-
261
Key Generation and Testing Based on Biometrics
Published 2024-06-01“…In this research, the key generation process was created by converting biometrics (the iris) into a digital representation (a set of binary numbers from the two iris) that can be used in the encryption process. This is done by using digital image processing algorithms to extract unique features from the two irises. …”
Get full text
Article -
262
Biometric cryptosystem to secure smart object communications in the internet of things
Published 2022-03-01“…Subsequently, the user message is encrypted using the AES algorithm, whereas the user template is encrypted by a proposed algorithm. …”
Get full text
Article -
263
Artificial Noise Physical Layer Security for V2X Joint Radar Communication Systems-Based OTFS Waveform
Published 2025-01-01“…The secrecy capacity, average bit-error rate (BER), time complexity, and execution time results present the performance of the proposed AN scheme and its ability to protect legitimate users’ information in a promising manner while providing the radar user with sufficient quality of service (QoS), where the proposed approach provides a secrecy capacity level up to 7 nats/symbol with an execution time that is 42 times faster than the Advanced Encryption Standard (AES) and 6.4 thousand times better than Rivest-Shamir-Adleman (RSA) cryptographic algorithms.…”
Get full text
Article -
264
New <i>μ</i>-Synchronization Criteria for Nonlinear Drive–Response Complex Networks with Uncertain Inner Couplings and Variable Delays of Unknown Bounds
Published 2025-02-01“…Moreover, numerical experiments and image encryption algorithms are carried out to verify our theoretical results’ effectiveness.…”
Get full text
Article -
265
Research on airport baggage anomaly retention detection technology based on machine vision, edge computing, and blockchain
Published 2024-12-01“…To address this challenge, this paper proposes a real‐time detection and alerting of luggage anomaly retention based on the YOLOv5 object detection model, leveraging visual algorithms. By eliminating cloud servers and deploying multiple edge servers to establish a private chain, images of anomalously retained luggage are encrypted and stored on the chain. …”
Get full text
Article -
266
Steganography in IoT: A Comprehensive Survey on Approaches, Challenges, and Future Directions
Published 2025-01-01“…While effective, traditional encryption techniques are often computationally expensive and easily identifiable, making them unsuitable for many IoT applications. …”
Get full text
Article -
267
Analysis of Communication Compression and Transmission in a Multimedia and Internet of Things Environment Integrating Scene Elements
Published 2022-01-01“…Moreover, this paper proposes a reversible information hiding algorithm for encrypted images based on pixel sorting and grouping prediction and discusses how to improve the prediction accuracy through the histogram of prediction errors. …”
Get full text
Article -
268
A lightweight lattice-based group signcryption authentication scheme for Internet of things
Published 2024-04-01“…In the key generation stage, the improved trapdoor diagonal matrix was designed to optimize the original image sampling algorithm required for key generation and reduce the overall time required for generating a large number of keys. …”
Get full text
Article -
269
A lightweight lattice-based group signcryption authentication scheme for Internet of things
Published 2024-04-01“…In the key generation stage, the improved trapdoor diagonal matrix was designed to optimize the original image sampling algorithm required for key generation and reduce the overall time required for generating a large number of keys. …”
Get full text
Article -
270
Integrated photonic programmable random matrix generator with minimal active components
Published 2025-02-01“…In manipulating classical light, random operations are utilized for random projections and dimensionality reduction, which are important for analog signal processing, computing, and imaging. In quantum information processing, random unitary operations are essential to boson sampling algorithms for multiphoton states in linear photonic circuits. …”
Get full text
Article -
271
Using big data analytics to improve HIV medical care utilisation in South Carolina: A study protocol
Published 2019-07-01Get full text
Article