CryptoGA: a cryptosystem based on genetic algorithm for cloud data security

M Tahir, M Sardaraz, Z Mehmood, S Muhammad - Cluster Computing, 2021 - Springer
Cloud Computing is referred to as a set of hardware and software that are being combined
to deliver various services of computing. The cloud keeps the services for delivery of …

A robust blind medical image watermarking approach for telemedicine applications

F Kahlessenane, A Khaldi, R Kafi, S Euschi - Cluster computing, 2021 - Springer
In order to enhance the security of exchanged medical images in telemedicine, we propose
in this paper a blind and robust approach for medical image protection. This approach …

Secure video communication using firefly optimization and visual cryptography

M Kumar, J Aggarwal, A Rani, T Stephan… - Artificial Intelligence …, 2022 - Springer
In recent years, we face an increasing interest in protecting multimedia data and copyrights
due to the high exchange of information. Attackers are trying to get confidential information …

Privacy-preservation techniques for IoT devices: a systematic mapping study

D Torre, A Chennamaneni, A Rodriguez - IEEE Access, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) is becoming a pervasive technology entangled in everyday life.
The objective of IoT is to provide ubiquitous access to numerous devices and machines on …

Analysis of ransomware attack and their countermeasures: A review

N Sharma, R Shanker - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
Ransomware is a type of malicious software. Computers infected with ransomware have
restricted access to the system. It is a malicious program, and money must be provided to the …

Framework of data privacy preservation and location obfuscation in vehicular cloud networks

H Al‐Balasmeh, M Singh… - … and Computation: Practice …, 2022 - Wiley Online Library
The leakage of sensitive data of users and global positioning system location trajectories
from different cloud computation sources have increased in daily lives. This critical problem …

Joint image encryption and screen-cam robust two watermarking scheme

W Chen, N Ren, C Zhu, A Keskinarkaus, T Seppänen… - Sensors, 2021 - mdpi.com
This paper proposes a joint encryption and screen-cam robust watermarking scheme. This
method combines the advantages of smartphone, encryption and watermarking …

A high-capacity reversible data-hiding scheme for medical image transmission using modified elias gamma encoding

VM Manikandan, KSR Murthy, B Siddineni, N Victor… - Electronics, 2022 - mdpi.com
Reversible data hiding (RDH) is a recently emerged research domain in the field of
information security domain with broad applications in medical images and meta-data …

A multi-layer security system for data access control, authentication, and authorization

T Kaiser, R Siddiqua, MMU Hasan - 2022 - dspace.bracu.ac.bd
Multi-Factor-Authentication is one of the most used services nowadays by all kinds of
people, especially by many organizations. People use this service to authorize their stored …

A new highly fractal 1D-chaotic map-based novel encryption on HVS-based watermarked Fundus images for 2-level security in teleophthalmology applications

M Amrutha, A Kannammal - Physica Scripta, 2023 - iopscience.iop.org
In recent years the combination of medical image watermarking and encryption is becoming
popular due to a better trade-off between authenticity and security, since, each of these …