International Journal of Interactive Mobile Technologies (iJIM),
Год журнала:
2023,
Номер
17(10), С. 193 - 211
Опубликована: Май 22, 2023
I
n
these
days
of
technology,
the
usage
images
has
become
increasingly
high
especially
now
that
almost
everyone
access
to
internet.
Also,
image
helps
us
learn,
grabs
our
attention,
explains
complicated
concepts
as
well
inspires
us.
Sharing
is
essential
and
therefore
encryption
algorithms
are
proposed
secure
transmission
from
many
types
attacks
such
Man-in-the-middle
attack
(MITM).
In
this
paper,
we
a
hybrid
security
system
consist
Elliptic
Curve
Cryptography
(ECC)
Advanced
Encryption
System
(AES).
Where
ECC
used
generate
private/public
keys
AES
for
decryption
using
generated
keys.
The
works
follows;
it
begins
by
inserting
be
encrypted
which
“lena.png”
size
256*256
passing
Algorithm
along
with
public
key.
Then,
in
algorithm,
key
hashed
then
encrypt
algorithm.
On
other
hand,
algorithm
calculating
use
decrypt
Finally,
experimental
results
shows
National
Institute
Standards
Technology
(NIST)
test
have
better
randomness
than
only
histogram
show
pixels
values
distributed
across
all
three
channels
R,
G
B.
This
step
further
get
more
against
To
further,
Logistic
chaotic
map
been
comparison
purposes
terms
randomness,
Telecommunication Systems,
Год журнала:
2023,
Номер
84(3), С. 363 - 385
Опубликована: Сен. 15, 2023
Abstract
The
Tactile
Internet
(TI)
is
a
recently
emerging
field
that
has
been
developing
and
evolving
to
date,
since
its
communications
parallel
the
sense
of
human
touch.
Lately,
revolutionized
concept,
Metaverse,
draws
attention
due
evolved
immersive
experience
perception
surrounding
environment.
This
technology
supports
ultimate
union
between
physical
virtual
world,
facilitated
by
5G
beyond
communication
networks.
Users
are
capable
interacting
with
machines
devices
in
real-time,
remotely,
resembling
actions
their
counterparts.
particular
approaches
still
infancy
expected
produce
spectacular
results
various
sectors
such
as
industry,
healthcare,
autonomous
vehicles,
etc.
immersion
further
assisted
Things,
while
expecting
full
wireless
support
In
this
article,
systematic
review
studies
domains
TI,
networks,
well
relations
rendering
respective
schemes
Key
Enabling
Technologies
for
future
Metaverse.
A
thorough
analysis
conducted
on
underpinning
schemes,
relative
architectures,
structures,
operation
modes.
addition,
comprehensive
list
presented,
focusing
related
application
fields
benefits,
considering
strengths
weaknesses
involved
technologies.
Finally,
challenges
issues
arising
discussed,
both
from
perspective
technical
requirements
psychosomatic
aspect
experience.
As
Extended
Reality
(XR)
technologies
continue
to
evolve
at
a
rapid
pace,
they
hold
the
promise
of
transforming
way
we
interact
both
with
digital
information
and
physical
world.
Whilst
Augmented
(AR),
Virtual
(VR),
Mixed
(MR)
offer
unbridled
opportunities
for
social
connections,
productivity,
play,
these
technological
advancements
also
pose
critical
challenges
ethics,
privacy,
accessibility,
safety.
At
present,
there
is
little
policy
documentation
that
directly
addresses
novel
affordances
posed
by
XR
technologies,
leading
'policy
void'
in
this
space.
Having
clear
effective
frameworks
prior
widespread
adoption
technology
encourages
enables
responsible
ethical
innovation
technologies.
This
workshop
therefore
dedicated
developing
forward-thinking
principles
guide
recommendations
address
potential
future
vulnerabilities
whilst
simultaneously
encouraging
new
within
XR.
To
ensure
promote
innovation,
will
assemble
multidisciplinary
academics,
industry
developers
international
policymakers.
Our
goal
all
perspectives
are
considered
such
can
collaboratively
chart
sustainable
course
landscape.
International Journal of Online and Biomedical Engineering (iJOE),
Год журнала:
2023,
Номер
19(05), С. 93 - 104
Опубликована: Апрель 27, 2023
saving
the
patient
medical
record
electronically
is
done
via
electronic
records
(EMRs)
where
all
patient-related
information
that
consider
private
and
sensitive
usually
related
to
treatment
process,
as
well
diagnoses
process
of
a
specific
this
needs
be
shared
re-submit
by
many
peers
doctors
with
each,
In
paper,
propose
novel
approach
for
system
using
non-fungible
token
(NFT)
based
on
customized
permission
blockchain
built
secret
sharing
technology
reduce
key
management
overhead
provide
readable
extension
ledger
ensure
it
easy
read
access
from
any
type
computer.
The
uses
NFT
(NFT-EMR)
ensures
guarantees
availability,
privacy,
security
providing
authority
over
his
data
proof
ownership
which
shares
consistency
can
used
in
real-world
between
hospitals
centers
within
metaverse
world.
NFT-ERM
was
evaluated
main
evaluation
factors
evaluate
compared
standard
ERM
system.
The
metaverse
is
an
emerging
convergence
of
technologies
(e.g.
virtual
reality
and
blockchains)
that
enables
users
to
experience
mixed/extended
realities
for
a
range
legitimate
purposes
gaming,
entertainment
education).
Unfortunately,
the
crime
security
implications
are
often
overlooked.
To
anticipate
crimes
might
facilitate,
in
this
paper
we
report
findings
nominal
group
technique
(NGT)
study
which
was
informed
by
state-of-the-art
scoping
review
existing
literature.
We
elicited
views
from
two
expert
groups:
1)
mixed
European
sample
(with
participants
law
enforcement,
industry,
academia
voluntary
sector),
and;
2)
international
enforcement
stakeholders.
A
total
22
threats
were
identified
literature
additional
eight
experts.
These
included
sexual
offenses,
against
person,
property,
financial
crimes.
Participants
asked
rate
these
according
their
likely
harm,
frequency,
achievability
defeat-ability.
Ratings
largely
consistent
across
samples,
with
nature
child
abuse
material
assault),
person
harassment
hate
crime)
being
rated
as
presenting
highest
future
risks
(ie
high
harm
frequency).
discussed
aim
informing
approaches
preventing
metaverse.
International Journal of Interactive Mobile Technologies (iJIM),
Год журнала:
2023,
Номер
17(10), С. 193 - 211
Опубликована: Май 22, 2023
I
n
these
days
of
technology,
the
usage
images
has
become
increasingly
high
especially
now
that
almost
everyone
access
to
internet.
Also,
image
helps
us
learn,
grabs
our
attention,
explains
complicated
concepts
as
well
inspires
us.
Sharing
is
essential
and
therefore
encryption
algorithms
are
proposed
secure
transmission
from
many
types
attacks
such
Man-in-the-middle
attack
(MITM).
In
this
paper,
we
a
hybrid
security
system
consist
Elliptic
Curve
Cryptography
(ECC)
Advanced
Encryption
System
(AES).
Where
ECC
used
generate
private/public
keys
AES
for
decryption
using
generated
keys.
The
works
follows;
it
begins
by
inserting
be
encrypted
which
“lena.png”
size
256*256
passing
Algorithm
along
with
public
key.
Then,
in
algorithm,
key
hashed
then
encrypt
algorithm.
On
other
hand,
algorithm
calculating
use
decrypt
Finally,
experimental
results
shows
National
Institute
Standards
Technology
(NIST)
test
have
better
randomness
than
only
histogram
show
pixels
values
distributed
across
all
three
channels
R,
G
B.
This
step
further
get
more
against
To
further,
Logistic
chaotic
map
been
comparison
purposes
terms
randomness,