Zobrazeno 1 - 10
of 33
pro vyhledávání: '"Umashankar Rawat"'
Publikováno v:
IEEE Access, Vol 12, Pp 146147-146159 (2024)
In the rapidly evolving digital world, ensuring secure data transmission, especially in image data pivotal to modern communication, remains critical. The rise of the Internet of Things (IoT) increases the demand for encryption systems that combine st
Externí odkaz:
https://doaj.org/article/2fd7c9763f4643e2a506cc122322d0c7
Publikováno v:
IEEE Access, Vol 12, Pp 44325-44334 (2024)
Poor weather conditions, such as haze, fog, and smog, present significant challenges in capturing clear and visually appealing images. Though the existing image dehazing algorithms have achieved significant performance, they still suffer from various
Externí odkaz:
https://doaj.org/article/6652ec6b12124154b0935403d38c1085
Publikováno v:
Applied Computational Intelligence and Soft Computing, Vol 2023 (2023)
Android malware has been rising alongside the popularity of the Android operating system. Attackers are developing malicious malware that undermines the ability of malware detecting systems and circumvents such systems by obfuscating their dispositio
Externí odkaz:
https://doaj.org/article/d2ab814176634fff8c89e0a2c109a0c2
Publikováno v:
Applied Computational Intelligence and Soft Computing, Vol 2022 (2022)
With the extensive use of Android applications, malware growth has been increasing drastically. The high popularity of Android devices has motivated malware developers to attack these devices. In recent times, most researchers and scholars have used
Externí odkaz:
https://doaj.org/article/deeefc4be5664328b61a586716fa0537
Publikováno v:
IEEE Access, Vol 7, Pp 39782-39793 (2019)
The Internet of Things (IoT) devices are resource-constrained devices with limitations such as low computation power, low communication capabilities, low bandwidths, high latency, and short-lived power. Therefore, securing communication among these d
Externí odkaz:
https://doaj.org/article/6cb62d0e5d1740448df34595f918b87e
Publikováno v:
Security and Communication Networks. 2022:1-34
The popularity and open-source nature of Android devices have resulted in a dramatic growth of Android malware. Malware developers are also able to evade the detection methods, reducing the efficiency of malware detection techniques. It is hence desi
Publikováno v:
Lecture Notes in Networks and Systems ISBN: 9789811985621
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::16d840ad985b7dadb094c81ff3983231
https://doi.org/10.1007/978-981-19-8563-8_25
https://doi.org/10.1007/978-981-19-8563-8_25
Autor:
Satyabrata Roy, Umashankar Rawat, Sanjeet Kumar Nayak, Chirag Vinodkumar Pandey, Manu Shrivastava
Publikováno v:
Multimedia Tools and Applications. 80:31529-31567
Present era is marked by exponential growth in transfer of multimedia data through internet. Most of the Internet-of-Things(IoT) applications send images to cloud storages through internet. However, in sensitive applications such as healthcare, defen
Publikováno v:
Future Generation Computer Systems. 107:333-350
The secure key generation is the predominant requirement of an image encryption. Chaotic maps are often considered by the researchers for secure key generation. However, chaotic maps suffer from hyper-tuning issue because the requirement of initial p
Publikováno v:
Journal of Ambient Intelligence and Humanized Computing. 11:5083-5102
Digital images play a vital role in multimedia communications in the modern era. With the advent of internet-of-things (IoT) applications, multimedia transfers are happening at a rapid pace. However, providing security to these data is essential if t