You are currently viewing a new version of our website. To view the old version click .

75 Results Found

  • Article
  • Open Access
2 Citations
3,490 Views
19 Pages

15 February 2023

Hash is one of the most widely used methods for computing efficiency and storage efficiency. With the development of deep learning, the deep hash method shows more advantages than traditional methods. This paper proposes a method to convert entities...

  • Article
  • Open Access
8 Citations
4,315 Views
13 Pages

CNN Feature-Based Image Copy Detection with Contextual Hash Embedding

  • Zhili Zhou,
  • Meimin Wang,
  • Yi Cao and
  • Yuecheng Su

17 July 2020

As one of the important techniques for protecting the copyrights of digital images, content-based image copy detection has attracted a lot of attention in the past few decades. The traditional content-based copy detection methods usually extract loca...

  • Article
  • Open Access
1 Citations
3,050 Views
18 Pages

19 September 2022

In the context of “double carbon”, as a traditional high energy consumption industry, the textile industry is facing the severe challenges of energy saving and emission reduction. To improve production efficiency in the textile industry,...

  • Article
  • Open Access
58 Views
27 Pages

Ensuring the integrity of medical images is essential to securing clinical workflows, telemedicine platforms, and healthcare IoT environments. Existing watermarking and reversible data-hiding approaches often modify pixel intensities, reducing diagno...

  • Article
  • Open Access
11 Citations
3,226 Views
21 Pages

Deep Hash Remote-Sensing Image Retrieval Assisted by Semantic Cues

  • Pingping Liu,
  • Zetong Liu,
  • Xue Shan and
  • Qiuzhan Zhou

15 December 2022

With the significant and rapid growth in the number of remote-sensing images, deep hash methods have become a research topic. The main work of deep hash method is to build a discriminate embedding space through the similarity relation between sample...

  • Communication
  • Open Access
33 Citations
7,510 Views
12 Pages

25 December 2020

Imagechain is a cryptographic structure that chain digital images with hash links. The most important feature, which differentiates it from blockchain, is that the pictures are not stored inside the blocks. Instead, the block and the image are combin...

  • Article
  • Open Access
5 Citations
2,625 Views
22 Pages

In today’s digital age, ensuring the secure transmission of confidential data through various means of communication is crucial. Protecting the data from malicious attacks during transmission poses a significant challenge. To achieve this, reve...

  • Article
  • Open Access
857 Views
27 Pages

Robust Supervised Deep Discrete Hashing for Cross-Modal Retrieval

  • Xiwei Dong,
  • Fei Wu,
  • Junqiu Zhai,
  • Fei Ma,
  • Guangxing Wang,
  • Tao Liu,
  • Xiaogang Dong and
  • Xiao-Yuan Jing

The exponential growth of multi-modal data in the real world poses significant challenges to efficient retrieval, and traditional single-modal methods are no longer suitable for the growth of multi-modal data. To address this issue, hashing retrieval...

  • Article
  • Open Access
38 Citations
8,684 Views
20 Pages

10 February 2018

Hyperspectral images are one of the most important fundamental and strategic information resources, imaging the same ground object with hundreds of spectral bands varying from the ultraviolet to the microwave. With the emergence of huge volumes of hi...

  • Article
  • Open Access
590 Views
32 Pages

30 June 2025

With the increasing integration of augmented reality (AR) in various applications, ensuring secure access and content authenticity has become a critical challenge. This paper proposes an innovative and robust authentication framework for protecting A...

  • Article
  • Open Access
9 Citations
3,649 Views
18 Pages

Fast Fallback Watermark Detection Using Perceptual Hashes

  • Hannes Mareen,
  • Niels Van Kets,
  • Peter Lambert and
  • Glenn Van Wallendael

Forensic watermarking is often used to enable the tracing of digital pirates that leak copyright-protected videos. However, existing watermarking methods have a limited robustness and may be vulnerable to targeted attacks. Our previous work proposed...

  • Article
  • Open Access
5 Citations
2,006 Views
14 Pages

High-Performance Encryption Algorithms for Dynamic Images Transmission

  • Ying Yang,
  • Xingchuang Xiong,
  • Zilong Liu,
  • Shangzhong Jin and
  • Juan Wang

28 December 2023

With the proliferation of the internet, the issue of image tampering has escalated, necessitating robust image encryption schemes. Despite the multitude of proposed image encryption algorithms, challenges such as slow computational speed, weak securi...

  • Article
  • Open Access
4 Citations
4,237 Views
20 Pages

13 April 2021

Since the Keccak algorithm was selected by the US National Institute of Standards and Technology (NIST) as the standard SHA-3 hash algorithm for replacing the currently used SHA-2 algorithm in 2015, various optimization methods have been studied in p...

  • Article
  • Open Access
14 Citations
4,191 Views
27 Pages

13 January 2022

Authentication is essential for the prevention of various types of attacks in fog/edge computing. So, a novel mode-based hash chain for secure mutual authentication is necessary to address the Internet of Things (IoT) devices’ vulnerability, as there...

  • Article
  • Open Access
851 Views
19 Pages

Blockchain’s immutability, while enhancing transparency and trust, presents challenges when erroneous or sensitive content must be modified. To address this, we propose a novel cryptographic primitive called Time-Modifiable Chameleon Hash (TMCH...

  • Feature Paper
  • Article
  • Open Access
7 Citations
9,520 Views
18 Pages

Hardware-Based Run-Time Code Integrity in Embedded Devices

  • Taimour Wehbe,
  • Vincent Mooney and
  • David Keezer

Attacks on embedded devices are becoming more and more prevalent, primarily due to the extensively increasing plethora of software vulnerabilities. One of the most dangerous types of these attacks targets application code at run-time. Techniques to d...

  • Article
  • Open Access
4 Citations
1,594 Views
17 Pages

18 November 2024

Remote sensing image retrieval (RSIR) plays a crucial role in remote sensing applications, focusing on retrieving a collection of items that closely match a specified query image. Due to the advantages of low storage cost and fast search speed, deep...

  • Article
  • Open Access
3 Citations
1,950 Views
15 Pages

A Deep Cryptographic Framework for Securing the Healthcare Network from Penetration

  • Arjun Singh,
  • Vijay Shankar Sharma,
  • Shakila Basheer and
  • Chiranji Lal Chowdhary

4 November 2024

Ensuring the security of picture data on a network presents considerable difficulties because of the requirement for conventional embedding systems, which ultimately leads to subpar performance. It poses a risk of unauthorized data acquisition and mi...

  • Article
  • Open Access
2 Citations
1,508 Views
20 Pages

29 September 2024

Given how quickly artificial intelligence technology is developing, federated learning (FL) has emerged to enable effective model training while protecting data privacy. However, when using homomorphic encryption (HE) techniques for privacy protectio...

  • Article
  • Open Access
18 Citations
4,959 Views
20 Pages

25 July 2019

Data security technology is of great significance for the effective use of high-resolution remote sensing (HRRS) images in GIS field. Integrity authentication technology is an important technology to ensure the security of HRRS images. Traditional au...

  • Article
  • Open Access
2 Citations
2,568 Views
18 Pages

20 October 2022

Nowadays, people’s lives are filled with a huge amount of picture information, and image retrieval tasks are widely needed. Deep hashing methods are extensively used to manage such demands due to their retrieval rate and memory consumption. The...

  • Article
  • Open Access
283 Views
28 Pages

27 November 2025

Frequent data sharing in Vehicular Ad Hoc Networks (VANETs) necessitates a robust foundation of secure access control to ensure data security. Existing ciphertext-policy attribute-based encryption schemes are constrained by the performance bottleneck...

  • Article
  • Open Access
22 Citations
3,937 Views
18 Pages

Efficient Load Balancing for Blockchain-Based Healthcare System in Smart Cities

  • Faheem Nawaz Tareen,
  • Ahmad Naseem Alvi,
  • Asad Ali Malik,
  • Muhammad Awais Javed,
  • Muhammad Badruddin Khan,
  • Abdul Khader Jilani Saudagar,
  • Mohammed Alkhathami and
  • Mozaherul Hoque Abul Hasanat

13 February 2023

Smart cities are emerging rapidly due to the provisioning of comfort in the human lifestyle. The healthcare system is an important segment of the smart city. The timely delivery of critical human vital signs data to emergency health centers without d...

  • Feature Paper
  • Article
  • Open Access
11 Citations
4,225 Views
10 Pages

Forgery Detection and Localization of Modifications at the Pixel Level

  • Sahib Khan,
  • Khalil Khan,
  • Farman Ali and
  • Kyung-Sup Kwak

9 January 2020

In this paper, we present a new technique of image forgery detection. The proposed technique uses digital signatures embedded in the least significant bits of the selected pixels of each row and column. The process maintains a symmetry in the use of...

  • Article
  • Open Access
1 Citations
1,274 Views
26 Pages

Texture-Image-Oriented Coverless Data Hiding Based on Two-Dimensional Fractional Brownian Motion

  • Yen-Ching Chang,
  • Jui-Chuan Liu,
  • Ching-Chun Chang and
  • Chin-Chen Chang

12 October 2024

In an AI-immersing age, scholars look for new possibilities of employing AI technology to their fields, and how to strengthen security and protect privacy is no exception. In a coverless data hiding domain, the embedding capacity of an image generall...

  • Article
  • Open Access
1,167 Views
19 Pages

Lightweight Hash Function Design for the Internet of Things: Structure and SAT-Based Cryptanalysis

  • Kairat Sakan,
  • Kunbolat Algazy,
  • Nursulu Kapalova and
  • Andrey Varennikov

1 September 2025

This paper introduces a lightweight cryptographic hash algorithm, LWH-128, developed using a sponge-based construction and specifically adapted for operation under constrained computational and energy conditions typical of embedded systems and Intern...

  • Article
  • Open Access
241 Views
24 Pages

A Study on zk-SNARK-Based RBAC Scheme in a Cross-Domain Cloud Environment

  • Seong Cheol Yoon,
  • Deok Gyu Lee,
  • Su-Hyun Kim and
  • Im-Yeong Lee

12 December 2025

Because of the advancement of IT, cross-domain environments have emerged where independent clouds with different security policies share data. However, sharing data between clouds with heterogeneous security levels is a challenging task, and most exi...

  • Article
  • Open Access
5 Citations
9,174 Views
18 Pages

Small Private Key MQPKS on an Embedded Microprocessor

  • Hwajeong Seo,
  • Jihyun Kim,
  • Jongseok Choi,
  • Taehwan Park,
  • Zhe Liu and
  • Howon Kim

19 March 2014

Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cr...

  • Article
  • Open Access
1 Citations
1,303 Views
17 Pages

1 June 2025

In recent years, hashing-based algorithms have garnered significant attention as vital technologies for cross-modal retrieval tasks. They leverage the inherent symmetry between different data modalities (e.g., text, images, or audio) to bridge their...

  • Article
  • Open Access
1,410 Views
25 Pages

A dual watermark and DNA image encryption based on a chaotic map is proposed. Firstly, a new discrete chaotic map is proposed, and the dynamic characteristics are analyzed. Then, the hash value changes initial conditions, and the pseudo-random sequen...

  • Article
  • Open Access
21 Citations
2,849 Views
18 Pages

A Novel Invariant Based Commutative Encryption and Watermarking Algorithm for Vector Maps

  • Yu Li,
  • Liming Zhang,
  • Xiaolong Wang,
  • Xingang Zhang and
  • Qihang Zhang

Commutative encryption and watermarking (CEW) is an emerging method that combines encryption technology with digital watermarking technology. It has the dual capability of secure transmission and copyright protection. However, the existing CEW method...

  • Article
  • Open Access
130 Citations
11,709 Views
18 Pages

Blockchain is a public open ledger that provides data integrity in a distributed manner. It is the underlying technology of cryptocurrencies and an increasing number of related applications, such as smart contracts. The open nature of blockchain toge...

  • Article
  • Open Access
1,533 Views
22 Pages

In the deep integration process between digital infrastructure and new economic forms, structural imbalance between the evolution rate of cloud storage technology and the growth rate of data-sharing demands has caused systemic security vulnerabilitie...

  • Article
  • Open Access
1 Citations
1,311 Views
21 Pages

27 June 2025

The utilisation of 3D models in low-cost devices, such as the internet of things, virtual reality, and augmented reality, is expanding. The challenge lies in the lack of lightweight solutions for verifying the authenticity of models in the graphics l...

  • Article
  • Open Access
21 Citations
5,343 Views
18 Pages

4 September 2019

With the technological advances in the areas of Machine-To-Machine (M2M) and Device-To-Device (D2D) communication, various smart computing devices now integrate a set of multimedia sensors such as accelerometers, barometers, cameras, fingerprint sens...

  • Article
  • Open Access
12 Citations
4,215 Views
31 Pages

To ensure the security of sensitive data, elliptic curve cryptography (ECC) is adopted as an asymmetric method that balances security and efficiency. Nevertheless, embedding messages into elliptic curve (EC) points poses a significant challenge. The...

  • Article
  • Open Access
7 Citations
4,408 Views
21 Pages

BSTProv: Blockchain-Based Secure and Trustworthy Data Provenance Sharing

  • Lian-Shan Sun,
  • Xue Bai,
  • Chao Zhang,
  • Yang Li,
  • Yong-Bin Zhang and
  • Wen-Qiang Guo

In the Big Data era, data provenance has become an important concern for enhancing the trustworthiness of key data that are rapidly generated and shared across organizations. Prevailing solutions employ authoritative centers to efficiently manage and...

  • Article
  • Open Access
5 Citations
2,512 Views
26 Pages

26 April 2023

Disinformation in the form of news articles, also called fake news, is used by multiple actors for nefarious purposes, such as gaining political advantages. A key component for fake news detection is the ability to find similar articles in a large do...

  • Article
  • Open Access
4 Citations
3,637 Views
21 Pages

IoT Edge Device Security: An Efficient Lightweight Authenticated Encryption Scheme Based on LED and PHOTON

  • Mohammed Al-Shatari,
  • Fawnizu Azmadi Hussin,
  • Azrina Abd Aziz,
  • Taiseer Abdalla Elfadil Eisa,
  • Xuan-Tu Tran and
  • Mhassen Elnour Elneel Dalam

15 September 2023

IoT devices and embedded systems are deployed in critical environments, emphasizing attributes like power efficiency and computational capabilities. However, these constraints stress the paramount importance of device security, stimulating the explor...

  • Article
  • Open Access
4 Citations
1,640 Views
14 Pages

LSH Models in Federated Recommendation

  • Huijun Dai,
  • Min Zhu and
  • Xiaolin Gui

23 May 2024

Given the challenges in recommendation effectiveness, communication costs, and privacy issues associated with federated learning, the current algorithm amalgamates locality sensitive hash (LSH) with three federated recommendation models: Generalized...

  • Article
  • Open Access
5 Citations
2,606 Views
17 Pages

This paper presents simple yet effective optimizations for implementing data stream frequency estimation sketch kernels using High-Level Synthesis (HLS). The paper addresses design issues common to sketches utilizing large portions of the embedded RA...

  • Feature Paper
  • Article
  • Open Access
12 Citations
5,423 Views
22 Pages

Embedded LUKS (E-LUKS): A Hardware Solution to IoT Security

  • German Cano-Quiveu,
  • Paulino Ruiz-de-clavijo-Vazquez,
  • Manuel J. Bellido,
  • Jorge Juan-Chico,
  • Julian Viejo-Cortes,
  • David Guerrero-Martos and
  • Enrique Ostua-Aranguena

5 December 2021

The Internet of Things (IoT) security is one of the most important issues developers have to face. Data tampering must be prevented in IoT devices and some or all of the confidentiality, integrity, and authenticity of sensible data files must be assu...

  • Article
  • Open Access
26 Citations
12,365 Views
18 Pages

20 February 2024

Dynamic voltage and frequency scaling (DVFS) is a technique used to optimize energy consumption in ultra-low-power embedded systems. To ensure sufficient computational capacity, the system must scale up its performance settings. The objective is to c...

  • Article
  • Open Access
2 Citations
2,781 Views
14 Pages

10 March 2020

In the global village era, several competitions require pre-checkups for the participants who are qualified to participate that must be passed before the competition, so the accuracy of the checkup data must be confirmed and must not be leaked or tam...

  • Article
  • Open Access
1,463 Views
22 Pages

A Privacy-Enhancing Image Encryption Algorithm for Securing Medical Images

  • Ammar Odeh,
  • Anas Abu Taleb,
  • Tareq Alhajahjeh,
  • Francisco Navarro,
  • Aladdin Ayesh and
  • Miad Faezipour

6 September 2025

The growing digitization of healthcare has amplified concerns about the privacy and security of medical images, as conventional encryption methods often fail to provide sufficient protection. To address this gap, we propose a privacy-enhancing image...

  • Article
  • Open Access
1,025 Views
26 Pages

Winnie: A Sensor-Based System for Real-Time Monitoring and Quality Tracking in Wine Fermentation

  • Ivana Kovačević,
  • Ivan Aleksi,
  • Tomislav Keser and
  • Tomislav Matić

22 October 2025

This paper presents the development of a modular and low-cost IoT (Internet of Things) system for remote monitoring of essential parameters during wine fermentation, designed for small and medium-sized wineries—Winnie. The system combines distr...

  • Article
  • Open Access
2 Citations
3,244 Views
11 Pages

This article presents an advanced dual chaotic watermarking scheme to improve information security. To ensure confidentiality in digital image transmission, a secure dual watermarking scheme is proposed by applying the chaotic logistic system and hyp...

  • Article
  • Open Access
50 Citations
6,674 Views
20 Pages

A Blockchain-Based Multi-Factor Authentication Model for a Cloud-Enabled Internet of Vehicles

  • Victor R. Kebande,
  • Feras M. Awaysheh,
  • Richard A. Ikuesan,
  • Sadi A. Alawadi and
  • Mohammad Dahman Alshehri

8 September 2021

Continuous and emerging advances in Information and Communication Technology (ICT) have enabled Internet-of-Things (IoT)-to-Cloud applications to be induced by data pipelines and Edge Intelligence-based architectures. Advanced vehicular networks grea...

  • Article
  • Open Access
19 Citations
10,072 Views
17 Pages

An Autonomous, Self-Authenticating, and Self-Contained Secure Boot Process for Field-Programmable Gate Arrays

  • Don Owen Jr.,
  • Derek Heeger,
  • Calvin Chan,
  • Wenjie Che,
  • Fareena Saqib,
  • Matt Areno and
  • Jim Plusquellic

Secure booting within a field-programmable gate array (FPGA) environment is traditionally implemented using hardwired embedded cryptographic primitives and non-volatile memory (NVM)-based keys, whereby an encrypted bitstream is decrypted as it is loa...

  • Article
  • Open Access
26 Citations
7,711 Views
22 Pages

11 July 2021

Satellite images are always partitioned into regular patches with smaller sizes and then individually fed into deep neural networks (DNNs) for semantic segmentation. The underlying assumption is that these images are independent of one another in ter...

of 2