last few years,videos became the most common form of information transmitted over the internet,and a lot of the traffic is confidential and must be protected and delivered safely to its intended users.This intr...In the last few years,videos became the most common form of information transmitted over the internet,and a lot of the traffic is confidential and must be protected and delivered safely to its intended users.This introduces the challenges of presenting encryption systems that can encode videos securely and efficiently at the same time.This paper presents an efficient opto-video encryption system using Logistic Adjusted Sine map(LASM)in the Fractional Fourier Transform(FrFT).In the presented opto-video LASM-based FrFT scheme,the encoded video is split into distinct frames and transformed into optical signals utilizing an optical supply.Each of the developed optical video frames is ciphered by utilizing the LASM in optical FrFT system using two-phase modulation forms on the video frame,the first in the time-domain and the second in the FrFT domain.In the end,the ciphervideo frame is spotted utilizing a CCD digital camera and transformed into a digital structure that can be managed using a computer.We test the proposed opto-video LASM-based FrFT scheme using various security tools.The outcomes demonstrate that the presented scheme can effectively encrypt and decrypt video signals.In addition,it encrypts videos with a high level of encryption qualitywithout sacrificing its resistance to noise immunity.Finally,the test outcomes demonstrate that the presented scheme is immune to known attacks.展开更多
This paper answers three essential questions for audio speech cryptosystems in time and discrete transform domains.The first question is,what are the best values of sub-keys that must be used to get the best quality a...This paper answers three essential questions for audio speech cryptosystems in time and discrete transform domains.The first question is,what are the best values of sub-keys that must be used to get the best quality and security for the audio cryptosystem in time and discrete transform domains.The second question is the relation between the number of sub-keys,the number of secret keys used,and the audio speech signal block’s size.Finally,how many possible secret keys can be used to get the best quality and security results for the audio speech cryptosystem in time and discrete transform domains.An audio cryptosystem discussed before in recent research is applied to answer the three previous inquiries.Accurate simulation results and analysis answer all three questions;first,there is no specific,well-defined format or rule for sub-key values that must be used to get a better cryptosystem.For the second question,yes,there is a direct relationship between the number of applicable keys,number of available sub-keys,and block size of speech audio signal and formulated into a first-order equation.For the third question,each discrete transform domain has a specific acceptable range of sub-keys that imply a particular number of keys that can be used to get a better cryptosystem.展开更多
This paper introduces an Improved RC6(IRC6)cipher for data encryption based on data-dependent rotations.The proposed scheme is designed with the potential of meeting the needs of the Advanced Encryption Standard(AES)....This paper introduces an Improved RC6(IRC6)cipher for data encryption based on data-dependent rotations.The proposed scheme is designed with the potential of meeting the needs of the Advanced Encryption Standard(AES).Four parameters are used to characterize the proposed scheme.These parameters are the size of the word(w)in bits,the number of rounds(r),the length of the secret key(b)in bytes,and the size of the block(L)in bits.The main feature of IRC6 is the variable number of working registers instead of just four registers as in RC6,resulting in a variable block size for plaintext and ciphertext.The IRC6 cipher is designed to improve the robustness against attacks by increasing the diffusion for each round and providing greater security with fewer rounds.The effectiveness of the proposed IRC6 scheme is verified against theoretical attacks.The proposed IRC6 scheme depends on full diffusion and confusion mechanisms regardless of the utilized block size.The proposed IRC6 scheme saves 70%of the encryption time and 64%of the decryption time of RC6.The simulation results prove that the IRC6 achieves a better encryption/decryption time compared to the traditionalRC6.Therefore,the proposed IRC6 is anticipated to fulfill the market needs and system security requirements.展开更多
基金This study was funded by the Deanship of Scientific Research,Taif University Researchers Supporting Project number(TURSP-2020/08),Taif University,Taif,Saudi Arabia.
文摘Coronavirus(COVID-19)is a contagious disease that causes exceptional effect on healthcare organizationsworldwide with dangerous impact on medical services within the hospitals.Because of the fast spread of COVID-19,the healthcare facilities could be a big source of disease infection.So,healthcare video consultations should be used to decrease face-to-face communication between clinician and patients.Healthcare video consultations may be beneficial for some COVID-19 conditions and reduce the need for faceto-face contact with a potentially positive patient without symptoms.These conditions are like top clinicians who provide remote consultations to develop treatment methodology and follow-up remotely,patients who consult about COVID-19,and those who have mild symptoms suggestive of the COVID-19 virus.Video consultations are a supplement to,and not a substitute for,telephone consultations.It may also form part of a broader COVID-19 distance care strategy that contains computerized screening,separation of possibly infectious patients within medical services,and computerized video-intensive observing of their intensive care that helps reduce mixing.Nowadays,the spread of the COVID-19 virus helps to expand the use of video healthcare consultations because it helps to exchange experiences and remote medical consultations,save costs and health procedures used to cope with the pandemic of the COVID-19 virus,and monitor the progress of treatment plans,moment by moment from a distance with precision,clarity and ease.From this perspective,this paper introduces a high-efficiency video coding(HEVC)ChaCha20-based selective encryption(SE)scheme for secure healthcare video Consultations.The proposed HEVC ChaCha20-based SE scheme uses the ChaCha20 for encrypting the sign bits of the Discrete Cosine Transform(DCT)and Motion Vector Difference(MVD)in the HEVC entropy phase.The main achievement of HEVC ChaCha20-based SE scheme is encrypting the most sensitive video bits with keeping low delay time,fixed bit rate of the HEVC,and format compliance.Experimental tests guarantee that the proposed HEVC ChaCha20-based SE scheme can ensure the confidentiality of the healthcare video consultations which has become easy to transmit through the internet.
基金This research was funded by Deanship of Scientific Research,Taif University Researches Supporting Project number(TURSP-2020/216),Taif University,Taif,Saudi Arabia.
文摘The rapid development in the information technology field has introduced digital watermark technologies as a solution to prevent unauthorized copying and redistribution of data.This article introduces a self-embedded image verification and integrity scheme.The images are firstly split into dedicated segments of the same block sizes.Then,different Analytic Beta-Wavelet(ABW)orthogonal filters are utilized for embedding a self-segment watermark for image segment using a predefined method.ABW orthogonal filter coefficients are estimated to improve image reconstruction under different block sizes.We conduct a comparative study comparing the watermarked images using three kinds of ABW filters for block sizes 64×64,128×128,and 256×256.We embed the watermark using the ABW-based image watermarking method in the 2-level middle frequency sub-bands of the ABW digital image coefficients.The imperceptibility and robustness of the ABW-based image watermarking method image is evaluated based on the Peak Signal to Noise Ratio(PSNR)and Correlation coefficient values.From the implementation results,we came to know that this ABW-based image watermarking method can withstand many image manipulations compared to other existing methods.
基金This study was funded by the Deanship of Scientific Research,Taif University Researchers Supporting Project number(TURSP-2020/08),Taif University,Taif,Saudi Arabia.
文摘Audio communications and computer networking play essential roles in our daily lives,including many domains with different scopes.Developments in these technologies are quick.In consequence,there is a dire need to secure these technologies up to date.This paper presents an efficient model for secure audio signal transmission over the wireless noisy uncorrelated Rayleigh fading channel.Also,the performance of the utilized multiple secret keys-based audio cryptosystem is analyzed in different transformation domains.The discrete cosine transform(DCT),the discrete sine transform(DST),and the discrete wavelet transform(DWT)are investigated in the utilizedmultiple secret key-based audio cryptosystem.Simulation results show consistent results with the wireless noisy channel.The performance of the proposed multiple secret keys-based audio cryptosystem can be ranked concerning the employed domain as DWT,DCT,and DST transform techniques.The simulation experiments proved that the presented multiple secret keysbased audio cryptosystemfor audio signals transmitted over the wireless noisy uncorrelatedRayleigh fading channel achieves reliable and secure wireless link utilizing combined multi security layers.
基金The authors would like to thank the Deanship of Scientific Research,Taif University Researchers Supporting Project Number(TURSP-2020/239),Taif University,Taif,Saudi Arabia for supporting this research work.
文摘Remote sensing image processing engaged researchers’attentiveness in recent years,especially classification.The main problem in classification is the ratio of the correct predictions after training.Feature extraction is the foremost important step to build high-performance image classifiers.The convolution neural networks can extract images’features that significantly improve the image classifiers’accuracy.This paper proposes two efficient approaches for remote sensing images classification that utilizes the concatenation of two convolution channels’outputs as a features extraction using two classic convolution models;these convolution models are the ResNet 50 and the DenseNet 169.These elicited features have been used by the fully connected neural network classifier and support vector machine classifier as input features.The results of the proposed methods are compared with other antecedent approaches in the same experimental environments.Evaluation is based on learning curves plotted during the training of the proposed classifier that is based on a fully connected neural network and measuring the overall accuracy for the both proposed classifiers.The proposed classifiers are used with their trained weights to predict a big remote sensing scene’s classes for a developed test.Experimental results ensure that,compared with the other traditional classifiers,the proposed classifiers are further accurate.
基金The authors would like to thank the Deanship of Scientific Research,Taif University Researchers Supporting Project Number(TURSP-2020/08),Taif University,Taif,Saudi Arabia for supporting this research work.
文摘In the last few years,videos became the most common form of information transmitted over the internet,and a lot of the traffic is confidential and must be protected and delivered safely to its intended users.This introduces the challenges of presenting encryption systems that can encode videos securely and efficiently at the same time.This paper presents an efficient opto-video encryption system using Logistic Adjusted Sine map(LASM)in the Fractional Fourier Transform(FrFT).In the presented opto-video LASM-based FrFT scheme,the encoded video is split into distinct frames and transformed into optical signals utilizing an optical supply.Each of the developed optical video frames is ciphered by utilizing the LASM in optical FrFT system using two-phase modulation forms on the video frame,the first in the time-domain and the second in the FrFT domain.In the end,the ciphervideo frame is spotted utilizing a CCD digital camera and transformed into a digital structure that can be managed using a computer.We test the proposed opto-video LASM-based FrFT scheme using various security tools.The outcomes demonstrate that the presented scheme can effectively encrypt and decrypt video signals.In addition,it encrypts videos with a high level of encryption qualitywithout sacrificing its resistance to noise immunity.Finally,the test outcomes demonstrate that the presented scheme is immune to known attacks.
基金This study was funded by the Deanship of Scientific Research,Taif University Researchers Supporting Project Number(TURSP-2020/08),Taif University,Taif,Saudi Arabia.
文摘This paper answers three essential questions for audio speech cryptosystems in time and discrete transform domains.The first question is,what are the best values of sub-keys that must be used to get the best quality and security for the audio cryptosystem in time and discrete transform domains.The second question is the relation between the number of sub-keys,the number of secret keys used,and the audio speech signal block’s size.Finally,how many possible secret keys can be used to get the best quality and security results for the audio speech cryptosystem in time and discrete transform domains.An audio cryptosystem discussed before in recent research is applied to answer the three previous inquiries.Accurate simulation results and analysis answer all three questions;first,there is no specific,well-defined format or rule for sub-key values that must be used to get a better cryptosystem.For the second question,yes,there is a direct relationship between the number of applicable keys,number of available sub-keys,and block size of speech audio signal and formulated into a first-order equation.For the third question,each discrete transform domain has a specific acceptable range of sub-keys that imply a particular number of keys that can be used to get a better cryptosystem.
基金This study was funded by the Deanship of Scientific Research,Taif University Researchers Supporting Project number(TURSP-2020/08),Taif University,Taif,Saudi Arabia.
文摘This paper introduces an Improved RC6(IRC6)cipher for data encryption based on data-dependent rotations.The proposed scheme is designed with the potential of meeting the needs of the Advanced Encryption Standard(AES).Four parameters are used to characterize the proposed scheme.These parameters are the size of the word(w)in bits,the number of rounds(r),the length of the secret key(b)in bytes,and the size of the block(L)in bits.The main feature of IRC6 is the variable number of working registers instead of just four registers as in RC6,resulting in a variable block size for plaintext and ciphertext.The IRC6 cipher is designed to improve the robustness against attacks by increasing the diffusion for each round and providing greater security with fewer rounds.The effectiveness of the proposed IRC6 scheme is verified against theoretical attacks.The proposed IRC6 scheme depends on full diffusion and confusion mechanisms regardless of the utilized block size.The proposed IRC6 scheme saves 70%of the encryption time and 64%of the decryption time of RC6.The simulation results prove that the IRC6 achieves a better encryption/decryption time compared to the traditionalRC6.Therefore,the proposed IRC6 is anticipated to fulfill the market needs and system security requirements.