[HTML][HTML] Systematic review of deep learning solutions for malware detection and forensic analysis in IoT

SU Qureshi, J He, S Tunio, N Zhu, A Nazir… - Journal of King Saud …, 2024 - Elsevier
The swift proliferation of Internet of Things (IoT) devices has presented considerable
challenges in maintaining cybersecurity. As IoT ecosystems expand, they increasingly attract …

IoT in healthcare: a review of services, applications, key technologies, security concerns, and emerging trends

G Nissar, RA Khan, S Mushtaq, SA Lone… - Multimedia Tools and …, 2024 - Springer
The healthcare industry is experiencing a transformative impact from the Internet of Things
(IoT) revolution, characterized by technological advancements, enhanced economic …

Flbc-ids: a federated learning and blockchain-based intrusion detection system for secure iot environments

A Govindaram - Multimedia Tools and Applications, 2024 - Springer
The development of the Internet of Things (IoT) in multiple sectors has led to substantial
security issues due to its decentralized structure and resource limits. To solve these …

Chaotic synchronization and fractal interpolation-based image encryption: exploring event-triggered impulsive control in variable-order fractional lur'e systems

TMC Priyanka, K Udhayakumar, SS Mohanrasu… - Multimedia Tools and …, 2024 - Springer
This paper investigates the event-triggered impulsive synchronization of a variable-order
fractional chaotic Lur'e system with the application of fractal interpolation based image …

On unique framework-based implementation of a novel image watermarking scheme

A Saha, S Sinha Roy, A Basu… - Multimedia Tools and …, 2024 - Springer
To prevail over the trade-offs among the three major parameters, ie, data transparency,
robustness, and hiding capacity, is an enduring crisis in the domain of digital watermarking …

A new RGB image encryption algorithm based on hyper-chaotic-discrete-wavelet-packet-transform

M Kumar - Multimedia Tools and Applications, 2024 - Springer
The paper proposes a new hyper-chaotic-discrete-wavelet-packet-transform encryption
algorithm for RGB images. The highlight is that the 512-bit hash of timestamp is used to get …

Machine Learning in Chaos-Based Encryption: Theory, Implementations, and Applications

J Hwang, G Kale, PP Patel, R Vishwakarma… - IEEE …, 2023 - ieeexplore.ieee.org
Chaos-based encryption is a promising approach to secure communication due to its
complexity and unpredictability. However, various challenges lie in the design and …

Password based authentication for web based graphics computing services retrieval in cloud

ES Alkhalifah - Multimedia Tools and Applications, 2024 - Springer
In the global environment privacy and security issues were critical to handle the huge
number of participants. Many security-based research works have been undertaken in the …

An efficient Moving object, Encryption, Compression and Interpolation technique for video steganography

R Roselinkiruba, T Sree Sharmila… - Multimedia Tools and …, 2024 - Springer
Video steganography approach has been widely used to preserve the secret information
while transmitting through the internet. This approach has become attractive among many …

Image steganography techniques for resisting statistical steganalysis attacks: A systematic literature review

R Apau, M Asante, F Twum, J Ben Hayfron-Acquah… - Plos one, 2024 - journals.plos.org
Information hiding in images has gained popularity. As image steganography gains
relevance, techniques for detecting hidden messages have emerged. Statistical …