Performance Evaluation of AES, ECC and Logistic Chaotic Map Algorithms in Image Encryption DOI Open Access
Farah Tawfiq Abdul Hussien,

Teaba Wala Aldeen Khairi

International Journal of Interactive Mobile Technologies (iJIM), Год журнала: 2023, Номер 17(10), С. 193 - 211

Опубликована: Май 22, 2023

I n these days of technology, the usage images has become increasingly high especially now that almost everyone access to internet. Also, image helps us learn, grabs our attention, explains complicated concepts as well inspires us. Sharing is essential and therefore encryption algorithms are proposed secure transmission from many types attacks such Man-in-the-middle attack (MITM). In this paper, we a hybrid security system consist Elliptic Curve Cryptography (ECC) Advanced Encryption System (AES). Where ECC used generate private/public keys AES for decryption using generated keys. The works follows; it begins by inserting be encrypted which “lena.png” size 256*256 passing Algorithm along with public key. Then, in algorithm, key hashed then encrypt algorithm. On other hand, algorithm calculating use decrypt Finally, experimental results shows National Institute Standards Technology (NIST) test have better randomness than only histogram show pixels values distributed across all three channels R, G B. This step further get more against To further, Logistic chaotic map been comparison purposes terms randomness,

Язык: Английский

Tactile IoT and 5G & beyond schemes as key enabling technologies for the future metaverse DOI Creative Commons
Kyriaki A. Tychola, Konstantinos Voulgaridis, Θωμάς Λάγκας

и другие.

Telecommunication Systems, Год журнала: 2023, Номер 84(3), С. 363 - 385

Опубликована: Сен. 15, 2023

Abstract The Tactile Internet (TI) is a recently emerging field that has been developing and evolving to date, since its communications parallel the sense of human touch. Lately, revolutionized concept, Metaverse, draws attention due evolved immersive experience perception surrounding environment. This technology supports ultimate union between physical virtual world, facilitated by 5G beyond communication networks. Users are capable interacting with machines devices in real-time, remotely, resembling actions their counterparts. particular approaches still infancy expected produce spectacular results various sectors such as industry, healthcare, autonomous vehicles, etc. immersion further assisted Things, while expecting full wireless support In this article, systematic review studies domains TI, networks, well relations rendering respective schemes Key Enabling Technologies for future Metaverse. A thorough analysis conducted on underpinning schemes, relative architectures, structures, operation modes. addition, comprehensive list presented, focusing related application fields benefits, considering strengths weaknesses involved technologies. Finally, challenges issues arising discussed, both from perspective technical requirements psychosomatic aspect experience.

Язык: Английский

Процитировано

7

Shaping The Future: Developing Principles for Policy Recommendations for Responsible Innovation in Virtual Worlds DOI Open Access
Mike Richardson, Alicia Cork, Danaë Stanton Fraser

и другие.

Опубликована: Май 11, 2024

As Extended Reality (XR) technologies continue to evolve at a rapid pace, they hold the promise of transforming way we interact both with digital information and physical world. Whilst Augmented (AR), Virtual (VR), Mixed (MR) offer unbridled opportunities for social connections, productivity, play, these technological advancements also pose critical challenges ethics, privacy, accessibility, safety. At present, there is little policy documentation that directly addresses novel affordances posed by XR technologies, leading 'policy void' in this space. Having clear effective frameworks prior widespread adoption technology encourages enables responsible ethical innovation technologies. This workshop therefore dedicated developing forward-thinking principles guide recommendations address potential future vulnerabilities whilst simultaneously encouraging new within XR. To ensure promote innovation, will assemble multidisciplinary academics, industry developers international policymakers. Our goal all perspectives are considered such can collaboratively chart sustainable course landscape.

Язык: Английский

Процитировано

2

A Novel Approach for Electronic Medical Records Based on NFT-EMR DOI Open Access
Mohanad A. Mohammed,

Hala B. Abdul Wahab

International Journal of Online and Biomedical Engineering (iJOE), Год журнала: 2023, Номер 19(05), С. 93 - 104

Опубликована: Апрель 27, 2023

saving the patient medical record electronically is done via electronic records (EMRs) where all patient-related information that consider private and sensitive usually related to treatment process, as well diagnoses process of a specific this needs be shared re-submit by many peers doctors with each, In paper, propose novel approach for system using non-fungible token (NFT) based on customized permission blockchain built secret sharing technology reduce key management overhead provide readable extension ledger ensure it easy read access from any type computer. The uses NFT (NFT-EMR) ensures guarantees availability, privacy, security providing authority over his data proof ownership which shares consistency can used in real-world between hospitals centers within metaverse world. NFT-ERM was evaluated main evaluation factors evaluate compared standard ERM system.

Язык: Английский

Процитировано

6

A scoping study of crime facilitated by the metaverse DOI Open Access
Juliana Gómez, Shane D. Johnson, Hervé Borrion

и другие.

Опубликована: Апрель 29, 2023

The metaverse is an emerging convergence of technologies (e.g. virtual reality and blockchains) that enables users to experience mixed/extended realities for a range legitimate purposes gaming, entertainment education). Unfortunately, the crime security implications are often overlooked. To anticipate crimes might facilitate, in this paper we report findings nominal group technique (NGT) study which was informed by state-of-the-art scoping review existing literature. We elicited views from two expert groups: 1) mixed European sample (with participants law enforcement, industry, academia voluntary sector), and; 2) international enforcement stakeholders. A total 22 threats were identified literature additional eight experts. These included sexual offenses, against person, property, financial crimes. Participants asked rate these according their likely harm, frequency, achievability defeat-ability. Ratings largely consistent across samples, with nature child abuse material assault), person harassment hate crime) being rated as presenting highest future risks (ie high harm frequency). discussed aim informing approaches preventing metaverse.

Язык: Английский

Процитировано

5

Performance Evaluation of AES, ECC and Logistic Chaotic Map Algorithms in Image Encryption DOI Open Access
Farah Tawfiq Abdul Hussien,

Teaba Wala Aldeen Khairi

International Journal of Interactive Mobile Technologies (iJIM), Год журнала: 2023, Номер 17(10), С. 193 - 211

Опубликована: Май 22, 2023

I n these days of technology, the usage images has become increasingly high especially now that almost everyone access to internet. Also, image helps us learn, grabs our attention, explains complicated concepts as well inspires us. Sharing is essential and therefore encryption algorithms are proposed secure transmission from many types attacks such Man-in-the-middle attack (MITM). In this paper, we a hybrid security system consist Elliptic Curve Cryptography (ECC) Advanced Encryption System (AES). Where ECC used generate private/public keys AES for decryption using generated keys. The works follows; it begins by inserting be encrypted which “lena.png” size 256*256 passing Algorithm along with public key. Then, in algorithm, key hashed then encrypt algorithm. On other hand, algorithm calculating use decrypt Finally, experimental results shows National Institute Standards Technology (NIST) test have better randomness than only histogram show pixels values distributed across all three channels R, G B. This step further get more against To further, Logistic chaotic map been comparison purposes terms randomness,

Язык: Английский

Процитировано

4