期刊文献+
共找到2,909篇文章
< 1 2 146 >
每页显示 20 50 100
Image Encryption and Decryption Based on Chaotic Algorithm
1
作者 Yue Hu Ruyue Tian 《Journal of Applied Mathematics and Physics》 2020年第9期1814-1825,共12页
This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by inform... This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by information entropy analysis it is concluded that the security of this algorithm is higher compared with the original image;And a new image encryption and decryption algorithm based on the combination of two-stage Logistic mapping and <i>M</i> sequence is proposed. This new algorithm is very sensitive to keys;the key space is large and its security is higher than two-stage Logistic mapping of image encryption and decryption technology. 展开更多
关键词 Chaos algorithm Image encryption and decryption Two-Stage Logistic Mapping M Sequence
下载PDF
Enhancing IoT Data Security with Lightweight Blockchain and Okamoto Uchiyama Homomorphic Encryption 被引量:1
2
作者 Mohanad A.Mohammed Hala B.Abdul Wahab 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1731-1748,共18页
Blockchain technology has garnered significant attention from global organizations and researchers due to its potential as a solution for centralized system challenges.Concurrently,the Internet of Things(IoT)has revol... Blockchain technology has garnered significant attention from global organizations and researchers due to its potential as a solution for centralized system challenges.Concurrently,the Internet of Things(IoT)has revolutionized the Fourth Industrial Revolution by enabling interconnected devices to offer innovative services,ultimately enhancing human lives.This paper presents a new approach utilizing lightweight blockchain technology,effectively reducing the computational burden typically associated with conventional blockchain systems.By integrating this lightweight blockchain with IoT systems,substantial reductions in implementation time and computational complexity can be achieved.Moreover,the paper proposes the utilization of the Okamoto Uchiyama encryption algorithm,renowned for its homomorphic characteristics,to reinforce the privacy and security of IoT-generated data.The integration of homomorphic encryption and blockchain technology establishes a secure and decentralized platformfor storing and analyzing sensitive data of the supply chain data.This platformfacilitates the development of some business models and empowers decentralized applications to perform computations on encrypted data while maintaining data privacy.The results validate the robust security of the proposed system,comparable to standard blockchain implementations,leveraging the distinctive homomorphic attributes of the Okamoto Uchiyama algorithm and the lightweight blockchain paradigm. 展开更多
关键词 Blockchain IOT integration of IoT and blockchain consensus algorithm Okamoto Uchiyama homomorphic encryption lightweight blockchain
下载PDF
Fortifying Healthcare Data Security in the Cloud:A Comprehensive Examination of the EPM-KEA Encryption Protocol
3
作者 Umi Salma Basha Shashi Kant Gupta +2 位作者 Wedad Alawad SeongKi Kim Salil Bharany 《Computers, Materials & Continua》 SCIE EI 2024年第5期3397-3416,共20页
A new era of data access and management has begun with the use of cloud computing in the healthcare industry.Despite the efficiency and scalability that the cloud provides, the security of private patient data is stil... A new era of data access and management has begun with the use of cloud computing in the healthcare industry.Despite the efficiency and scalability that the cloud provides, the security of private patient data is still a majorconcern. Encryption, network security, and adherence to data protection laws are key to ensuring the confidentialityand integrity of healthcare data in the cloud. The computational overhead of encryption technologies could leadto delays in data access and processing rates. To address these challenges, we introduced the Enhanced ParallelMulti-Key Encryption Algorithm (EPM-KEA), aiming to bolster healthcare data security and facilitate the securestorage of critical patient records in the cloud. The data was gathered from two categories Authorization forHospital Admission (AIH) and Authorization for High Complexity Operations.We use Z-score normalization forpreprocessing. The primary goal of implementing encryption techniques is to secure and store massive amountsof data on the cloud. It is feasible that cloud storage alternatives for protecting healthcare data will become morewidely available if security issues can be successfully fixed. As a result of our analysis using specific parametersincluding Execution time (42%), Encryption time (45%), Decryption time (40%), Security level (97%), and Energyconsumption (53%), the system demonstrated favorable performance when compared to the traditional method.This suggests that by addressing these security concerns, there is the potential for broader accessibility to cloudstorage solutions for safeguarding healthcare data. 展开更多
关键词 Cloud computing healthcare data security enhanced parallel multi-key encryption algorithm(EPM-KEA)
下载PDF
Lossless embedding: A visually meaningful image encryption algorithm based on hyperchaos and compressive sensing 被引量:1
4
作者 王兴元 王哓丽 +2 位作者 滕琳 蒋东华 咸永锦 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第2期136-149,共14页
A novel visually meaningful image encryption algorithm is proposed based on a hyperchaotic system and compressive sensing(CS), which aims to improve the visual security of steganographic image and decrypted quality. F... A novel visually meaningful image encryption algorithm is proposed based on a hyperchaotic system and compressive sensing(CS), which aims to improve the visual security of steganographic image and decrypted quality. First, a dynamic spiral block scrambling is designed to encrypt the sparse matrix generated by performing discrete wavelet transform(DWT)on the plain image. Then, the encrypted image is compressed and quantified to obtain the noise-like cipher image. Then the cipher image is embedded into the alpha channel of the carrier image in portable network graphics(PNG) format to generate the visually meaningful steganographic image. In our scheme, the hyperchaotic Lorenz system controlled by the hash value of plain image is utilized to construct the scrambling matrix, the measurement matrix and the embedding matrix to achieve higher security. In addition, compared with other existing encryption algorithms, the proposed PNG-based embedding method can blindly extract the cipher image, thus effectively reducing the transmission cost and storage space. Finally, the experimental results indicate that the proposed encryption algorithm has very high visual security. 展开更多
关键词 chaotic image encryption compressive sensing meaningful cipher image portable network graphics image encryption algorithm
下载PDF
Asymmetric image encryption algorithm based on a new three-dimensional improved logistic chaotic map 被引量:1
5
作者 叶国栋 吴惠山 +1 位作者 黄小玲 Syh-Yuan Tan 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第3期153-163,共11页
Based on some analyses of existing chaotic image encryption frameworks and a new designed three-dimensional improved logistic chaotic map(3D-ILM),an asymmetric image encryption algorithm using public-key Rivest–Shami... Based on some analyses of existing chaotic image encryption frameworks and a new designed three-dimensional improved logistic chaotic map(3D-ILM),an asymmetric image encryption algorithm using public-key Rivest–Shamir–Adleman(RSA)is presented in this paper.In the first stage,a new 3D-ILM is proposed to enhance the chaotic behavior considering analysis of time sequence,Lyapunov exponent,and Shannon entropy.In the second stage,combined with the public key RSA algorithm,a new key acquisition mathematical model(MKA)is constructed to obtain the initial keys for the 3D-ILM.Consequently,the key stream can be produced depending on the plain image for a higher security.Moreover,a novel process model(NPM)for the input of the 3D-ILM is built,which is built to improve the distribution uniformity of the chaotic sequence.In the third stage,to encrypt the plain image,a pre-process by exclusive OR(XOR)operation with a random matrix is applied.Then,the pre-processed image is performed by a permutation for rows,a downward modulo function for adjacent pixels,a permutation for columns,a forward direction XOR addition-modulo diffusion,and a backward direction XOR addition-modulo diffusion to achieve the final cipher image.Moreover,experiments show that the the proposed algorithm has a better performance.Especially,the number of pixels change rate(NPCR)is close to ideal case 99.6094%,with the unified average changing intensity(UACI)close to 33.4634%,and the information entropy(IE)close to 8. 展开更多
关键词 three-dimensional improved logistic chaotic map(3D-ILM) Rivest–Shamir–Adleman(RSA)algorithm image encryption CONFUSION ENTROPY
下载PDF
An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms
6
作者 Muhammad Nadeem Ali Arshad +4 位作者 Saman Riaz Syeda Wajiha Zahra Ashit Kumar Dutta Moteeb Al Moteri Sultan Almotairi 《Computers, Materials & Continua》 SCIE EI 2023年第2期4059-4079,共21页
Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure form.Cloud cryptography is a data encryption mechanism that consists of different steps and preve... Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure form.Cloud cryptography is a data encryption mechanism that consists of different steps and prevents the attacker from misusing the data.This paper has developed an efficient algorithm to protect the data from invaders and secure the data from misuse.If this algorithm is applied to the cloud network,the attacker will not be able to access the data.To encrypt the data,the values of the bytes have been obtained by converting the plain text to ASCII.A key has been generated using the Non-Deterministic Bit Generator(NRBG)mechanism,and the key is XNORed with plain text bits,and then Bit toggling has been implemented.After that,an efficient matrix cipher encryption algorithm has been developed,and this algorithm has been applied to this text.The capability of this algorithm is that with its help,a key has been obtained from the plain text,and only by using this key can the data be decrypted in the first steps.A plain text key will never be used for another plain text.The data has been secured by implementing different mechanisms in both stages,and after that,a ciphertext has been obtained.At the end of the article,the latest technique will be compared with different techniques.There will be a discussion on how the present technique is better than all the other techniques;then,the conclusion will be drawn based on comparative analysis. 展开更多
关键词 Symmetric CRYPTOGRAPHY CIPHERTEXT encryption decryption cloud security matrix cipher
下载PDF
Multivariate Broadcast Encryption with Group Key Algorithm for Secured IoT
7
作者 M.Suresh Kumar T.Purosothaman 《Computer Systems Science & Engineering》 SCIE EI 2023年第4期925-938,共14页
The expanding and ubiquitous availability of the Internet of Things(IoT)have changed everyone’s life easier and more convenient.Same time it also offers a number of issues,such as effectiveness,security,and excessive... The expanding and ubiquitous availability of the Internet of Things(IoT)have changed everyone’s life easier and more convenient.Same time it also offers a number of issues,such as effectiveness,security,and excessive power consumption,which constitute a danger to intelligent IoT-based apps.Group managing is primarily used for transmitting and multi-pathing communications that are secured with a general group key and it can only be decrypted by an authorized group member.A centralized trustworthy system,which is in charge of key distribution and upgrades,is used to maintain group keys.To provide longitudinal access controls,Software Defined Network(SDN)based security controllers are employed for group administration services.Cloud service providers provide a variety of security features.There are just a few software security answers available.In the proposed system,a hybrid protocols were used in SDN and it embeds edge system to improve the security in the group communication.Tree-based algorithms compared with Group Key Establishment(GKE)and Multivariate public key cryptosystem with Broadcast Encryption in the proposed system.When all factors are considered,Broadcast Encryption(BE)appears to become the most logical solution to the issue.BE enables an initiator to send encrypted messages to a large set of recipients in a efficient and productive way,meanwhile assuring that the data can only be decrypted by defining characteristic.The proposed method improves the security,efficiency of the system and reduces the power consumption and minimizes the cost. 展开更多
关键词 Internet of things encryption decryption group key software defined network public key security
下载PDF
Digital Image Encryption Algorithm Based on Double Chaotic Map and LSTM
8
作者 Luoyin Feng Jize Du Chong Fu 《Computers, Materials & Continua》 SCIE EI 2023年第11期1645-1662,共18页
In the era of network communication,digital image encryption(DIE)technology is critical to ensure the security of image data.However,there has been limited research on combining deep learning neural networks with chao... In the era of network communication,digital image encryption(DIE)technology is critical to ensure the security of image data.However,there has been limited research on combining deep learning neural networks with chaotic mapping for the encryption of digital images.So,this paper addresses this gap by studying the generation of pseudo-random sequences(PRS)chaotic signals using dual logistic chaotic maps.These signals are then predicted using long and short-term memory(LSTM)networks,resulting in the reconstruction of a new chaotic signal.During the research process,it was discovered that there are numerous training parameters associated with the LSTM network,which can hinder training efficiency.To overcome this challenge and improve training efficiency,the paper proposes an improved particle swarm optimization(IPSO)algorithm to optimize the LSTM network.Subsequently,the obtained chaotic signal from the optimized model training is further scrambled,obfuscated,and diffused to achieve the final encrypted image.This research presents a digital image encryption(DIE)algorithm based on a double chaotic map(DCM)and LSTM.The algorithm demonstrates a high average NPCR(Number of Pixel Change Rate)of 99.56%and a UACI(Unified Average Changing Intensity)value of 33.46%,indicating a strong ability to resist differential attacks.Overall,the proposed algorithm realizes secure and sensitive digital image encryption,ensuring the protection of personal information in the Internet environment. 展开更多
关键词 Digital image encryption LSTM particle swarm optimization algorithm DCM
下载PDF
Encryption and Decryption of Color Images through Random Disruption of Rows and Columns
9
作者 ZENG Jianhua ZHAN Yanlin YANG Jianrong 《Journal of Donghua University(English Edition)》 EI CAS 2020年第3期245-255,共11页
In modern society,information is becoming increasingly interconnected through networks,and the rapid development of information technology has caused people to pay more attention to the encryption and the protection o... In modern society,information is becoming increasingly interconnected through networks,and the rapid development of information technology has caused people to pay more attention to the encryption and the protection of information.Image encryption technology is a key technology for ensuring the security performance of images.We extracted single channel RGB component images from a color image using MATLAB programs,encrypted and decrypted the color images by randomly disrupting rows,columns and regions of the image.Combined with histograms and the visual judgments of encryption images,it is shown that the information of the original image cannot be obtained from the encryption image easily.The results show that the color-image encryptions with the algorithm we used have good effect and fast operation speed.Thus this algorithm has certain practical value. 展开更多
关键词 color image encryption decryption single channel RGB component image disrupting
下载PDF
A realizable quantum encryption algorithm for qubits 被引量:5
10
作者 周南润 曾贵华 《Chinese Physics B》 SCIE EI CAS CSCD 2005年第11期2164-2169,共6页
A realizable quantum encryption algorithm for qubits is presented by employing bit-wise quantum computation. System extension and bit-swapping are introduced into the encryption process, which makes the ciphertext spa... A realizable quantum encryption algorithm for qubits is presented by employing bit-wise quantum computation. System extension and bit-swapping are introduced into the encryption process, which makes the ciphertext space expanded greatly. The security of the proposed algorithm is analysed in detail and the schematic physical implementation is also provided. It is shown that the algorithm, which can prevent quantum attack strategy as well as classical attack strategy, is effective to protect qubits. Finally, we extend our algorithm to encrypt classical binary bits and quantum entanglements. 展开更多
关键词 quantum encryption algorithm quantum computation CRYPTOGRAPHY
下载PDF
An Image Encryption Algorithm Based on BP Neural Network and Hyperchaotic System 被引量:8
11
作者 Feifei Yang Jun Mou +1 位作者 Yinghong Cao Ran Chu 《China Communications》 SCIE CSCD 2020年第5期21-28,共8页
To reduce the bandwidth and storage resources of image information in communication transmission, and improve the secure communication of information. In this paper, an image compression and encryption algorithm based... To reduce the bandwidth and storage resources of image information in communication transmission, and improve the secure communication of information. In this paper, an image compression and encryption algorithm based on fractional-order memristive hyperchaotic system and BP neural network is proposed. In this algorithm, the image pixel values are compressed by BP neural network, the chaotic sequences of the fractional-order memristive hyperchaotic system are used to diffuse the pixel values. The experimental simulation results indicate that the proposed algorithm not only can effectively compress and encrypt image, but also have better security features. Therefore, this work provides theoretical guidance and experimental basis for the safe transmission and storage of image information in practical communication. 展开更多
关键词 BP neural network fractional-order hyperchaotic system image encryption algorithm secure communication
下载PDF
Decryption of pure-position permutation algorithms 被引量:3
12
作者 赵晓宇 陈刚 +2 位作者 张亶 王肖虹 董光昌 《Journal of Zhejiang University Science》 EI CSCD 2004年第7期803-809,共7页
Pure position permutation image encryption algorithms, commonly used as image encryption investigated in this work are unfortunately frail under known-text attack. In view of the weakness of pure position permutation ... Pure position permutation image encryption algorithms, commonly used as image encryption investigated in this work are unfortunately frail under known-text attack. In view of the weakness of pure position permutation algorithm,we put forward an effective decryption algorithm for all pure-position permutation algorithms. First, a summary of the pure position permutation image encryption algorithms is given by introducing the concept of ergodic matrices. Then, by using probability theory and algebraic principles, the decryption probability of pure-position permutation algorithms is verified theoretically; and then, by defining the operation system of fuzzy ergodic matrices, we improve a specific decryption al-gorithm. Finally, some simulation results are shown. 展开更多
关键词 decryption Image encryption FUZZY Position permutation
下载PDF
VLSI Implementation of Optimized 2D SIMM Chaotic Map for Image Encryption
13
作者 M.Sundar Prakash Balaji V.R.Vijaykumar +2 位作者 Kamalraj Subramaniam M.Kannan V.Ayyem Pillai 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期3155-3168,共14页
The current research work proposed a novel optimization-based 2D-SIMM(Two-Dimensional Sine Iterative chaotic map with infinite collapse Mod-ulation Map)model for image encryption.The proposed 2D-SIMM model is derived o... The current research work proposed a novel optimization-based 2D-SIMM(Two-Dimensional Sine Iterative chaotic map with infinite collapse Mod-ulation Map)model for image encryption.The proposed 2D-SIMM model is derived out of sine map and Iterative Chaotic Map with Infinite Collapse(ICMIC).In this technique,scrambling effect is achieved with the help of Chaotic Shift Transform(CST).Chaotic Shift Transform is used to change the value of pixels in the input image while the substituted value is cyclically shifted according to the chaotic sequence generated by 2D-SIMM model.These chaotic sequences,generated using 2D-SIMM model,are sensitive to initial conditions.In the proposed algorithm,these initial conditions are optimized using JAYA optimization algorithm.Correlation coefficient and entropy are considered asfitness functions in this study to evaluate the best solution for initial conditions.The simulation results clearly shows that the proposed algorithm achieved a better performance over existing algorithms.In addition,the VLSI implementation of the proposed algorithm was also carried out using Xilinx system generator.With optimization,the correlation coefficient was-0.014096 and without optimization,it was 0.002585. 展开更多
关键词 Chaotic mapping 2D-SIMM encryption decryption jaya optimization
下载PDF
Secured Access Policy in Ciphertext-Policy Attribute-Based Encryption for Cloud Environment
14
作者 P.Prathap Nayudu Krovi Raja Sekhar 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期1079-1092,共14页
The cloud allows clients to store and share data.Depending on the user’s needs,it is imperative to design an effective access control plan to share the information only with approved users.The user loses control of t... The cloud allows clients to store and share data.Depending on the user’s needs,it is imperative to design an effective access control plan to share the information only with approved users.The user loses control of their data when the data is outsourced to the cloud.Therefore,access control mechanisms will become a significant challenging problem.The Ciphertext-Policy Attribute-Based Encryption(CP-ABE)is an essential solution in which the user can control data access.CP-ABE encrypts the data under a limited access policy after the user sets some access policies.The user can decrypt the data if they satisfy the limited access policy.Although CP-ABE is an effective access control program,the privacy of the policy might be compromised by the attackers.Namely,the attackers can gather important information from plain text policy.To address this issue,the SHA-512 algorithm is presented to create a hash code for the user’s attributes in this paper.Depending on the created hash codes,an access policy will be formed.It leads to protecting the access policy against attacks.The effectiveness of the proposed scheme is assessed based on decryption time,private key generation time,ciphertext generation time,and data verification time. 展开更多
关键词 Cloud computing access policy CP-ABE hash code SHA-512 ATTRIBUTE CIPHERTEXT encryption decryption
下载PDF
A self-cited pixel summation based image encryption algorithm 被引量:1
15
作者 Guo-Dong Ye Xiao-Ling Huang +1 位作者 Leo Yu Zhang Zheng-Xia Wang 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第1期131-138,共8页
In this paper, a novel image encryption algorithm is presented based on self-cited pixel summation. With the classical mechanism of permutation plus diffusion, a pixel summation of the plain image is employed to make ... In this paper, a novel image encryption algorithm is presented based on self-cited pixel summation. With the classical mechanism of permutation plus diffusion, a pixel summation of the plain image is employed to make a gravity influence on the pixel positions in the permutation stage. Then, for each pixel in every step of the diffusion stage, the pixel summation calculated from the permuted image is updated. The values from a chaotic sequence generated by an intertwining logistic map are selected by this summation. Consequently, the keystreams generated in both stages are dependent on both the plain image and the permuted image. Because of the sensitivity of the chaotic map to its initial conditions and the plain-imagedependent keystreams, any tiny change in the secret key or the plain image would lead to a significantly different cipher image. As a result, the proposed encryption algorithm is immune to the known plaintext attack(KPA) and the chosen plaintext attack(CPA). Moreover, experimental simulations and security analyses show that the proposed permutationdiffusion encryption scheme can achieve a satisfactory level of security. 展开更多
关键词 pixel summation image encryption algorithm intertwining logistic map GRAVITY SECURITY
下载PDF
Air target recognition method against ISRJ for radio frequency proximity sensors using chaotic stream encryption
16
作者 Jian-feng Li Jian Dai +2 位作者 Xin-hong Hao Xiao-peng Yan Xin-wei Wang 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2023年第10期267-279,共13页
The interrupted-sampling repeater jamming(ISRJ)can cause false targets to the radio-frequency proximity sensors(RFPSs),resulting in a serious decline in the target detection capability of the RFPS.This article propose... The interrupted-sampling repeater jamming(ISRJ)can cause false targets to the radio-frequency proximity sensors(RFPSs),resulting in a serious decline in the target detection capability of the RFPS.This article proposes a recognition method for RFPSs to identify the false targets caused by ISRJ.The proposed method is realized by assigning a unique identity(ID)to each RFPS,and each ID is a periodically and chaotically encrypted in every pulse period.The processing technique of the received signal is divided into ranging and ID decryption.In the ranging part,a high-resolution range profile(HRRP)can be obtained by performing pulse compression with the binary chaotic sequences.To suppress the noise,the singular value decomposition(SVD)is applied in the preprocessing.Regarding ID decryption,targets and ISRJ can be recognized through the encryption and decryption processes,which are controlled by random keys.An adaptability analysis conducted in terms of the peak-to-side lobe ratio(PSLR)and bit error rate(BER)indicates that the proposed method performs well within a 70-k Hz Doppler shift.A simulation and experimental results show that the proposed method achieves extremely stable target and ISRJ recognition accuracies at different signal-to-noise ratios(SNRs)and jamming-to-signal ratios(JSRs). 展开更多
关键词 Interrupted-sampling repeater jamming(ISRJ) Radio frequency proximity sensors(RFPS) Chaotic stream encryption Air target recognition Identity(ID)decryption
下载PDF
Asymmetrical Quantum Encryption Protocol Based on Quantum Search Algorithm 被引量:2
17
作者 LUO Wenjun LIU Guanli 《China Communications》 SCIE CSCD 2014年第9期104-111,共8页
Quantum cryptography and quantum search algorithm are considered as two important research topics in quantum information science.An asymmetrical quantum encryption protocol based on the properties of quantum one-way f... Quantum cryptography and quantum search algorithm are considered as two important research topics in quantum information science.An asymmetrical quantum encryption protocol based on the properties of quantum one-way function and quantum search algorithm is proposed.Depending on the no-cloning theorem and trapdoor one-way functions of the publickey,the eavesdropper cannot extract any private-information from the public-keys and the ciphertext.Introducing key-generation randomized logarithm to improve security of our proposed protocol,i.e.,one privatekey corresponds to an exponential number of public-keys.Using unitary operations and the single photon measurement,secret messages can be directly sent from the sender to the receiver.The security of the proposed protocol is proved that it is informationtheoretically secure.Furthermore,compared the symmetrical Quantum key distribution,the proposed protocol is not only efficient to reduce additional communication,but also easier to carry out in practice,because no entangled photons and complex operations are required. 展开更多
关键词 quantum cryptography asymmetrical encryption information-theoreticalsecurity quantum search algorithms
下载PDF
Health Data Deduplication Using Window Chunking-Signature Encryption in Cloud
18
作者 G.Neelamegam P.Marikkannu 《Intelligent Automation & Soft Computing》 SCIE 2023年第4期1079-1093,共15页
Due to the development of technology in medicine,millions of health-related data such as scanning the images are generated.It is a great challenge to store the data and handle a massive volume of data.Healthcare data ... Due to the development of technology in medicine,millions of health-related data such as scanning the images are generated.It is a great challenge to store the data and handle a massive volume of data.Healthcare data is stored in the cloud-fog storage environments.This cloud-Fog based health model allows the users to get health-related data from different sources,and duplicated informa-tion is also available in the background.Therefore,it requires an additional sto-rage area,increase in data acquisition time,and insecure data replication in the environment.This paper is proposed to eliminate the de-duplication data using a window size chunking algorithm with a biased sampling-based bloomfilter and provide the health data security using the Advanced Signature-Based Encryp-tion(ASE)algorithm in the Fog-Cloud Environment(WCA-BF+ASE).This WCA-BF+ASE eliminates the duplicate copy of the data and minimizes its sto-rage space and maintenance cost.The data is also stored in an efficient and in a highly secured manner.The security level in the cloud storage environment Win-dows Chunking Algorithm(WSCA)has got 86.5%,two thresholds two divisors(TTTD)80%,Ordinal in Python(ORD)84.4%,Boom Filter(BF)82%,and the proposed work has got better security storage of 97%.And also,after applying the de-duplication process,the proposed method WCA-BF+ASE has required only less storage space for variousfile sizes of 10 KB for 200,400 MB has taken only 22 KB,and 600 MB has required 35 KB,800 MB has consumed only 38 KB,1000 MB has taken 40 KB of storage spaces. 展开更多
关键词 Health data encryption chunks CLOUD FOG DEDUPLICATION bloomfilter algorithm 3:Generation of Key
下载PDF
A Practical SSL Server Performance Improvement Algorithm Based on Batch RSA Decryption 被引量:2
19
作者 李世群 吴永东 +1 位作者 周建英 陈克非 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第1期67-70,共4页
The secure socket layer/ transport layer security(SSL/TLS) handshake protocol uses public key cryptographic algorithms such as RSA for key establishment. Typically, public key cryptographic algorithm is computationa... The secure socket layer/ transport layer security(SSL/TLS) handshake protocol uses public key cryptographic algorithms such as RSA for key establishment. Typically, public key cryptographic algorithm is computational intensive due to the modular multiplications. Therefore, SSL/TLS servers often become swamped while performing public key decryptions when the simultaneous requests increase quickly. A batch RSA decryption algorithm was proposed. The novel algorithm provides the reasonable response time and optimizes server performance significantly. The decryption speedup is proportional to the batch size b, for instance, the speedup factor is 4, while in Shacham's scheme the acceleration rate is only 2.5 when b = 4. 展开更多
关键词 batch decryption secure socket layer (SSL) server public key algorithm
下载PDF
Applying and Comparison of Chaotic-Based Permutation Algorithms for Audio Encryption 被引量:1
20
作者 Osama M.Abu Zaid Medhat A.Tawfeek Saad Alanazi 《Computers, Materials & Continua》 SCIE EI 2021年第6期3161-3176,共16页
This research presents,and claries the application of two permutation algorithms,based on chaotic map systems,and applied to a le of speech signals.They are the Arnold cat map-based permutation algorithm,and the Baker... This research presents,and claries the application of two permutation algorithms,based on chaotic map systems,and applied to a le of speech signals.They are the Arnold cat map-based permutation algorithm,and the Baker’s chaotic map-based permutation algorithm.Both algorithms are implemented on the same speech signal sample.Then,both the premier and the encrypted le histograms are documented and plotted.The speech signal amplitude values with time signals of the original le are recorded and plotted against the encrypted and decrypted les.Furthermore,the original le is plotted against the encrypted le,using the spectrogram frequencies of speech signals with the signal duration.These permutation algorithms are used to shufe the positions of the speech les signals’values without any changes,to produce an encrypted speech le.A comparative analysis is introduced by using some of sundry statistical and experimental analyses for the procedures of encryption and decryption,e.g.,the time of both procedures,the encrypted audio signals histogram,the correlation coefcient between specimens in the premier and encrypted signals,a test of the Spectral Distortion(SD),and the Log-Likelihood Ratio(LLR)measures.The outcomes of the different experimental and comparative studies demonstrate that the two permutation algorithms(Baker and Arnold)are sufcient for providing an efcient and reliable voice signal encryption solution.However,the Arnold’s algorithm gives better results in most cases as compared to the results of Baker’s algorithm. 展开更多
关键词 Arnold’s cat map chaotic maps permutation algorithms speech encryption Baker’s chaotic map
下载PDF
上一页 1 2 146 下一页 到第
使用帮助 返回顶部