2023
DOI: 10.3390/math11081769
|View full text |Cite
|
Sign up to set email alerts
|

Neural Attractor-Based Adaptive Key Generator with DNA-Coded Security and Privacy Framework for Multimedia Data in Cloud Environments

Abstract: Cloud services offer doctors and data scientists access to medical data from multiple locations using different devices (laptops, desktops, tablets, smartphones, etc.). Therefore, cyber threats to medical data at rest, in transit and when used by applications need to be pinpointed and prevented preemptively through a host of proven cryptographical solutions. The presented work integrates adaptive key generation, neural-based confusion and non-XOR, namely DNA diffusion, which offers a more extensive and unique … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 28 publications
(5 citation statements)
references
References 51 publications
0
5
0
Order By: Relevance
“…In practical scenarios, attackers might not necessarily aim to decrypt cryptographic systems; instead, they might focus on disrupting the transmission medium to achieve their objectives. Common techniques involve cropping encrypted image transmissions or introducing noise to the ciphertext images to disrupt communication [69][70][71]. To evaluate the resilience of the cryptographic system proposed in this paper against cropping and noise attacks, we conducted the following experiments:…”
Section: Cropping Attack and Noise Attackmentioning
confidence: 99%
“…In practical scenarios, attackers might not necessarily aim to decrypt cryptographic systems; instead, they might focus on disrupting the transmission medium to achieve their objectives. Common techniques involve cropping encrypted image transmissions or introducing noise to the ciphertext images to disrupt communication [69][70][71]. To evaluate the resilience of the cryptographic system proposed in this paper against cropping and noise attacks, we conducted the following experiments:…”
Section: Cropping Attack and Noise Attackmentioning
confidence: 99%
“…Natural Language Processing (NLP) Natural Language Processing (NLP) serves as a potent tool for generating code from natural language (NL) descriptions [27], [28]. Techniques within NLP, such as parsing, neural language models, sequence-to-sequence models [11], semantic analysis, and machine translation, are harnessed for this purpose.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Consequently, if the Euclidean distance between the newly introduced data and the trained data is similar (termed as a match in the AIS algorithm), it is deemed as "self," representing the normal state. Conversely, if there is dissimilarity, it is categorized as "non-self," indicating an abnormal state [39]. In this study, data failing to match are classified as faulty data.…”
Section: Algorithmmentioning
confidence: 99%