Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts

AS Patil, R Hamza, A Hassan, N Jiang, H Yan, J Li - Computers & Security, 2020 - Elsevier
Abstract The Internet of Things devices generates a huge amount of sensitive data. Machine
learning is the standard processing paradigm for intelligently handling the huge amount of …

Secure surveillance systems using partial-regeneration-based non-dominated optimization and 5D-chaotic map

G Ghosh, fnm Kavita, D Anand, S Verma, DB Rawat… - Symmetry, 2021 - mdpi.com
Due to Internet of Things (IoT), it has become easy to surveil the critical regions. Images are
important parts of Surveillance Systems, and it is required to protect the images during …

An efficient cryptosystem for video surveillance in the internet of things environment

R Hamza, A Hassan, T Huang, L Ke, H Yan - Complexity, 2019 - Wiley Online Library
Surveillance systems paradigm envisions the pervasive interconnection and cooperation of
interactive devices over the Internet infrastructure. Nevertheless, dissemination and …

Single secret image sharing scheme using neural cryptography

M Gupta, M Gupta, M Deshmukh - Multimedia tools and applications, 2020 - Springer
The goal of the secret sharing is to share a secret information without any leakage to others.
In this paper, we proposed a secure mechanism of sharing secret shares of an image …

Secure patient data transfer using information embedding and hyperchaos

H Aljuaid, SA Parah - Sensors, 2021 - mdpi.com
Health 4.0 is an extension of the Industry standard 4.0 which is aimed at the virtualization of
health-care services. It employs core technologies and services for integrated management …

A secure, efficient and verifiable multimedia data sharing scheme in fog networking system

Y Tu, G Yang, J Wang, Q Su - Cluster Computing, 2021 - Springer
As an emerging and efficient paradigm for multimedia systems, fog networking has attracted
widespread attention over the last few years. However, an increasing number of attacks in …

A robust cryptosystem to enhance the security in speech based person authentication

R Nagakrishnan, A Revathi - Multimedia tools and applications, 2020 - Springer
The developments in technology have made us utilizing speech as a biometric to
authenticate persons. In this paper, speech encryption and decryption algorithm are …

[PDF][PDF] Kavita

G Ghosh - Anand, D, 2022 - academia.edu
Due to Internet of Things (IoT), it has become easy to surveil the critical regions. Images are
important parts of Surveillance Systems, and it is required to protect the images during …

A novel approach of face recognition using optimized adaptive illumination–normalization and KELM

S Dalal, VP Vishwakarma - Arabian Journal for Science and Engineering, 2020 - Springer
Light variations from different directions on the face images cause severe performance
degradation in face recognition system. These variations should be nullified or suppressed …

Extensions on low-complexity DCT approximations for larger blocklengths based on minimal angle similarity

AP Radünz, L Portella, RS Oliveira, FM Bayer… - Journal of Signal …, 2023 - Springer
The discrete cosine transform (DCT) is a central tool for image and video coding because it
can be related to the Karhunen-Loéve transform (KLT), which is the optimal transform in …