首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.

Image segmentation has proved its importance and plays an important role in various domains such as health systems and satellite-oriented military applications. In this context, accuracy, image quality, and execution time deem to be the major issues to always consider. Although many techniques have been applied, and their experimental results have shown appealing achievements for 2D images in real-time environments, however, there is a lack of works about 3D image segmentation despite its importance in improving segmentation accuracy. Specifically, HMM was used in this domain. However, it suffers from the time complexity, which was updated using different accelerators. As it is important to have efficient 3D image segmentation, we propose in this paper a novel system for partitioning the 3D segmentation process across several distributed machines. The concepts behind distributed multimedia network segmentation were employed to accelerate the segmentation computational time of training Hidden Markov Model (HMMs). Furthermore, a secure transmission has been considered in this distributed environment and various bidirectional multimedia security algorithms have been applied. The contribution of this work lies in providing an efficient and secure algorithm for 3D image segmentation. Through a number of extensive experiments, it was proved that our proposed system is of comparable efficiency to the state of art methods in terms of segmentation accuracy, security and execution time.

  相似文献   

2.
设计并完成一个骨科电子病历及图像管理系统,实现多种病案资料的计算机管理及多种医学图像处理功能。系统的病历资料管理不仅包括传统的文字病历资料,还包括相关的图片资料,结束了X光线片脱离病案资料的局面。同时,系统利用VC高效执行的特点,在电子病历基础上提供一个针对骨科X线片的图像处理平台。经实验证明,能很好地改善X光线片曝光不足、边缘模糊的情况,给医生的临床决策提供帮助。  相似文献   

3.
Secure provenance that records the ownership and process history of data objects is vital to the success of data forensics in cloud computing. In this paper, we propose a new secure provenance scheme based on group signature and attribute-based signature techniques. The proposed provenance scheme provides confidentiality on sensitive documents stored in a cloud, unforgeability of the provenance record, anonymous authentication to cloud servers, fine-grained access control on documents, and provenance tracking on disputed documents. Furthermore, it is assumed that the cloud server has huge computation capacity, while users are regarded as devices with low computation capability. Aiming at this, we show how to utilize the cloud server to outsource and decrease the user’s computational overhead during the process of provenance. With provable security techniques, we formally demonstrate the security of the proposed scheme under standard assumptions.  相似文献   

4.
ABSTRACT

In the proposed technique we have merged two layers of security, namely, the watermarking layer and the secure channel management layer used in the framework of a real time multimedia security system. The joint layer embeds watermark to the host signal and deploys encryption simultaneously to protect multimedia data, thereby reducing the processing delay. The scheme supports G.729 codec bit-stream. Encryption is done using Data Encryption Standard (DES) protocol. The computation time and watermark-embedding rate is evaluated for the proposed algorithm.  相似文献   

5.

The confidentiality of highly-sensitive multimedia signals is considered in this paper, it can be enhanced by efficient secured model utilizing several-layer security algorithms. The hybrid data hiding and cryptographic techniques are merged for constructing secured model. The Least Significant Bit (LSB) data hiding steganography is utilized with a 2-D Logistic-based map (Model-I) and second Model-II involves data hiding merging within chaotic-Baker-based image encryption security techniques. ?Performance analyzing and comparison have been presented utilizing various images for examining the applicability of the different proposed image security scenarios for securing wireless image transmission over noise-free, and noisy channels. Moreover, the proposed algorithms are applied for transmission over Orthogonal Frequency-Division Multiplexing (OFDM) channels, and their performance is evaluated under different conditions of fading environments with utilizing the powerful error control schemes in the case of SUI-3 model channel and randomizing the packet based on the encryption tools. An equalizer is used to mitigate the impact of composite fading. A multi-layer security model using Discrete Wavelet Transform (DWT) steganography with chaotic Baker encryption is proposed to protect highly-sensitive text based data records. The results reveal that it can be used efficiently for protecting highly-sensitive text message and records (text-based data). The timing analysis and comparative study are considered with respect to the previous related works.

  相似文献   

6.
In this paper, we propose a secure and efficient software framework for non-repudiation service based on an adaptive secure methodology in e-commerce (electronic commerce). First, we introduce an explicit security framework of the e-commerce transaction called notary service. The proposed framework supports non-repudiation of service for a successful e-commerce transaction in terms of generation, delivery, retrieval, and verification of the evidence for resolving disputes. Second, we propose an adaptive secure methodology to support secure and efficient non-repudiation of service in the proposed framework. Our adaptive secure methodology dynamically adapts security classes based on the nature and sensitivity of interactions among participants. The security classes incorporate security levels of cryptographic techniques with a degree of information sensitivity. As Internet e-businesses exponentially grow, a need for high security level categories to identify a group of connections or individual transactions is manifest. Therefore, development of an efficient and secure methodology is in high demand. We have done extensive experiments on the performance of the proposed adaptive secure methodology. Experimental results show that the adaptive secure methodology provides e-commerce transactions with high quality of security services. Our software framework incorporating the adaptive secure methodology is compared with existing well-known e-commerce frameworks such as SSL (Secure Socket Layer) and SET (Secure Electronic Transaction).  相似文献   

7.
设计并完成一个骨科电子病历及图像管理系统,实现多种病案资料的计算机管理及多种医学图像处理功能。系统的病历资料管理不仅包括传统的文字病历资料,还包括相关的图片资料,结束了X光线片脱离病案资料的局面。同时,系统利用VC高效执行的特点,在电子病历基础上提供一个针对骨科X线片的图像处理平台。经实验证明,能很好地改善X光线片曝光不足、边缘模糊的情况,给医生的临床决策提供帮助。  相似文献   

8.
Standards for XML and Web services security   总被引:1,自引:0,他引:1  
Naedele  M. 《Computer》2003,36(4):96-98
XML schemas convey the data syntax and semantics for various application domains, such as business-to-business transactions, medical records, and production status reports. However, these schemas seldom address security issues, which can lead to a worst-case scenario of systems and protocols with no security at all. At best, they confine security to transport level mechanisms such as secure sockets layer (SSL). On the other hand, the omission of security provisions from domain schemas opens the way for generic security specifications based on XML document and grammar extensions. These specifications are orthogonal to domain schemas but integrate with them to support a variety of security objectives, such as confidentiality, integrity, and access control. In 2002, several specifications progressed toward providing a comprehensive standards framework for secure XML-based applications. The paper shows some of the most important specifications, the issues they address, and their dependencies.  相似文献   

9.
A primary objective of blockchain technology is to address information security and efficiency issues related to existing information sharing systems. For the sharing of health records, little is known about the application of blockchain in management information systems. There are strict regulations for sharing health information due to insecure systems and privacy concerns. To significantly and effectively improve medical diagnosis, it is beneficial to have efficient, reliable, and accurate accessibility to a patient's full medical history. Due to concerns with the security of health systems and privacy concerns, medical histories are not always accessible to healthcare providers. To help increase accessibility options, this research proposes a blockchain-based model that facilitates sharing medical records in a manner that is beneficial to both healthcare providers and patients. Social exchange theory provides the theoretical support for the conceptual model presented. Experimental findings based on 151 participants revealed that the blockchain technology can provide a secure information system and increase patient motivation to share medical records. To show the applicability of the proposed use of blockchain from a practical managerial perspective, we show feasibility by developing an Android software application.  相似文献   

10.
A novel and generalized open framework for multimedia information manipulation is proposed. The document system consists of functional modules for capturing, storing and presenting multimedia data. These modules work independently and communicate through aHyperDocument Interfacelayer. The modular approach has the added advantage of easy-to-maintain and the convenience for future enhancements. Hypermedia and temporal –spatial relationships between document media nodes are embedded into the data structure to support flexible presentation of multimedia information. Windows and a specially designedDocument Tree Dialogprovide an environment for efficient and user-friendly information retrieval. Other system issues such as security and customization are also addressed in the design. Based on this approach, a medical multimedia document system to handle cardiac catheterization record (CCR) was designed as a demonstration for the research idea. The proposed design can be applied and extended to cover a variety of multimedia applications.  相似文献   

11.
Record linkage aims at finding the matching records from two or multiple different databases. Many approximate string matching methods in privacy-preserving record linkage have been presented. In this paper, we study the problem of secure record linkage between two data files in the two-party computation setting. We note that two records are linked when all the Hamming distances between their attributes are smaller than some fixed thresholds. We firstly construct two efficient secure protocols for computing the powers of an encrypted value and implementing zero test on an encrypted value, then present an efficient protocol within constant rounds for computing the Hamming distance based record linkage in the presence of malicious adversaries by transferring these two protocols. We also discuss the extension of our protocol for settling the Levenshtein distance based record linkage problem.  相似文献   

12.
The interest for multimedia database management systems has grown rapidly due to the need for the storage of huge volumes of multimedia data in computer systems. An important building block of a multimedia database system is the query processor, and a query optimizer embedded to the query processor is needed to answer user queries efficiently. Query optimization problem has been widely studied for conventional database systems; however it is a new research area for multimedia database systems. Due to the differences in query processing strategies, query optimization techniques used in multimedia database systems are different from those used in traditional databases. In this paper, a query optimization strategy is proposed for processing spatio-temporal queries in video database systems. The proposed strategy includes reordering algorithms to be applied on query execution tree. The performance results obtained by testing the reordering algorithms on different query sets are also presented.  相似文献   

13.
In recent years, the volume of educational contents has been explosively increased thanks to the rapid development of multimedia technologies. Furthermore, the development of smart devices has made various educational institutes use them as effective learning tools. Since more and more educational contents become available not only at school zone but at a variety of online learning systems, it becomes increasingly unaffordable for a single educational contents provider to store and process them locally. Therefore, many educational contents providers are likely to outsource the contents to cloud storage for cost saving. These phenomena raise one serious concern: how to authenticate educational contents users in a secure and efficient way? The most widely used password-based authentication suffers from numerous drawbacks in terms of security. Multi-factor authentication protocols based on diverse communication channels such as SMS, biometric, hardware token could enhance security, however they inevitably bring poor usability. To this end, we present a data block-based authentication scheme, which provides provable security and guarantees usability invariant such that users do nothing but entering a password. In addition, the proposed scheme supports efficient user revocation. To the best of our knowledge, our scheme is the first data block-based authentication scheme for outsourced educational contents that is provably secure without usability degradation. The experiment on Amazon EC2 cloud shows that the proposed scheme guarantees nearly constant time for user authentication.  相似文献   

14.
The E-health care systems allow patients to gain the health monitoring facility and access medical services remotely. A secure mechanism for mutual authentication and session key agreement is the most important requirements for E-Health Care Systems. Recently, Amin et al.’s proposed a mutual authentication and session key agreement protocol and claimed that their scheme is secure against all possible attacks. In this paper, we show that not only their scheme is vulnerable to privileged-insider attack, replay attack, session key disclosure attack, but also does not provide patient untraceability and backward secrecy. In order to withstand the mentioned security weaknesses, we propose an efficient remote mutual authentication scheme for the systems which are using ECC and Fuzzy Extractor. The proposed scheme not only resists against different security attacks, but it also provides an efficient registration, login, mutual authentication, session key agreement, and password and biometric update phases. During the experimentation, it has been observed that the proposed scheme is secure against various known attacks. Beside, our scheme is robust against privileged-insider attack that it rarely checked in security analysis. The informal analysis will ensure that our scheme provides well security protection against the different security attacks. Furthermore, we analyzed the security of the scheme using AVISPA software and Random Oracle Model. The formal analysis results and performance evaluation vouch that our scheme is also secure and efficient in computation and communication cost.  相似文献   

15.
区块链技术减轻了对中心设备的依赖,实现信息验证的完整性和所有权,其独特的分散和透明特性,可有效地解决信息管理过程中存在的记录不完整及难以获取自身心里健康信息等问题。高效的心理健康管理系统需要互操作性,这允许软件应用程序和技术平台安全、无缝的通信。本文采用区块链技术以安全且伪匿名的方式访问纵向、完整且可篡改的心理记录信息——这些记录存储在分散的系统中,实现异构系统间的信息交互,解决了心理健康管理过程中数据安全交互的问题。  相似文献   

16.

This paper offers a medical image watermarking approach based on Wavelet Fusion (WF), Singular Value Decomposition (SVD), and Multi-Level Discrete Wavelet Transform (M-DWT) with scrambling techniques for securing the watermarks images. The proposed approach can be used for providing multi-level security in various applications such as military, copyright protection, and telemedicine systems. The key idea of the projected approach is to first combine two digital watermark images into a single fused watermark to increase the embedded information payload. Then, the fused watermark is scrambled using Arnold and Chaotic algorithms. Finally, the scrambled fused watermark is embedded in the cover image using the SVD and three-level DWT algorithms. The selection of the Arnold and chaotic for watermark encryption is attributed to confirm robustness which resists several types of multimedia attacks and upturn the security level. This paper also presents a comparative study of the proposed approach for different digital images to determine its robustness and stability. Several simulation results reveal that the proposed system improves the capacity and security of embedded medical watermarks without affecting the cover image quality. In conclusion, the proposed approach achieved not only precise acceptable perceptual quality with admired Peak Signal-to-Noise Ratio (PSNR) values but similarly high Correlation Coefficient (Cr) and SSIM values in the existence of severe attacks.

  相似文献   

17.

With the growth of the internet, development of IP based services has increased. Voice over IP (VoIP) technology is one of the services which works based on the internet and packet switching networks and uses this structure to transfer the multimedia data e.g. voices and images. Recently, Chaudhry et al., Zhang et al. and Nikooghadam et al. have presented three authentication and key agreement protocols, separately. However, in this paper, it is proved that the presented protocols by Chaudhry et al. and also Nikooghadam et al. do not provide the perfect forward secrecy, and the presented protocol by Zhang et al. not only is vulnerable to replay attack, and known session-specific temporary information attack, but also does not provide user anonymity, re-registration and revocation, and violation of fast error detection. Therefore, a secure and efficient two-factor authentication and key agreement protocol is presented. The security analysis proves that our proposed protocol is secure against various attacks. Furthermore, security of proposed scheme is formally analyzed using BAN logic and simulated by means of the AVISPA tool. The simulation results demonstrate security of presented protocol against active and passive attacks. The communication and computation cost of the proposed scheme is compared with previously proposed authentication schemes and results confirm superiority of the proposed scheme.

  相似文献   

18.
Naz  Farah  Shoukat  Ijaz Ali  Ashraf  Rehan  Iqbal  Umer  Rauf  Abdul 《Multimedia Tools and Applications》2020,79(31-32):22107-22129

The main challenge for American Standard Code for Information Interchange (ASCII) based image encryption methods is to increase security with less computational cost. Earlier, well known image encryption techniques are not only deficient in performance but also lacked in embedding of confidential data in an image using ASCII based methods. Therefore, this study aims to contribute an ASCII based efficient and secure image encryption method having additional feature of embedding confidential data in an image. Moreover, the embedding process is not static but it is dynamic as compared to the existing work. The novelty of proposed method encompasses optimal security, effective encryption speed and randomized embedding of secret data in an image even of having multi-operations. The proposed method was evaluated experimentally with variety of tests such as Pixel correlation analysis, Number of Pixels Change Rate (NPCR), Unified Average Changing Intensity (UACI), Histogram, Entropy, Peak Signal to Noise Ratio (PSNR), and Mean Square Error (MSE) including encryption decryption time. Thus the experimental results show that the proposed method is optimally secure and outperformed in image encryption as well as in randomized embedding of confidential data than the existing techniques.

  相似文献   

19.
徐健  陈志德  龚平  王可可 《计算机应用》2019,39(5):1500-1506
针对在当前医疗系统中医疗记录授权流程繁琐、记录分享效率低下和身份验证困难问题,提出一种结合区块链技术与密码学的非对称加密技术的方法,将非对称加密技术的安全性高、多方协作简单等特性应用到区块链技术构成的点对点网络中,实现医疗记录跨域分享的可追踪、数据的不可篡改和身份验证的简化。首先,基于区块链技术的不可篡改性结合非对称加密技术,设计了文件同步合约和授权合约,其分布式储存优势保证了用户医疗信息隐私。其次,跨域获取合约的设计能够有效验证数据分享双方身份以及提高身份验证效率,不需要第三方公证机构便可安全过滤非合法用户。仿真实验结果显示,所提出的方案相比传统使用云计算方法解决医疗记录分享问题的方案,在数据防盗窃、多方身份验证和节约系统开销方面有明显优势。该方案对利用区块链的去中心化、可审计等优点解决数据分享过程中的安全问题提供了参考,为解决数据跨域分享、跨域身份验证问题提供了借鉴思路。  相似文献   

20.
We present a security architecture for a trustworthy open computing platform that aims at solving a variety of security problems of conventional platforms by an efficient migration of existing operating system components, a Security Software Layer (PERSEUS), and hardware functionalities offered by the Trusted Computing technology. The main goal is to provide multilateral security, e.g., protecting users' privacy while preventing violations of copyrights. Hence the proposed architecture includes a variety of security services such as secure booting, trusted GUI, secure installation/update, and trusted viewer. The design is flexible enough to support a wide range of hardware platforms, i.e., PC, PDA, and embedded systems. The proposed platform shall serve as a basis for implementing a variety of innovative business models and distributed applications with multilateral security.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号