Figure - available from: Microsystem Technologies
This content is subject to copyright. Terms and conditions apply.
8-bit gray scale images of original secret, encrypted and decrypted with different user key

8-bit gray scale images of original secret, encrypted and decrypted with different user key

Source publication
Article
Full-text available
Increased use of internet demands substantial protection for secret image file from any adversary, specifically during transmission. In the field of cryptography there are two role models: cryptographer and crypt-analyst/attacker. The cryptographer develops techniques to make sure certain safety and security for transmissions while the crypt-analys...

Similar publications

Article
Full-text available
Abstract Multilevel and compartmented access structures are two important classes of access structures where participants are grouped into levels/compartments with different degrees of trust and privileges. The construction of secret sharing schemes for such access structures has been the attention of researchers for a long time. Two main approache...
Article
Full-text available
It is important to create a cryptographic system such that the encryption system does not depend on the secret storage of the algorithm that is part of it, but only on the private key that is kept secret. In practice, key management is a separate area of cryptography, which is considered a problematic area. This paper describes the main characteris...
Article
Full-text available
The “Multivariate Ring Learning with Errors” problem was presented as a generalization of Ring Learning with Errors (RLWE), introducing efficiency improvements with respect to the RLWE counterpart thanks to its multivariate structure. Nevertheless, the recent attack presented by Bootland, Castryck and Vercauteren has some important consequences on...
Preprint
Full-text available
p>Paper on cryptography.</p

Citations

... Secret key is the pivotal element in all cryptographic methods wherever applicable [56,57]. In this sub-section, a comparison was made on the secret key time generation. ...
Article
Full-text available
In this exceptional COVID-19 crisis, telemedicine had arisen as a substitute technique for medicines. Even more unequivocally, pediatric children were at high risk to outside homes. The spread of COVID-19 has suddenly ascended. Because of lockdown conventions and isolation protocols, kids were confined to live inside their homes. Non-emergency youngsters ought to be managed remotely through the telepediatric health. An establishment of Neural Series Transmission Keys (NSTKs) has been created and security had been planned on the intraoral data. Oral cavity is a kind of dental disease occurring in children. It is for the most cases caused due to drawn out bacterial invasions. Bacterial attacks are more because of sticky chocolates, desserts, sugar, and so forth. Homeopathy medicines are the best prescribed to fix such dental diseases in this current unprecedented COVID-19. Since, it needs no dental medical procedure for the non-invasive kids, which is the reason that the homeopathy medicines are most appropriate in this COVID-19 lockdown stages. The doctor can gather symptoms of the kids from their parents through online interfaces. Some of the normal homeopathy drugs are: Kreasotum, Mercurius, Mezereum, etc. Moreover, in this pandemic situation online telepediatric homeopathy medicines were better alternatives to investigate from home disengages. Additionally it bears no voyaging consumptions and costs. Secure online transmission of clinical pediatric information has been the most challenging issue in COVID-19 telepediatric oral wellbeing. Data mystery factor is protected with tendency in this proposed cryptographic technique. Neural Series Transmission Keys (NSTKs) were established based on neural network based hamming codes. It has been diffused inside the intraoral pediatric data. The proposed key was so particularly amazing that it gives assorted blend after each bit of evolving. Beginning seeds were kept at the dentists and the patients, in order to go against external attacks inside the public channel, especially during this hyper digitized COVID-19 times. Standard graphs were drawn with accuracy using the proposed cryptographic method. The absolute cryptographic time in this strategy was 2.88 ms which was significantly important. By applying Chi Square test, we have noted χ2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${{\upchi }}^{2}$$\end{document}= 17.012, under 5% level of significance.
... The client's confidential information transferred across insecure channels might pose a security risk (Das et al. 2018). As a result, another problematic question in surveilling an e-healthcare system is ensuring data confidentiality and protection from outside traffic (Khan et al. 2020). To elongate the IoMT network lifetime, Ahmed et al. (2021) proposed an energy-efficient routing strategy. ...
Article
Full-text available
The Internet of Things (IoT) gains myriad admiration in wide applications including medical and healthcare monitoring due to its low cost and its self-operating activities. Recently several wearable gadgets are used frequently and become popular in health monitoring systems. In the monitoring system, Biomedical Sensor Nodes (BSN) are used to sense the physiological parameters of the patients and transmitted to the coordinator or Base Station (BS) via the Internet of Medical Things (IoMT) frameworks for further analysis. BSNs are energy-constrained and the most amount of energy is consumed due to their information transmissions. Therefore, a key research problem is to reduce energy consumption and communication costs. Moreover, patient data, transmitted over the insecure channel may lead to security threats. Therefore, ensuring data privacy and integrity is another challenging issue. In this paper, we propose an energy-efficient and secure health monitoring system to reduce the energy consumption and communication cost of the monitoring system. On the other hand, it also provides secured data transmission by incorporating a Cipher Block Chaining (CBC) based lightweight security mechanism. Extensive simulation results reveal that the proposed scheme achieved improved performance in terms of network lifetime by 27%, average End-to-end delay by 18%, and average network throughput by 23%. In conclusion, our proposed algorithms prove to be a feasible solution for securing and extending the IoMT network lifetime.
... Session key is a groundbreaking code that is utilized at the encryption and deciphering measure in any data correspondence [23,24]. In symmetric-key cryptography, the same session key is utilized by the source and destination. ...
Article
The volume of E-commerce transactions had accelerated on huge scale due to COVID-19. Telemedicine comes under the segment of E-commerce, where the patients can get their treatments from isolates. Patients’ information security is a basic challenge in this COVID-19 telemedicine segment. The majority of the non-obtrusive and non-emergency patients are encouraged and treated distantly from their secludes without the inclusion of COVID-19 transmission. Anxiety, depressive disorders, stress, dementia, mood disorder, OCD, aggression, etc. are the critical mental challenges that have abruptly occurred during this COVID period. The present work focused on “New Normal Mode” of COVID-19 telepsychiatry so that the patients’ mental illness can be treated remotely in a secure way. An episode of dual neural-genetic firefly (DNGF) has been proposed on COVID-19 "New Normal Mode" 2nd wave telepsychiatry. The pool of transmission keys was generated with the help of firefly algorithm, neural perceptron, and genetic operations. Besides these, the proposed DNGF keys are effective to be used for different online psychiatric transactions. The objectivity of this paper is to generate a robust pool of transmission keys in order to nullify different types of intruding. It has effectively cleared Avalanche test and Strict Avalanche test. The outcome of parameterized functional security test has been recorded with adequacy. These were: 0.327933, 0.350467, 0.332533, 0.317867, and 0.350267 on the generated pool of DNGF. The correlation coefficient between the key generation time and parameterized functional security has been found to be rGT,FS=-0.53404. Distinctive mathematical arranged examinations were directed on the proposed key pool. It has shown better reasonability on the part of the COVID-19 2nd wave telepsychiatry, which is a component of E-commerce.
Article
Full-text available
Rapid evolution in digital communication increases the risk of unauthorized access to sensitive data. Digital images are one of the most popular types and are frequently used to share various information including many sensitive data. Hence, security of the digital images is one of the major concerns for reliable data communication. This work addresses this issue and proposes a novel image encryption technique in which the concept of the binary search tree is introduced. The structure of the binary search tree is optimized with the help of the electromagnetism-like optimization approach that optimizes the image entropy. The proposed approach also incorporates the concept of DNA (Deoxyribonucleic acid) encoding and based on this concept bitplane decomposition is used to get DNA bit planes. A scrambling approach is also proposed to add an additional layer of security. This approach is a symmetric image encryption scheme and is completely lossless. The performance of this approach is tested in terms of both qualitative and quantitative manner. Experimental results and comparative outcomes with the state-of-the-art approaches are encouraging and prove the efficiency of the proposed approach.
Article
The internet has become an integral part of our modern life, and the protection of secret data over the internet of multimedia things is the fundamental concern for Smart City applications. Nowadays, the widely used internet of things (IoT) uses audio, image, video, and various mixed modes as well, where privacy, as well as security, are equally essential in real-time transmission. Substantial research has been reported on various encryption algorithms for text and image files, but a similar need for video encryption has been felt a little late. It may be noted that the absence of any standard encryption technique designed especially for any video file has compelled us to design a new but quite robust encryption algorithm for video input as secret. This article has primarily addressed the security needs for video content in IoT. Any video file can be considered as a collection of continuous images. In this research article, we have dealt with video encryption, fundamentally a multi-round key-based shuffling of a collection of images, components of the original video file to be encrypted. The proposed novel scheme follows the fundamental concept of the symmetric encryption technique, where the encryption key is common for both encryption and decryption in real-time video applications.
Article
Image information security is a significant examination course in the field of data security. Images unreasonably add to correspondence in this time of interactive media. At the point when a client moves images over an unstable correspondence organization, at that point the total security is a moving matter to monitor the privacy of images. Encryption is the technique by which data is changed over into mystery code that shrouds the data's actual importance. This work contributes the review of various image encryption methods, unique image is changed to trivial irregular clamor signal which would draw consideration and consequently pull in assaults and examination of discrete image encoding procedures, at long last end with end and upcoming works.
Article
Full-text available
Patients’ data security is an open challenge on any telemedicine system. The challenge has been extended enough in this unprecedented corona virus led pandemic. COVID-19 has brought abrupt adaptations in medical sciences. To reduce corona virus transmission, quarantine yourself and opting for online services is mostly apt even during “New Normal” second wave of COVID-19. The emergence of telemedicine is a significant contribution in the medical sciences. Relevant online security and challenges are the contemporary and relevant challenges in COVID-19 E-Health. The objective of this proposed technique is to reinforce the technical safeguards to the electronic health system against the tricksters. Perceptron based session key and modified logistic map based intermediate key were proposed. A strict lossless secret sharing has been proposed to protect patients’ clinical reports and data. Participation of all the recipients is bare essential in regenerating the original report. Simple mathematical operations were carried out to develop the secret shares. Electing the head of the recipients has also been included here. Different secret shares were encapsulated with the proposed frame structure. The chaotic sequences in the ranges of r = [0.41,0.53], r = [0.61, 0.66], and r = [0.91, 0.99] on the initial values x = 3.64, 3.81, and 3.88 respectively were noted under this technique test. An appropriate correlation between the proposed encryption and cryptographic time, and proposed decryption and cryptographic time were found. Such values were rec= 0.989929 and rdc= 0.988828 respectively. Myriad mathematical tests likes of statistical randomization, brute force, graphical analysis, performance time, etc. were carried on the proposed technique. Their results have proved our efficacy in fostering the patients’ data transmission in “New Normal” COVID-19 E-Health.
Article
Full-text available
This data has been used in many existing inventions and even in many new inventions. This paper consists of a review of the current state of LiDAR technology and covers issues related to both data capturing and processing. In this paper, a discussion on different types of LiDAR sensors including LiDAR for autonomous vehicles was also done. It also explains existing data techniques and also gives a view of CNN (Convolutional Neural Networks). This paper also discusses the autonomous LiDAR technique in detail. The paper also discusses the future scope of technology.
Article
Full-text available
Random sequences and maps are essential for the applications in cryptography and many other fields in Information Technologies. To achieve true randomness, one still needs to refer to natural phenomena, be it physical, chemical or biological. Here we analyse the possibility to apply stochastic physico–chemical dynamics to generate truly random sequences and bitmaps. To this purpose, we utilize simulations of adsorption–desorption (AD) based intrinsic noise in realistic microsystems and nanosystems. We focus on affinity-based chemical or biological sensors, for instance those based on micro or nanocantilevers, as well as those utilizing plasmonic and generally metamaterial phenomena (refractometric nanosensors.) Random numbers in sequences or maps in both types of structures are generated by simulations of intrinsic fluctuations of AD processes. We present three novel AD-simulation based algorithms, two of them for bitstreams and one for dynamic bitmaps. We use the stochastic simulation algorithm developed for modelling of chemical kinetics. We tested the obtained pseudo random numbers by visual analysis and using our custom designed test suite. We have proven the applicability of the proposed method for generation of random sequences and maps. Our results could be used in digital data encryption and communication. They also point out to a possibility to a hardware implementation of a full random number generator that would incorporate the mentioned micro and nanosystems.