In wireless sensor networks (WSNs), security, efficiency, and energy consumption are still major challenges due to its open, large-scale, and resource-constrained nature. The …
Using dynamic surveillance cameras for security has significantly increased the privacy concerns for captured individuals. Malicious users may misuse these videos by performing …
OA Khashan - IEEE Access, 2020 - ieeexplore.ieee.org
Fog computing is a promising paradigm that can mitigate the heavy burden on cloud-central processing of the vast amount of IoT data. Although fog computing has the advantages of …
Image encryption research has seen massive advances in recent times, but many avenues of improvement still remain nascent. This paper takes head on various research challenges …
Securing digital medical images is increasingly becoming a major concern due to the rapid growth of the amount of medical images transferred over a network and stored on the web …
OA Khashan - IEEE Access, 2020 - ieeexplore.ieee.org
Cloud computing is an emerging paradigm that aims to provide computing resources, massive data storage capacity and, flexible data sharing services. The explosive growth of …
Image feature encryption is comprised of feature extraction and feature encryption. The existing feature encryption algorithms aim at extracting edge features as significant …
R Hedayati, S Mostafavi - Wireless Personal Communications, 2022 - Springer
Devices in the Internet of Things (IoT) have resource constraints in terms of energy, computing power, and memory that make them vulnerable to some security attacks. Due to …
Clustering using fuzzy C-means (FCM) is a soft segmentation method that has been extensively investigated and successfully implemented in image segmentation. FCM is …