An overview of visual cryptography techniques

DR Ibrahim, JS Teh, R Abdullah - Multimedia Tools and Applications, 2021 - Springer
Visual cryptography is an encryption technique that decomposes secret images into multiple
shares. These shares are digitally or physically overlapped to recover the original image …

An effective secured privacy-protecting data aggregation method in IoT

S Pramanik - Achieving Full Realization and Mitigating the …, 2022 - igi-global.com
Because privacy concerns in IoT devices are the most sensitive of all the difficulties, such an
extreme growth in IoT usage has an impact on the privacy and life spans of IoT devices …

English teaching practice based on artificial intelligence technology

Y Bin, D Mandal - Journal of Intelligent & Fuzzy Systems, 2019 - content.iospress.com
The automatic scoring of English composition is an inevitable trend of the rapid development
of computer technology and artificial intelligence technology. This makes the research on …

An efficient image encryption using non-dominated sorting genetic algorithm-III based 4-D chaotic maps: Image encryption

A Gupta, D Singh, M Kaur - Journal of Ambient Intelligence and …, 2020 - Springer
Chaotic maps are extensively utilized in the field of image encryption to generate secret
keys. However, these maps suffer from hyper-parameters tuning issues. These parameters …

A verifiable threshold secret image sharing (SIS) scheme with combiner verification and cheater identification

AV Soreng, S Kandar - Journal of Ambient Intelligence and Humanized …, 2023 - Springer
Image transmission is gaining importance with the advancement of information
communication technology. Transmission of sensitive images in diverse applications like …

Computer network security evaluation simulation model based on neural network

Y Tang, M Elhoseny - Journal of Intelligent & Fuzzy Systems, 2019 - content.iospress.com
The computer network security evaluation simulation model is analyzed based on neural
network. Firstly, based on the system security experimental platform, the system security …

An enhanced whale optimization algorithm for vehicular communication networks

SR Valayapalayam Kittusamy… - International Journal …, 2022 - Wiley Online Library
In the field of vehicle communication networks, vehicular ad hoc network (VANET) is
established with the help of road side unit (RSU). Each vehicle in the traffic system is …

Region-based scalable smart system for anomaly detection in pedestrian walkways

BS Murugan, M Elhoseny, K Shankar… - Computers & Electrical …, 2019 - Elsevier
Different-sized anomalies and its occurrence in a shorter period have always been an open
research issue. To resolve the issue of detecting anomalies of different sizes, especially in …

Multimodal biometric authentication system using deep learning method

SS Sengar, U Hariharan… - … Conference on Emerging …, 2020 - ieeexplore.ieee.org
For specific identification process, Identity Management details an ailment of supplying
authorized owners with secure and easy admittance to information and solutions. For …

RETRACTED ARTICLE: Optimal users based secure data transmission on the internet of healthcare things (IoHT) with lightweight block ciphers

SS Rani, JA Alzubi, SK Lakshmanaprabu… - Multimedia Tools and …, 2020 - Springer
The ever-growing advancement in communication innovation of modern smart objects
carries with it a new era of improvement for the Internet of Things (IoT) based networks. The …