Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 3 de 3
Filtrar
Mais filtros

Base de dados
Tipo de documento
Intervalo de ano de publicação
1.
Sensors (Basel) ; 22(18)2022 Sep 06.
Artigo em Inglês | MEDLINE | ID: mdl-36146089

RESUMO

The industry-based internet of things (IIoT) describes how IIoT devices enhance and extend their capabilities for production amenities, security, and efficacy. IIoT establishes an enterprise-to-enterprise setup that means industries have several factories and manufacturing units that are dependent on other sectors for their services and products. In this context, individual industries need to share their information with other external sectors in a shared environment which may not be secure. The capability to examine and inspect such large-scale information and perform analytical protection over the large volumes of personal and organizational information demands authentication and confidentiality so that the total data are not endangered after illegal access by hackers and other unauthorized persons. In parallel, these large volumes of confidential industrial data need to be processed within reasonable time for effective deliverables. Currently, there are many mathematical-based symmetric and asymmetric key cryptographic approaches and identity- and attribute-based public key cryptographic approaches that exist to address the abovementioned concerns and limitations such as computational overheads and taking more time for crucial generation as part of the encipherment and decipherment process for large-scale data privacy and security. In addition, the required key for the encipherment and decipherment process may be generated by a third party which may be compromised and lead to man-in-the-middle attacks, brute force attacks, etc. In parallel, there are some other quantum key distribution approaches available to produce keys for the encipherment and decipherment process without the need for a third party. However, there are still some attacks such as photon number splitting attacks and faked state attacks that may be possible with these existing QKD approaches. The primary motivation of our work is to address and avoid such abovementioned existing problems with better and optimal computational overhead for key generation, encipherment, and the decipherment process compared to the existing conventional models. To overcome the existing problems, we proposed a novel dynamic quantum key distribution (QKD) algorithm for critical public infrastructure, which will secure all cyber-physical systems as part of IIoT. In this paper, we used novel multi-state qubit representation to support enhanced dynamic, chaotic quantum key generation with high efficiency and low computational overhead. Our proposed QKD algorithm can create a chaotic set of qubits that act as a part of session-wise dynamic keys used to encipher the IIoT-based large scales of information for secure communication and distribution of sensitive information.


Assuntos
Segurança Computacional , Privacidade , Algoritmos , Comunicação , Confidencialidade , Humanos
2.
Sci Rep ; 14(1): 18301, 2024 Aug 07.
Artigo em Inglês | MEDLINE | ID: mdl-39112647

RESUMO

In light of the unprecedented growth in internet usage, safeguarding data from unauthorized access has emerged as a paramount concern. Cryptography and steganography stand as pivotal methods for ensuring data security during transmission. This study introduces an innovative adaptive video steganography approach featuring three tiers of security for extracting concealed information, thereby facilitating secure communication. The embedding process operates within the spatial domain of cover video frames, enabling a remarkable hiding ratio of up to 28.125% (equivalent to 2.25 bits per pixel in payload) without compromising the quality of video frames. Users are afforded the flexibility to select between partial or full embedding capacity of CVF through the proposed adaptive control block (ACB). The chaotic key generator (CKG), which combines a logistic map and sine map, is employed to generate highly sensitive initial seeds for permutation order (PO), frame selection (FS), and random position for hiding (RPH), thereby ensuring three levels of security. Prior to transmission, both CVF and hidden data (SD) are encrypted using PO. Encrypted CVFs are then randomly selected using FS for embedding, with RPH employed during the embedding process. Subsequently, for transmitting the stego-video frame, embedded CVFs are decrypted using the same PO. Experimental results demonstrate the efficacy of the proposed approach, achieving an adaptive hiding ratio ranging from 7.1 to 28.125% (equivalent to 0.56 to 2.25 bits per pixel in payload) and maintaining a peak signal-to-noise ratio (PSNR) within the range of 50.25 to 62.05 dB.

3.
Med Biol Eng Comput ; 61(1): 205-227, 2023 Jan.
Artigo em Inglês | MEDLINE | ID: mdl-36348143

RESUMO

Medical images of patients must be securely transmitted and kept private in telemedicine. To secure such medical images, this paper proposes a single round chaotic image encryption scheme based on a permutation-diffusion structure. A combined chaotic key generator (CCKG) is proposed to enhance key sensitivity and generation in order to improve the security of medical images to be encrypted. CCKG is used to produce the initial seeds for the fractional order chaotic system (FOCS) and Lorenz system (LS) for the permutation and diffusion processes, respectively. CCKG together with proposed permutation and diffusion methods enhances cipher image security in single round. Using zigzag transform (ZT) scanning, the plain image is first permuted block by block. The type of scanning used on each block is heavily influenced by the ZT selection from FOCS and LS. Following block-wise permutation, the permutation order (PO) generated from LS performs overall permutation. Based on the pixel positions, the overall permuted image is divided into odd and even parts. Then these parts of the images are diffused separately by the random pixel matrices generated by LS and FOCS. The cipher image is formed by combining the odd and even parts after diffusion. Secret key analysis, statistical analysis, differential attack analysis, and simulations confirm that with a single round of image encryption, the proposed system is competent, robust and effective.


Assuntos
Segurança Computacional , Telemedicina , Humanos , Algoritmos , Telemedicina/métodos , Difusão
SELEÇÃO DE REFERÊNCIAS
Detalhe da pesquisa