In order to overcome the difficulty of key management in "one time pad" encryption schemes and also resist the attack of chosen plaintext, a new image encryption algorithm based on chaos and SHA-256 ...is proposed in this paper. The architecture of confusion and diffusion is adopted. Firstly, the surrounding of a plaintext image is surrounded by a sequence generated from the SHA-256 hash value of the plaintext to ensure that each encrypted result is different. Secondly, the image is scrambled according to the random sequence obtained by adding the disturbance term associated with the plaintext to the chaotic sequence. Third, the cyphertext (plaintext) feedback mechanism of the dynamic index in the diffusion stage is adopted, that is, the location index of the cyphertext (plaintext) used for feedback is dynamic. The above measures can ensure that the algorithm can resist chosen plaintext attacks and can overcome the difficulty of key management in "one time pad" encryption scheme. Also, experimental results such as key space analysis, key sensitivity analysis, differential analysis, histograms, information entropy, and correlation coefficients show that the image encryption algorithm is safe and reliable, and has high application potential.
In this paper, the effectiveness of biometric verification system has been achieved with template protection technique. Gait images of person are used; features are extracted from average gait images ...using Principle Component Analysis (PCA) for dimensionality reduction. At enrollment phase, three gait energy images (GEI)-upper images of person are used. The most reliable component for each person is needed to find and encoded it through Bose Chaudhuri Hocquenghem (BCH) encoding scheme to generate code word. A secrete binary string and hash value are generated for each person and stored in the database along with encoded template and position of strong reliable component. At verification phase, GEI-lower, slow and fast gait images are used. Those features are only selected from original features based on the position of strong reliable component and are used to generate code word and which is decoded using BCH decoder. The hash value is generated and compared with the hash value which was generated in the enrollment phase. If these two hash values are the same then the person is verified otherwise the person is not verified. Also comparison with other recently proposed studies is done to show the effectiveness of the proposed scheme.
In recent days, the Internet of Medical Things (IoMT) is commonly employed in different aspects of healthcare applications. Owing to the increasing necessitates of IoT, a huge amount of sensing data ...is collected from distinct IoT gadgets. To investigate the generated data, artificial intelligence (AI) models plays an important role to achieve scalability and accurate examination in real-time environment. However, the characteristics of IoMT result in certain design challenges, namely, security and privacy, resource limitation, and inadequate training data. At the same time, blockchain, an upcoming technology, has offered a decentralized architecture, which gives secured data transmission and resources to distinct nodes of the IoT environment and is stimulated for eliminating centralized management and eliminates the challenges involved in it. This paper designs deep learning (DL) with blockchain-assisted secure image transmission and diagnosis model for the IoMT environment. The presented model comprises a few processes namely data collection, secure transaction, hash value encryption, and data classification. Primarily, elliptic curve cryptography (ECC) is applied, and the optimal key generation of ECC takes place using hybridization of grasshopper with fruit fly optimization (GO-FFO) algorithm. Then, the neighborhood indexing sequence (NIS) with burrow wheeler transform (BWT), called NIS-BWT, is employed to encrypt the hash values. At last, a deep belief network (DBN) is utilized for the classification process to diagnose the existence of disease. An extensive experimental validation takes place to determine the analysis of the optimal results of the presented model, and the results are investigated under diverse aspects.
Cloud computing has made the software development process fast and flexible but on the other hand it has contributed to increasing security attacks. Employees who manage the data in cloud companies ...may face insider attack, affecting their reputation. They have the advantage of accessing the user data by interacting with the authentication mechanism. The primary aim of this research paper is to provide a novel secure authentication mechanism by using Blockchain technology for cloud databases. Blockchain makes it difficult to change user login credentials details in the user authentication process by an insider. The insider is not able to access the user authentication data due to the distributed ledger-based authentication scheme. Activity of insider can be traced and cannot be changed. Both insider and outsider user’s are authenticated using individual IDs and signatures. Furthermore, the user access control on the cloud database is also authenticated. The algorithm and theorem of the proposed mechanism have been given to demonstrate the applicability and correctness.The proposed mechanism is tested on the Scyther formal system tool against denial of service, impersonation, offline guessing, and no replay attacks. Scyther results show that the proposed methodology is secure cum robust.
The paper proposes a chaos-based colour image encryption scheme, the highlight is that the randomly sampled noise signal is applied to serve as the initial values of a chaotic system. The 256-bit ...hash value of noise is transformed into the one-time initial values of the Liu system. The sequences generated by Liu system are subjected to three batteries of TestU01. Exclusive OR, the only operation, is applied to diffuse the pixels, and some measures are taken to speed up the encryption process. Finally, some statistical tests are performed to assess reliability and efficiency of the proposed cryptosystem in terms of time complexity and security.
Image encryption has been an attractive research filed in recent years. In this paper, we propose a novel hyperchaotic encryption algorithm for color image utilizing DNA dynamic encoding and ...self-adapting permutation. Firstly, A new 4-dimensional hyperchaotic system is designed, and the detailed dynamic analysis shows that the system has strong pseudo-randomness and a large range of chaotic parameters. Secondly, based on the new 4-D hyperchaotic system, we devise the methods of DNA dynamic encoding, DNA dynamic calculation and DNA dynamic decoding in the image encryption algorithm, and the sequences generated by the hyperchaotic control these coding rules dynamically to make the results of operation more unpredictable. Moreover, the initial keystream is designed dependent upon the plaintext image, and the method of plaintext-related self-adapting permutation is proposed at the bit level and DNA level of the image respectively, which enhances the sensitivity of the algorithm to plaintext image and key. The theoretical analysis and numerical simulation show that the image algorithm has good security and can resist various attacks.
Ship detection plays a crucial role in marine security in remote sensing imagery. This paper discusses about a deep learning approach to detect the ships from satellite imagery. The model developed ...in this work achieves integrity by the inclusion of hashing. This model employs a supervised image classification technique to classify images, followed by object detection using You Only Look Once version 3 (YOLOv3) to extract features from deep CNN. Semantic segmentation and image segmentation is done to identify object category of each pixel using class labels. Then, the concept of hashing using SHA-256 is applied in conjunction with the ship count and location of bounding box in satellite image. The proposed model is tested on a Kaggle Ships dataset, which consists of 231,722 images. A total of 70% of this data is used for training, and the 30% is used for testing. To add security to images with detected ships, the model is enhanced by hashing using SHA-256 algorithm. Using SHA-256, which is a one-way hash, the data are split up into blocks of 64 bytes. The input data to the hash function are both the ship count and bounding box location. The proposed model achieves integrity by using SHA-256. This model allows secure transmission of highly confidential images that are tamper-proof.
In the latest High Efficiency Video Coding (HEVC) development, i.e., HEVC screen content coding extensions (HEVC-SCC), a hash-based inter-motion search/block matching scheme is adopted in the ...reference test model, which brings significant coding gains to code screen content. However, the hash table generation itself may take up to half the encoding time and is thus too complex for practical usage. In this paper, we propose a hierarchical hash design and the corresponding block matching scheme to significantly reduce the complexity of hash-based block matching. The hierarchical structure in the proposed scheme allows large block calculation to use the results of small blocks. Thus, we avoid redundant computation among blocks with different sizes, which greatly reduces complexity without compromising coding efficiency. The experimental results show that compared with the hash-based block matching scheme in the HEVC-SCC test model (SCM)-6.0, the proposed scheme reduces about 77% of hash processing time, which leads to 12% and 16% encoding time savings in random access (RA) and low-delay B coding structures. The proposed scheme has been adopted into the latest SCM. A parallel implementation of the proposed hash table generation on graphics processing unit (GPU) is also presented to show the high parallelism of the proposed scheme, which achieves more than 30 frames/s for 1080p sequences and 60 frames/s for 720p sequences. With the fast hash-based block matching integrated into x265 and the hash table generated on GPU, the encoder can achieve 11.8% and 14.0% coding gains on average for RA and low-delay P coding structures, respectively, for real-time encoding.
Abstract
Blockchain is a cryptocurrency system with a transaction record of several computers in a peer-to-peer network. Blockchain In this paper, we propose a transparent, immutable, and more ...secured voting system using blockchain that collectively approaches security and cost issues. In Ballot voting, there is no security, immutability between the voter and the system. The proposed system uses blockchain technology to increase the efficiency of the voting system. Here the algorithm used is blockchain which includes a private key and public key encryption, SHA-256, Merkle hashing tree, and for security, one-time password (OTP) authentication can be done. It permits the voter to vote from any place, which increases the overall attendance percentage. The proposed system gives improved security and manages several data in the blockchain. In this system, we proposed security voting by using blockchain technology. In the existing system easy to vote for the ones who have not voted? I, vote fraudulent is happening on every century, some securities have been implemented but in parallel fraudulent is also increasing.