Advances in data mining and database management book series,
Год журнала:
2023,
Номер
unknown, С. 1 - 31
Опубликована: Сен. 28, 2023
The
use
of
1D
chaotic
maps
in
multimedia
security
applications
is
becoming
increasingly
attractive
due
to
their
advantages,
including
the
high
sensitivity
both
initial
and
control
parameters,
rich
dynamical
behavior
ease
implementation
for
software
hardware.
This
chapter
presents
a
survey
analysis
recent
encryption,
watermarking,
zero-watermarking
data
hiding
schemes
involving
maps.
present
work
also
attempts
identify
some
drawbacks
existing
involved
such
maps,
with
suggestions
overcoming
identified
limitations.
Blockchain Research and Applications,
Год журнала:
2023,
Номер
5(2), С. 100178 - 100178
Опубликована: Дек. 20, 2023
Protecting
private
data
in
smart
homes,
a
popular
Internet-of-Things
(IoT)
application,
remains
significant
security
and
privacy
challenge
due
to
the
large-scale
development
distributed
nature
of
IoT
networks.
Recently,
healthcare
has
leveraged
home
systems,
thereby
compounding
concerns
terms
confidentiality
sensitive
by
extension
owner.
However,
PoA-based
Blockchain
DLT
emerged
as
promising
solution
for
protecting
from
indiscriminate
use
preserving
individuals
residing
IoT-enabled
homes.
This
review
elicits
some
concerns,
issues,
problems
that
have
hindered
adoption
blockchain
(BCoT)
domains
suggests
requisite
solutions
using
aging-in-place
scenario.
Implementation
issues
with
BCoT
were
examined
well
combined
challenges
can
pose
when
utilised
gains.
The
study
discusses
recent
findings,
opportunities,
barriers,
provide
recommendations
could
facilitate
continuous
growth
application
healthcare.
Lastly,
then
explored
potential
permission
an
applicable
consent-based
model
decision-making
information
disclosure
process,
including
publisher-subscriber
contracts
fine-grained
access
control
ensure
secure
processing
sharing,
ethical
trust
personal
disclosure,
direction.
proposed
authorisation
framework
guarantee
ownership,
conditional
management,
scalable
tamper-proof
storage,
more
resilient
system
against
threat
models
such
interception
insider
attacks.
Scientific Reports,
Год журнала:
2025,
Номер
15(1)
Опубликована: Янв. 2, 2025
This
study
presents
a
novel
privacy-preserving
self-supervised
(SSL)
framework
for
COVID-19
classification
from
lung
CT
scans,
utilizing
federated
learning
(FL)
enhanced
with
Paillier
homomorphic
encryption
(PHE)
to
prevent
third-party
attacks
during
training.
The
FL-SSL
based
employs
two
publicly
available
scan
datasets
which
are
considered
as
labeled
and
an
unlabeled
dataset.
dataset
is
split
into
three
subsets
assumed
be
collected
hospitals.
Training
done
using
the
Bootstrap
Your
Own
Latent
(BYOL)
contrastive
SSL
VGG19
encoder
followed
by
attention
CNN
blocks
(VGG19
+
CNN).
input
processed
selecting
largest
portion
of
each
automated
selection
approach
64
×
size
utilized
reduce
computational
complexity.
Healthcare
privacy
issues
addressed
collaborative
training
across
decentralized
secure
aggregation
PHE,
underscoring
effectiveness
this
approach.
Three
used
train
local
BYOL
model,
together
optimizes
central
encoder.
employed
(updated
CNN),
resulting
in
accuracy
97.19%,
precision
97.43%,
recall
98.18%.
reliability
framework's
performance
demonstrated
through
statistical
analysis
five-fold
cross-validation.
efficacy
proposed
further
showcased
showing
its
on
distinct
modality
datasets:
skin
cancer,
breast
chest
X-rays.
In
conclusion,
offers
promising
solution
accurate
diagnosis
X-rays,
preserving
overcoming
challenges
scarcity
Frontiers in Blockchain,
Год журнала:
2025,
Номер
8
Опубликована: Фев. 13, 2025
Introduction
Blockchain
technology
has
attracted
much
attention
due
to
its
decentralization,
transparency
and
security.
Initially
applied
in
the
financial
field,
it
now
expanded
various
fields
such
as
Internet
of
Things
(IoT),
electronic
cash
healthcare.
However,
open
nature
blockchain
raised
potential
security
concerns
about
sensitive
transaction
data,
increasing
number
transactions
requires
low-latency
solutions.
Most
applications
still
rely
on
lightweight
Elliptic
Curve
Digital
Signature
Algorithm
(ECDSA).
Due
complex
operations
vectorized
multiplication
modular
inversion,
this
may
introduce
significant
additional
overhead.
Methods
To
address
these
issues,
a
new
scheme
named
KTP-ECDSA
is
proposed.
This
based
improved
two-parameter
(TP-ECDSA)
KGLP
algorithm.
In
both
signing
verification
processes,
eliminates
inverse
reduces
scalar
multiplications
during
stage
by
using
batch
verification.
Result
The
experimental
results
show
that,
compared
with
traditional
ECDSA,
achieved
speed
increase
over
50%
independent
verification,
significantly
improving
efficiency
signature
Discussion
By
adopting
algorithm
digital
method,
multiple
signatures
can
be
verified
simultaneously,
thus
reducing
computational
burden
single-verification
method.
greatly
increases
overall
throughput
improves
resource
utilization
efficiency.