Results 181 to 190 of about 153,790 (328)

Parameter Sensitivity Test and Audio Encryption Scheme Design for Multimedia Information Security

open access: yesInternational Journal of Digital Multimedia Broadcasting, Volume 2026, Issue 1, 2026.
With the continuous development of information technology, multimedia information faces many security threats. To realize efficient multimedia information processing under the premise of guaranteeing information security, this research analyzes and extracts the parameters of different kinds of information in view of the fact that each of them has ...
Ming Yin, Shi Tang, Deepali
wiley   +1 more source

Enhanced IoT Security: Blockchain, Cryptography, and CNN Integration for Mask Detection

open access: yesJournal of Electrical and Computer Engineering, Volume 2026, Issue 1, 2026.
Security concerns have become paramount, especially with the increasing reliance on facial recognition technology for identity verification. The use of masks, while essential for health protection, poses a significant challenge for these systems, hindering accurate identification.
Imen Hagui   +3 more
wiley   +1 more source

Cricket‐Enriched Pasta Attenuates Oxidative and Inflammatory Stress in Intestinal Cells: Molecular and Proteomic Insights

open access: yesJournal of Food Biochemistry, Volume 2026, Issue 1, 2026.
The growing demand for sustainable food sources has led to increasing interest in edible insects such as house cricket (Acheta domesticus) as functional ingredients. This study evaluated the anti‐inflammatory and antioxidant potential of cricket powder–enriched (10%) durum wheat pasta subjected to a simulated gastrointestinal digestion followed by the ...
Mussa Makran   +9 more
wiley   +1 more source

A Secure and Robust Blockchain‐Based Medical Image Encryption Approach Using Lorenz Chaotic System

open access: yesJournal of Sensors, Volume 2026, Issue 1, 2026.
Keeping medical images confidential while transmitting is crucial, especially in an open networking environment. One effective approach is blockchain‐based encryption, which provides strong security for sensitive healthcare data. To ensure the greatest levels of medical data integrity and authenticity, our proposed scheme employs a unique Lorenz ...
Fahima Hajjej   +4 more
wiley   +1 more source

Spatiotemporal Big Data Retrieval Method Based on GeoHash Algorithm and Multimode Composite Index

open access: yesModelling and Simulation in Engineering, Volume 2026, Issue 1, 2026.
With the increasing demand for multisource heterogeneous spatiotemporal data in applications such as smart cities and intelligent transportation, how to balance retrieval accuracy, multimodal adaptation, and high concurrency response has become a key issue.
Yanxin Wang, Federica Proietto
wiley   +1 more source

BloomSec: Scalable and privacy-preserving searchable encryption for cloud environments. [PDF]

open access: yesPLoS One
Khan AN   +5 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy