An out-of-band mobile authenticating mechanism for controlling access to data outsourced in the mobile cloud environment
'Mobile Cloud Computing' (MCC), a cloud environment, formed by mobile users at the client-side and cloud servers at the back-end enables users to store and pervasively access a huge amount of data via different mobile devices in a distributive manner. ...
Parkinson's diagnosis using ant-lion optimisation algorithm
Parkinson's disease (PD) is a long term progressive disorder of the central nervous system that mainly affects the movement of the body. But there are several limitations in detecting PD at an early stage. In this paper, a binary variant of the recently ...
An improved chaotic-based African buffalo optimisation algorithm
Optimisation remains inevitable in any organisation as the need to maximise the limited resources persists. It justifies the seemingly endless research in this area. This study explores the effectiveness of chaos to mitigate false or premature convergence ...
Image integrity verification via reversible predictive hiding and elliptic curve Diffie-Hellman
This paper presents a medical image integrity verification algorithm which will be able to detect any changes made in the pixel value or the size of a medical image. At the same time, it also provides a secure way of transmitting images over the public ...
Bio-inspired algorithms for diagnosis of breast cancer
Most commonly found cancer among women is breast cancer. Roughly 12% of women grow breast cancer during their lifetime. It is the second prominent fatal cancer among women. Breast cancer diagnosis is necessary during its initial phase for the proper ...
A robust approach to detect video-based attacks to enhance security
Face authentication has become widespread on smart devices and in various applications these days. Real time detection of human faces in video surveillance systems is challenging due to variations in expression and background conditions. Thus, precise ...
Increased PSNR with improved DWT digital watermarking technique
Today, the world is moving towards a digital era in every walk of life. Every business, government and private sectors, and research organisation use the digital image, as a transfer mode for critical data. The images over the internet are not secure ...
Secure provenance-based communication using visual encryption
Explicit specification of the historical record of an instance or a data item is called data provenance. It has many applications in various fields with regards to its importance on capturing data flow mechanisms. However, on the other hand, there are ...
A survey on partitional clustering using single-objective metaheuristic approach
Clustering is one of the important functions of data mining, which is used to analyse a large amount of data. It groups these set of data according to some similarity property such that data within the cluster are similar to each other and data between ...