GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Computer security. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (305 pages)
    Edition: 1st ed.
    ISBN: 9789811587115
    Series Statement: Algorithms for Intelligent Systems Series
    DDC: 005.8
    Language: English
    Note: Intro -- Preface -- Contents -- About the Editors -- Part ISecurity Using Cryptography and Chaotic Theory: Algorithm Development and Analysis -- 1 Securing Medical Images via a Texture and Chaotic Key Framework -- 1 Introduction -- 2 Related Work -- 3 Materials and Methods -- 3.1 Initial Pixel Shuffling via ACM -- 3.2 Low-/Mid-Frequency Maps via Gabor Filters -- 3.3 Key Generation via Chaotic Maps -- 4 Results and Analysis -- 4.1 Histogram Analysis -- 4.2 Image Entropy -- 4.3 Line Profile -- 4.4 Correlation Coefficient -- 4.5 Key Space of the Proposed Cryptosystem -- 4.6 Image Quality Performance -- 5 Conclusion -- References -- 2 Image Encryption Based on DNA Substitution and Chaotic Theory -- 1 Introduction -- 2 Introduction to DNA -- 2.1 DNA Encoding and Complementary Rule -- 2.2 DNA-Based Image Encryption -- 3 Chaos and Logistic Map -- 4 Literature Review -- 5 Proposed Method -- 5.1 Formation of Chaotic Binary Sequence -- 5.2 DNA Substitution -- 6 Algorithm Description of the Proposed Technique -- 7 Simulation Results -- 7.1 Security Analysis -- 7.2 Secret Key's Sensitivity Analysis -- 7.3 Secret Key's Space Analysis -- 7.4 Histogram Analysis -- 8 Conclusion -- References -- 3 Impact of Computational Power on Cryptography -- 1 Introduction -- 1.1 Literature Review -- 1.2 Organization of Chapter -- 2 Introduction to Cryptography -- 3 Pre-multimedia Era cryptography-The Classical Cryptography -- 3.1 Caesar Cipher -- 3.2 Shift Ciphers -- 3.3 Impact of Computational Power on Caesar and Shift Ciphers -- 3.4 Monoalphabetic Substitution Ciphers (MASC) -- 3.5 Vigenère Cipher -- 3.6 Impact of Computational Power on Vigenère Cipher -- 3.7 The One-Time Pad or Vernam Cipher -- 3.8 Impact of Computational Power on One-Time Pad -- 3.9 Transposition or Permutation Ciphers -- 3.10 Impact of Computational Power on Transposition Ciphers. , 4 Modern Cryptography -- 4.1 Data Encryption Standard (DES) -- 4.2 Impact of Computational Power on DES -- 4.3 Tripe DES (3DES or FIPS 46-3) -- 4.4 Impact of Computational Power on 3DES -- 4.5 AES-Advanced Encryption Standard -- 4.6 Impact of Computational Power on AES -- 4.7 RSA Public Key Cipher -- 4.8 Impact of Computational Power on RSA -- 4.9 Elliptic Curve Cryptography (ECC) -- 4.10 Impact of Computational Power on Elliptic Curve Cryptography (ECC) -- 5 Conclusion -- References -- 4 Privacy Preserving Anti-forensic Techniques -- 1 Introduction -- 2 Related Work -- 2.1 Privacy -- 2.2 Anti-forensics -- 3 Privacy Preserving Anti-forensic Techniques -- 3.1 Data Wiping: Secured Deletion -- 3.2 Boot Sector -- 3.3 Reserved Locations -- 3.4 Slack Space -- 3.5 HPA and DCO -- 3.6 Directory Mounting: Hiding in Plain Sight -- 3.7 Encryption: Second Most Anti-forensic Technique -- 3.8 Steganography: A Perfect Camouflage -- 3.9 Onion Routing: Anonymous Communication -- 4 Discussion -- 5 Conclusion -- References -- Part IIInformation Embedding for Secure Data Communication and Authentication -- 5 Information Embedding Using DNA Sequences for Covert Communication -- 1 Introduction -- 2 Introduction to DNA -- 2.1 DNA Computing -- 2.2 DNA Cryptography -- 3 Literature Review -- 4 Proposed Method -- 4.1 Method 1: New Substitution Method for Data Hiding Using DNA Sequences -- 4.2 Method 2: New Insertion Method for Data Encryption Using DNA Sequences -- 5 Results and Discussion -- 6 Conclusion and Future Work -- References -- 6 Information Hiding in Color Images Utilizing Multi-bit Substitution Patterns -- 1 Introduction -- 2 Related Work -- 3 Proposed Scheme -- 3.1 Interpolation -- 3.2 Multi-bit Substitution Pattern -- 3.3 Data Embedding -- 3.4 Data Extraction -- 4 Results and Discussions -- 4.1 Imperceptibility Analysis -- 4.2 Reversibility analysis. , 4.3 Authentication and Fragility analysis -- 5 Summary -- References -- 7 Data Embedding in Color Images: A Secure Data Communication Framework Based on Modular Arithmetic -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Scheme -- 4 Experimental Results -- 5 Conclusion -- References -- 8 Survey on Reversible Watermarking Techniques for Medical Images -- 1 Introduction -- 2 General Framework for Digital Watermarking -- 2.1 Watermark Embedding Module (WEM) -- 2.2 Watermark Detection/Extraction Module (WDM) -- 3 Classification of Digital Watermarking -- 3.1 Fragile Watermarking -- 3.2 Semi-fragile Watermarking -- 3.3 Robust Watermarking -- 4 Classification of Reversible Digital Watermarking -- 5 Evaluation Metrics -- 5.1 Peak Signal-To-Noise Ratio (PSNR) -- 5.2 Structural Similarity (SSIM) Index -- 6 State-of-the-Art Reversible Watermarking for Medical Imagery -- 7 Conclusion -- References -- 9 Security and Privacy of E-health Data -- 1 Introduction -- 2 Background -- 2.1 Applications of Electronic Health Records (EHR) -- 2.2 Privacy in Electronic Health Systems -- 3 Security in Electronic Health Systems -- 4 Security Models Proposed in E-healthcare -- 5 Conclusion -- References -- Part IIISecurity in IoT and Big Data-Driven Enterprise -- 10 Implementation of Intrusion Detection System for Internet of Things Using Machine Learning Techniques -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Result and Analysis -- 5 Conclusion and Future Scope -- References -- 11 An Efficient Approach for Phishing Detection using Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Methodology Used -- 3.1 Data Acquisition -- 3.2 Classification before Feature Selection -- 3.3 Feature Selection -- 3.4 Classification after Feature Selection -- 3.5 Evaluation and Validation -- 4 Experimental Results -- 5 Conclusion and Future Scope -- References. , 12 Use of Blockchain and Internet of Things for Securing Data in Healthcare Systems -- 1 Introduction -- 1.1 Blockchain Concept -- 1.2 Internet of Things -- 2 History of Blockchain -- 3 Working of Blockchain -- 4 Literature Survey -- 5 Proposed Methodology -- 6 Scope of Improvement in Model -- 7 Conclusion -- References -- 13 Asset Security in Data of Internet of Things Using Blockchain Technology -- 1 Introduction -- 1.1 Blockchain Concept -- 1.2 Internet of Things -- 1.3 Blockchain in Internet of Things -- 1.4 Key Blockchain Features for Building Trust in Organizations -- 2 Related Work -- 3 Asset Management in IoT Using Blockchain -- 4 Future Trends of Blockchain in IoT -- 5 Conclusion -- References -- 14 Review of Secure Distributed Range-Free Hop-Based Localization Algorithms in the Wireless Sensor Networks -- 1 Introduction -- 2 Localization Process -- 3 Localization Types -- 3.1 GPS Related -- 3.2 Communication-Based -- 3.3 Anchor Related -- 3.4 Range Related -- 3.5 Range-Free Schemes -- 4 Issues in Localization -- 4.1 Accuracy -- 4.2 Energy Consumption -- 4.3 Overhead -- 4.4 Optimization -- 4.5 Mobility -- 4.6 3D Deployment -- 4.7 Security -- 5 Need of Secure Localization -- 5.1 Security Requirements -- 5.2 Various Attacks in Localization -- 6 Secure Localization-Based Related Work -- 7 Multimedia Security and Authentication Techniques-Related Work -- 8 Research Gaps -- 9 Conclusion -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...