A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography

•This research emphasizes enhancing data security in real-time IoV communication considering secure communication also presents a trust-driven privacy method using encryption and steganography for IoV, "Efficient Algorithm for Secure Transmission (EAST)," integrating encryption and stegano...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Computers & electrical engineering Ročník 102; s. 108205
Hlavní autoři: Rathore, Manjari Singh, Poongodi, M., Saurabh, Praneet, Lilhore, Umesh Kumar, Bourouis, Sami, Alhakami, Wajdi, Osamor, Jude, Hamdi, Mounir
Médium: Journal Article
Jazyk:angličtina
Vydáno: Elsevier Ltd 01.09.2022
Témata:
ISSN:0045-7906, 1879-0755
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract •This research emphasizes enhancing data security in real-time IoV communication considering secure communication also presents a trust-driven privacy method using encryption and steganography for IoV, "Efficient Algorithm for Secure Transmission (EAST)," integrating encryption and steganography algorithms.•We develop a data encryption method for IoV communication and verification using distinct symmetric encryption for all three components of vehicle communication.•Development of the standards on multiple systems for secure data transmission in IoV. Comprehensive performance measurement from various angles, including transaction cost, memory overhead, processing time, and energy use.•The proposed EAST method is compared with existing AES [12], DES [13], G-DES [14], and standard LSB [15] using different indicators such as time efficiency, avalanche effect, PSNR, and file cover size. High-speed wireless network technologies play a vital role in autonomous vehicle communication systems (AVS), i.e., IoV (Internet of Vehicles), and enhance the effectiveness and reliability of the communication network. Since the size of IoV communication is rapidly growing, it is now an essential part of our regular routines. Due to its dynamic nature and massive size, it is essential to avoid any miss-communication and protect the data privacy of each vehicle.IoVallowsAVS to link remotely to each other and to various platforms and groups that may be using the same communications system. This quality link between vehicles and the need for information exchanges among vehicles introduces vulnerability and threats that can be exploited by cybercriminals. This research emphasizes on enhancing data security in real-time IoV communication. It presents a trust-driven privacy method using encryption and steganography for IoV. This method uses an Efficient Algorithm for Secure Transmission (EAST) that integrates encryption and steganography algorithms. The proposed EAST is then compared to the various current state of arts, i.e., AES (Advanced Encryption Standard), DES (Data Encryption Standard), G-DES (Generalized DES), and Standard LSB on the basis of various performance measuring parameters, i.e., encryption and decryption time, efficiency, avalanche effect, PSNR, and file cover size. Experimental results are promising for the proposed EAST method, which reported a better time efficiency of 0.86 ms, avalanche effect of 58.81%, and PSNR of 78.58%, compared to the current state arts. [Display omitted]
AbstractList •This research emphasizes enhancing data security in real-time IoV communication considering secure communication also presents a trust-driven privacy method using encryption and steganography for IoV, "Efficient Algorithm for Secure Transmission (EAST)," integrating encryption and steganography algorithms.•We develop a data encryption method for IoV communication and verification using distinct symmetric encryption for all three components of vehicle communication.•Development of the standards on multiple systems for secure data transmission in IoV. Comprehensive performance measurement from various angles, including transaction cost, memory overhead, processing time, and energy use.•The proposed EAST method is compared with existing AES [12], DES [13], G-DES [14], and standard LSB [15] using different indicators such as time efficiency, avalanche effect, PSNR, and file cover size. High-speed wireless network technologies play a vital role in autonomous vehicle communication systems (AVS), i.e., IoV (Internet of Vehicles), and enhance the effectiveness and reliability of the communication network. Since the size of IoV communication is rapidly growing, it is now an essential part of our regular routines. Due to its dynamic nature and massive size, it is essential to avoid any miss-communication and protect the data privacy of each vehicle.IoVallowsAVS to link remotely to each other and to various platforms and groups that may be using the same communications system. This quality link between vehicles and the need for information exchanges among vehicles introduces vulnerability and threats that can be exploited by cybercriminals. This research emphasizes on enhancing data security in real-time IoV communication. It presents a trust-driven privacy method using encryption and steganography for IoV. This method uses an Efficient Algorithm for Secure Transmission (EAST) that integrates encryption and steganography algorithms. The proposed EAST is then compared to the various current state of arts, i.e., AES (Advanced Encryption Standard), DES (Data Encryption Standard), G-DES (Generalized DES), and Standard LSB on the basis of various performance measuring parameters, i.e., encryption and decryption time, efficiency, avalanche effect, PSNR, and file cover size. Experimental results are promising for the proposed EAST method, which reported a better time efficiency of 0.86 ms, avalanche effect of 58.81%, and PSNR of 78.58%, compared to the current state arts. [Display omitted]
ArticleNumber 108205
Author Saurabh, Praneet
Bourouis, Sami
Alhakami, Wajdi
Lilhore, Umesh Kumar
Poongodi, M.
Osamor, Jude
Rathore, Manjari Singh
Hamdi, Mounir
Author_xml – sequence: 1
  givenname: Manjari Singh
  surname: Rathore
  fullname: Rathore, Manjari Singh
  organization: Oriental Institute of Technology, Bhopal, Madhya Pradesh, India
– sequence: 2
  givenname: M.
  surname: Poongodi
  fullname: Poongodi, M.
  organization: Division of Information and Computing Technology, College of Science and Engineering, Hamad Bin Khalifa University, Doha, Qatar
– sequence: 3
  givenname: Praneet
  surname: Saurabh
  fullname: Saurabh, Praneet
  organization: Mody University of Science and Technology, Lakshmangarh, Rajasthan, India
– sequence: 4
  givenname: Umesh Kumar
  surname: Lilhore
  fullname: Lilhore, Umesh Kumar
  email: umeshlilhore@gmail.com
  organization: KIET Group of institutions, Delhi-NCR, Uttar Pradesh, India
– sequence: 5
  givenname: Sami
  surname: Bourouis
  fullname: Bourouis, Sami
  organization: Department of Information Technology, College of Computers and Information Technology, Taif, Saudi Arabia
– sequence: 6
  givenname: Wajdi
  surname: Alhakami
  fullname: Alhakami, Wajdi
  organization: Department of Information Technology, College of Computers and Information Technology, Taif, Saudi Arabia
– sequence: 7
  givenname: Jude
  surname: Osamor
  fullname: Osamor, Jude
  organization: Department of Cyber Security and Networks, Glasgow Caledonian University, Cowcaddens Road, Glasgow, Scotland G4 0BA, United Kingdom
– sequence: 8
  givenname: Mounir
  surname: Hamdi
  fullname: Hamdi, Mounir
  organization: Division of Information and Computing Technology, College of Science and Engineering, Hamad Bin Khalifa University, Doha, Qatar
BookMark eNqNkN1KAzEQhYNUsK2-Q3yArdl0f7JXUoo_BcEb9TZkk8k2yzYpSVrYtze1XohXnZthhjmHM98MTayzgNB9ThY5yauHfiHdbg8DSLDdghJK055RUl6hac7qJiN1WU7QlJCizOqGVDdoFkJP0lzlbIr6FbbuCAOO_hBi1ooACgeQB2_iiIVVeO_NUcgR75xKZ9p5vLERvIWIncZfsDVygIAPwdgOg5V-3Efj7I82ROiEdZ0X--14i661GALc_fY5-nx--li_Zm_vL5v16i2TS1anCFQXlBRS0bqAShRUK8XyXKZnSNtWqqpVy5gkgjVagW7LmoqWaVmVgpXLVHP0ePaV3oXgQXNpojhlil6YgeeEn9Dxnv9Bx0_o-Bldcmj-OSQIO-HHi7TrsxbSi0cDngdpEhZQxoOMXDlzgcs3dRmV1w
CitedBy_id crossref_primary_10_1109_TIV_2023_3339798
crossref_primary_10_1007_s11276_023_03626_9
crossref_primary_10_1186_s13677_024_00623_x
crossref_primary_10_3390_jsan12050073
crossref_primary_10_3390_electronics11162557
crossref_primary_10_1109_IOTM_001_2300156
crossref_primary_10_1109_TVT_2024_3456964
crossref_primary_10_3390_electronics12234825
crossref_primary_10_32604_cmes_2023_031342
crossref_primary_10_26599_TST_2023_9010132
crossref_primary_10_1016_j_neucom_2024_127528
crossref_primary_10_1016_j_measen_2023_100791
crossref_primary_10_1007_s11227_023_05578_5
crossref_primary_10_1038_s41598_023_44701_7
crossref_primary_10_1080_08874417_2024_2329985
crossref_primary_10_1007_s11227_023_05328_7
crossref_primary_10_1111_exsy_13072
crossref_primary_10_3390_s23187856
crossref_primary_10_1016_j_adhoc_2024_103566
crossref_primary_10_1186_s13677_023_00517_4
crossref_primary_10_1016_j_swevo_2025_101878
crossref_primary_10_1016_j_compeleceng_2024_109373
crossref_primary_10_1109_ACCESS_2024_3432786
crossref_primary_10_1002_ett_4751
crossref_primary_10_1109_ACCESS_2024_3478845
crossref_primary_10_1002_ett_4771
crossref_primary_10_1007_s11277_023_10773_x
crossref_primary_10_1038_s41598_025_02474_1
crossref_primary_10_1007_s44443_025_00037_y
crossref_primary_10_1007_s11276_023_03554_8
crossref_primary_10_1016_j_chb_2024_108140
crossref_primary_10_1109_JIOT_2023_3312348
crossref_primary_10_1007_s13198_024_02574_7
crossref_primary_10_1016_j_eswa_2024_125829
crossref_primary_10_1108_IJPCC_09_2023_0250
crossref_primary_10_1109_TNSM_2024_3394842
crossref_primary_10_1007_s12083_023_01601_x
crossref_primary_10_1007_s11277_024_10859_0
crossref_primary_10_1186_s13677_022_00356_9
crossref_primary_10_1038_s41598_025_03498_3
crossref_primary_10_4018_IJITWE_304049
crossref_primary_10_1007_s11276_023_03471_w
crossref_primary_10_3390_electronics13132654
crossref_primary_10_4018_IJITWE_304047
crossref_primary_10_1109_TITS_2024_3419988
Cites_doi 10.1016/j.jvcir.2019.102720
10.1007/s11042-021-10700-x
10.1126/sciadv.abg0363
10.1155/2021/2730246
10.1016/j.jvcir.2019.102678
10.1016/j.forsciint.2021.110691
10.1016/j.engappai.2020.104049
10.1109/ACCESS.2021.3049564
10.1016/j.optlastec.2021.107074
10.1145/3421508
10.1109/ACCESS.2019.2960367
10.1016/j.optlaseng.2021.106881
10.1109/ACCESS.2019.2945682
10.3390/s22062281
10.5114/aoms/141164
10.1016/j.asoc.2021.107618
10.3390/s21237793
10.1155/2021/5536170
10.1109/ACCESS.2020.2980196
10.1002/cpe.6739
10.1109/ACCESS.2020.3018180
10.1080/09540091.2022.2045254
10.3390/electronics11030495
10.22161/ijaers.4.3.27
10.1002/adma.202102023
10.1016/j.cej.2021.132884
10.3390/app12031317
10.1007/s00500-021-05825-y
ContentType Journal Article
Copyright 2022
Copyright_xml – notice: 2022
DBID AAYXX
CITATION
DOI 10.1016/j.compeleceng.2022.108205
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1879-0755
ExternalDocumentID 10_1016_j_compeleceng_2022_108205
S0045790622004463
GroupedDBID --K
--M
.DC
.~1
0R~
1B1
1~.
1~5
29F
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
9JN
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
AAYFN
ABBOA
ABEFU
ABFNM
ABJNI
ABMAC
ABXDB
ABYKQ
ACDAQ
ACGFO
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADJOM
ADMUD
ADTZH
AEBSH
AECPX
AEKER
AENEX
AFFNX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHJVU
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
ASPBG
AVWKF
AXJTR
AZFZN
BJAXD
BKOJK
BLXMC
CS3
DU5
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-2
G-Q
GBLVA
GBOLZ
HLZ
HVGLF
HZ~
IHE
J1W
JJJVA
KOM
LG9
LY7
M41
MO0
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
PQQKQ
Q38
R2-
RIG
ROL
RPZ
RXW
SBC
SDF
SDG
SDP
SES
SET
SEW
SPC
SPCBC
SST
SSV
SSZ
T5K
TAE
TN5
UHS
VOH
WH7
WUQ
XPP
ZMT
~G-
~S-
9DU
AATTM
AAXKI
AAYWO
AAYXX
ABWVN
ACLOT
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AGQPQ
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
CITATION
EFKBS
~HD
ID FETCH-LOGICAL-c387t-b2f4204cd274e6a42fdd811c8790bb6d67db88c0a89fdefb572ab8fc65a853333
ISICitedReferencesCount 77
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000829289700005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0045-7906
IngestDate Sat Nov 29 03:04:39 EST 2025
Tue Nov 18 21:48:56 EST 2025
Fri Feb 23 02:36:55 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Steganography
Data security
Encryption decryption algorithm
DES algorithm
LSB method
Internet of Vehicles
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c387t-b2f4204cd274e6a42fdd811c8790bb6d67db88c0a89fdefb572ab8fc65a853333
ParticipantIDs crossref_citationtrail_10_1016_j_compeleceng_2022_108205
crossref_primary_10_1016_j_compeleceng_2022_108205
elsevier_sciencedirect_doi_10_1016_j_compeleceng_2022_108205
PublicationCentury 2000
PublicationDate September 2022
2022-09-00
PublicationDateYYYYMMDD 2022-09-01
PublicationDate_xml – month: 09
  year: 2022
  text: September 2022
PublicationDecade 2020
PublicationTitle Computers & electrical engineering
PublicationYear 2022
Publisher Elsevier Ltd
Publisher_xml – name: Elsevier Ltd
References Samad, Alam, Mohammed, Bhukhari (bib0008) 2018
Almomani, Alkhayer, El-Shafai (bib0013) 2022; 22
Zermi, Khaldi, Kafi, Kahlessenane, Euschi (bib0023) 2021; 320
Barhoush, Abed-Alguni, Hammad, Al-Fawa, Hassan (bib0012) 2022; 8
Poongodi, Hamdi, Varadarajan, Rawal, Maode (bib0035) 2020
Poongodi, Hamdi, Gao, Rauf (bib0042) 2021
Arumugam, Srimathi, Maurya, Joseph, Asokan, Poongodi, Algethami, Hamdi, Rauf (bib0039) 2021; 21
Dhiman, Kukreja, Manoharan, Kaur, Kamruzzaman, Dhaou, Iwendi (bib0043) 2022; 11
Li, Mou, Xiong, Wang, Xu (bib0025) 2021; 140
Poongodi, Hamdi, Vijayakumar, Rawal, Maode (bib0034) 2020
Hafsa, Sghaier, Malek, Machhout (bib0017) 2021; 80
Rawal, Manogaran, Poongodi, Hamdi (bib0022) 2021; 22
Zhang, Kamruzzaman, Feng (bib0051) 2021; 2021
Kamruzzaman (bib0049) 2014; 9
Karmouni, Sayyouri, Qjidaa (bib0027) 2021; 137
Sharma, Amandeep, Sobti, Lohani, Shabaz (bib0011) 2021; 8
Poongodi, Bourouis, Ahmed, Vijayaragavan, Venkatesan, Alhakami (bib0056) 2022; 1
Ying, Shuanglong, Ximeng, Zhuo, Jianfeng, Robert (bib0004) 2022; 3
Abubaker, Khan, Almogren, Abbas, Javaid, Radwan (bib0003) 2022; 34
Duan, Zhou, Gong, Wu, Zhou (bib0031) 2022; 150
Sahu, Swain, Sahu, Hemalatha (bib0030) 2021; 58
Ma, Zhang (bib0016) 2020; 5
Zheng, Dai, Li, Ye, Xiong, Liu (bib0029) 2021; 7
Dhanaraj, Ramakrishnan, Poongodi, Krishnasamy, Hamdi, Kotecha (bib0044) 2021; 2
Gupta, Lilhore, Agrawal (bib0006) 2017; 3
Hossain, Kamruzzaman, Sen, Azad, Mollah (bib0052) 2021; 32
Shabbir (bib0033) 2021; 9
Kamruzzaman (bib0050) 2014
Anajemba, Yue, Iwendi, Alenezi, Mittal (bib0021) 2020; 8
Lu, Wang, Zhong, Rosin (bib0005) 2021
Hossain, Kamruzzaman, Sen, Azad, Mollah (bib0047) 2022; 32
Chen, Jiang, Kamruzzaman (bib0055) 2020; 71
Liu, Shi, Li, Peng, Zhong, Song (bib0001) 2022; 430
Kumar, Kumar, Tripathi, Gupta, Kumar (bib0010) 2021; 7
Zhu, Nan, Bai, Wang, Ling, Huang (bib0020) 2021; 33
Poongodi, Nguyen, Hamdi, Cengiz (bib0041) 2021; 58
Kumar, Lilhore, Agarwal (bib0007) 2016; 2
Li, Yu, Liu, Feng, Qin, Srivastava (bib0032) 2021; 3
Poongodi, Vijayakumar, Al-Turjman, Hamdi, Ma (bib0037) 2019; 7
Sarker, Raihan, Peng, Chumky, Kamruzzaman, Shouse, Deog (bib0053) 2021
Kurapa, Sahare, Lilhore (bib0014) 2017; 160
Mershad, Cheikhrouhou, Ismail (bib0026) 2021; 32
Pandey, Kumarlilhore (bib0009) 2017; 4
Lydia, Raj, Selvam, Elhoseny, Shankar (bib0015) 2021; 32
Tang, Wu, Wang, Chen, Xie (bib0024) 2021; 25
Chen, Han, Zhang, Lin, Kamruzzaman (bib0048) 2019; 65
Kamruzzaman (bib0046) 2021
Poongodi, Nguyen, Hamdi, Cengiz (bib0038) 2021; 58
Lin, Meng-Yen (bib0002) 2022; 34
Li, Wang, Ma, Wang, Wang, Xia (bib0028) 2021; 110
Shi, Wang, Zhou, Kamruzzaman (bib0054) 2020; 8
Sahoo, Mudligiriyappa, Algethami, Manoharan, Hamdi, Raahemifar (bib0040) 2022; 12
Zhang, Chen, Liao, Zhang, Feng, Hua (bib0018) 2021; 2
Rawal, Manogaran, Poongodi, Hamdi (bib0045) 2021; 22
Pan, Sun, Chu, Abraham, Yan (bib0019) 2021; 97
Poongodi, Hamdi, Sharma, Ma, Singh (bib0036) 2019; 7
Rawal (10.1016/j.compeleceng.2022.108205_bib0045) 2021; 22
Gupta (10.1016/j.compeleceng.2022.108205_bib0006) 2017; 3
Poongodi (10.1016/j.compeleceng.2022.108205_bib0034) 2020
Zhang (10.1016/j.compeleceng.2022.108205_bib0051) 2021; 2021
Liu (10.1016/j.compeleceng.2022.108205_bib0001) 2022; 430
Almomani (10.1016/j.compeleceng.2022.108205_bib0013) 2022; 22
Kumar (10.1016/j.compeleceng.2022.108205_bib0010) 2021; 7
Sahu (10.1016/j.compeleceng.2022.108205_bib0030) 2021; 58
Lu (10.1016/j.compeleceng.2022.108205_bib0005) 2021
Zheng (10.1016/j.compeleceng.2022.108205_bib0029) 2021; 7
Li (10.1016/j.compeleceng.2022.108205_bib0025) 2021; 140
Abubaker (10.1016/j.compeleceng.2022.108205_bib0003) 2022; 34
Ying (10.1016/j.compeleceng.2022.108205_bib0004) 2022; 3
Chen (10.1016/j.compeleceng.2022.108205_bib0055) 2020; 71
Kamruzzaman (10.1016/j.compeleceng.2022.108205_bib0050) 2014
Poongodi (10.1016/j.compeleceng.2022.108205_bib0037) 2019; 7
Ma (10.1016/j.compeleceng.2022.108205_bib0016) 2020; 5
Kamruzzaman (10.1016/j.compeleceng.2022.108205_bib0046) 2021
Mershad (10.1016/j.compeleceng.2022.108205_bib0026) 2021; 32
Poongodi (10.1016/j.compeleceng.2022.108205_bib0056) 2022; 1
Shabbir (10.1016/j.compeleceng.2022.108205_bib0033) 2021; 9
Zhu (10.1016/j.compeleceng.2022.108205_bib0020) 2021; 33
Pandey (10.1016/j.compeleceng.2022.108205_bib0009) 2017; 4
Kumar (10.1016/j.compeleceng.2022.108205_bib0007) 2016; 2
Arumugam (10.1016/j.compeleceng.2022.108205_bib0039) 2021; 21
Kamruzzaman (10.1016/j.compeleceng.2022.108205_bib0049) 2014; 9
Pan (10.1016/j.compeleceng.2022.108205_bib0019) 2021; 97
Samad (10.1016/j.compeleceng.2022.108205_bib0008) 2018
Lin (10.1016/j.compeleceng.2022.108205_bib0002) 2022; 34
Kurapa (10.1016/j.compeleceng.2022.108205_bib0014) 2017; 160
Lydia (10.1016/j.compeleceng.2022.108205_bib0015) 2021; 32
Poongodi (10.1016/j.compeleceng.2022.108205_bib0042) 2021
Sharma (10.1016/j.compeleceng.2022.108205_bib0011) 2021; 8
Hossain (10.1016/j.compeleceng.2022.108205_bib0052) 2021; 32
Barhoush (10.1016/j.compeleceng.2022.108205_bib0012) 2022; 8
Li (10.1016/j.compeleceng.2022.108205_bib0028) 2021; 110
Sahoo (10.1016/j.compeleceng.2022.108205_bib0040) 2022; 12
Poongodi (10.1016/j.compeleceng.2022.108205_bib0036) 2019; 7
Chen (10.1016/j.compeleceng.2022.108205_bib0048) 2019; 65
Anajemba (10.1016/j.compeleceng.2022.108205_bib0021) 2020; 8
Li (10.1016/j.compeleceng.2022.108205_bib0032) 2021; 3
Dhiman (10.1016/j.compeleceng.2022.108205_bib0043) 2022; 11
Hossain (10.1016/j.compeleceng.2022.108205_bib0047) 2022; 32
Dhanaraj (10.1016/j.compeleceng.2022.108205_bib0044) 2021; 2
Zermi (10.1016/j.compeleceng.2022.108205_bib0023) 2021; 320
Duan (10.1016/j.compeleceng.2022.108205_bib0031) 2022; 150
Karmouni (10.1016/j.compeleceng.2022.108205_bib0027) 2021; 137
Sarker (10.1016/j.compeleceng.2022.108205_bib0053) 2021
Tang (10.1016/j.compeleceng.2022.108205_bib0024) 2021; 25
Poongodi (10.1016/j.compeleceng.2022.108205_bib0038) 2021; 58
Shi (10.1016/j.compeleceng.2022.108205_bib0054) 2020; 8
Poongodi (10.1016/j.compeleceng.2022.108205_bib0035) 2020
Hafsa (10.1016/j.compeleceng.2022.108205_bib0017) 2021; 80
Zhang (10.1016/j.compeleceng.2022.108205_bib0018) 2021; 2
Rawal (10.1016/j.compeleceng.2022.108205_bib0022) 2021; 22
Poongodi (10.1016/j.compeleceng.2022.108205_bib0041) 2021; 58
References_xml – volume: 4
  start-page: 7092
  year: 2017
  end-page: 7102
  ident: bib0009
  article-title: An improved AES cryptosystem based genetic method on S-box, 256 key sizes, and 14-rounds
  publication-title: Int J Adv Eng Res Sci
– volume: 140
  start-page: 1074
  year: 2021
  end-page: 1085
  ident: bib0025
  article-title: Fractional-order double-ring erbium-doped fiber laser chaotic system and its application on image encryption
  publication-title: Opt Laser Technol
– volume: 2
  start-page: 1
  year: 2016
  end-page: 6
  ident: bib0007
  article-title: An efficient auditing protocol with user revocation using cyclic group & AES techniques
  publication-title: Int J Recent Trends Eng Res (IJRTER)
– volume: 32
  start-page: 392
  year: 2021
  end-page: 408
  ident: bib0026
  article-title: Proof of Accumulated trust: a new consensus protocol forthe security of the IoV
  publication-title: Veh Commun
– volume: 8
  start-page: 22
  year: 2022
  end-page: 33
  ident: bib0012
  article-title: DES22: DES- based algorithm with improved security
  publication-title: Jordan J Comput Inf Technol (JJCIT)
– volume: 7
  start-page: 183532
  year: 2019
  end-page: 183544
  ident: bib0036
  article-title: DDoS detection mechanism using trust-based evaluation system in VANET
  publication-title: IEEE Access
– volume: 12
  start-page: 1317
  year: 2022
  ident: bib0040
  article-title: Intelligent trust-based utility and reusability model: enhanced security using unmanned aerial vehicles on sensor nodes
  publication-title: Appl Sci
– volume: 430
  start-page: 884
  year: 2022
  end-page: 896
  ident: bib0001
  article-title: Disguise as fluorescent powder: ultraviolet-B persistent luminescence material without visible light for advanced information encryption anti-counterfeiting applications
  publication-title: Chem Eng J
– volume: 8
  start-page: 159067
  year: 2020
  end-page: 159076
  ident: bib0054
  article-title: Study on modeling method of forest tree image recognition based on CCD and theodolite
  publication-title: IEEE Access
– volume: 22
  start-page: 2281
  year: 2022
  ident: bib0013
  article-title: A crypto-steganography approach for hiding ransomware within HEVC streams in android IoT devices
  publication-title: Sensors
– volume: 9
  start-page: 8820
  year: 2021
  end-page: 8834
  ident: bib0033
  article-title: Enhancing security of health information using modular encryption standard in mobile cloud computing
  publication-title: IEEE Access
– volume: 2021
  year: 2021
  ident: bib0051
  article-title: Complex system of vertical baduanjin lifting motion sensing recognition under the background of big data
  publication-title: Complex
– volume: 9
  start-page: 3200
  year: 2014
  ident: bib0049
  article-title: Performance of decode and forward MIMO relaying using STBC for wireless uplink
  publication-title: J Netw
– volume: 1
  start-page: 1
  year: 2022
  end-page: 14
  ident: bib0056
  article-title: A novel secured multi-access edge computing based VANET with neuro fuzzy systems based blockchain framework
  publication-title: Comput Commun
– volume: 58
  start-page: 808
  year: 2021
  end-page: 822
  ident: bib0030
  article-title: Multi-directional block based PVD and modulus function image steganography to avoid FOBP and IEP
  publication-title: J Inf Secur Appl
– volume: 2
  start-page: 236
  year: 2021
  end-page: 248
  ident: bib0018
  article-title: Deep model intellectual property protection via deep watermarking
  publication-title: IEEE Trans Pattern Anal Mach Intell
– start-page: 1
  year: 2021
  end-page: 6
  ident: bib0042
  article-title: A novel security mechanism of 6 G For IMD using authentication and key agreement scheme
  publication-title: Proceedings of the IEEE globecom workshops (GC Wkshps)
– volume: 32
  year: 2021
  ident: bib0052
  article-title: Hexahedron core with sensor based photonic crystal fiber: an approach of design and performance analysis
  publication-title: Sens Biosens Res
– volume: 137
  start-page: 1063
  year: 2021
  end-page: 1074
  ident: bib0027
  article-title: A novel image encryption method based on fractional discrete Meixner moments
  publication-title: Opt Lasers Eng
– volume: 160
  start-page: 225
  year: 2017
  end-page: 238
  ident: bib0014
  article-title: A robust fractal code and LSB based image watermarking
  publication-title: Int J Comput Appl
– volume: 2
  start-page: 1
  year: 2021
  end-page: 15
  ident: bib0044
  article-title: Random forest bagging and X-means clustered antipattern detection from SQL query log for accessing secure mobile data
  publication-title: Wirel Commun Mob Comput
– volume: 3
  start-page: 4116
  year: 2021
  end-page: 4129
  ident: bib0032
  article-title: An efficient ciphertext-policy weighted attribute- based encryption for the Internet of healththings
  publication-title: IEEE J Biomed Health Inform
– volume: 21
  start-page: 7793
  year: 2021
  ident: bib0039
  article-title: Federated transfer learning for authentication and privacy preservation using novel supportive twin delayed DDPG (S-TD3) algorithm for IIoT
  publication-title: Sensors
– volume: 22
  start-page: 1
  year: 2021
  end-page: 20
  ident: bib0045
  article-title: Multi-tier stack of block chain with proxy
  publication-title: ACM Trans Internet Technol (TOIT)
– start-page: 10816
  year: 2021
  end-page: 10825
  ident: bib0005
  article-title: Large-capacity image steganography based on invertible neural networks
  publication-title: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition
– volume: 58
  year: 2021
  ident: bib0038
  article-title: Global cryptocurrency trend prediction using social media
  publication-title: Inf Process Manag
– volume: 33
  start-page: 345
  year: 2021
  end-page: 356
  ident: bib0020
  article-title: Dual-encryption in a shape-memory hydrogel with tunable fluorescence and reconfigurable architecture
  publication-title: Adv Mater
– volume: 58
  year: 2021
  ident: bib0041
  article-title: Global cryptocurrency trend prediction using social media
  publication-title: Inf Process Manag
– year: 2021
  ident: bib0053
  article-title: COVID-19: access to information, health service, daily life facility and risk perception of foreigners during coronavirus pandemic in South Korea
  publication-title: Arch Med Sci
– volume: 7
  start-page: 158481
  year: 2019
  end-page: 158491
  ident: bib0037
  article-title: Intrusion prevention system for DDoS attack on VANET with reCAPTCHA controller using information based metrics
  publication-title: IEEE Access
– volume: 32
  start-page: 771
  year: 2021
  end-page: 791
  ident: bib0015
  article-title: Application of discrete transforms with selective coefficients for blind image watermarking
  publication-title: Trans Emerg Telecommun Technol
– volume: 25
  start-page: 10987
  year: 2021
  end-page: 11004
  ident: bib0024
  article-title: An adaptive fuzzy inference approach for color image steganography
  publication-title: Soft Comput
– start-page: 1
  year: 2018
  end-page: 12
  ident: bib0008
  article-title: Internet of Vehicles (IoV) requirements, attacks, and countermeasures
  publication-title: Proceedings of the 12th INDIACom
– volume: 110
  start-page: 618
  year: 2021
  end-page: 628
  ident: bib0028
  article-title: Image steganography based on style transfer and quaternion exponent moments
  publication-title: Appl Soft Comput
– volume: 8
  start-page: 1
  year: 2021
  end-page: 18
  ident: bib0011
  article-title: A secured frame selection based video watermarking technique to address quality loss of data: combining-based transform, singular valued decomposition, and hyperchaotic encryption
  publication-title: Secur Commun Netw
– volume: 7
  start-page: 363
  year: 2021
  end-page: 381
  ident: bib0029
  article-title: Metasurface-based key for computational imaging encryption
  publication-title: Sci Adv
– volume: 34
  start-page: 1089
  year: 2022
  end-page: 1118
  ident: bib0002
  article-title: A dynamic key management and secure data transfer based on an m-tree structure with multi-level security framework for Internet of Vehicles
  publication-title: Connect Sci
– start-page: 455
  year: 2014
  end-page: 459
  ident: bib0050
  article-title: Performance of turbo coded vertical bell laboratories layered space time multiple input multiple output system
  publication-title: Proceedings of the 16th international conference on computer and information technology (ICCIT)
– volume: 3
  start-page: 1
  year: 2022
  end-page: 12
  ident: bib0004
  article-title: Privacy signal: privacy-preserving traffic signal control for intelligent transportation system
  publication-title: IEEE Trans Intell Transp Syst
– volume: 65
  year: 2019
  ident: bib0048
  article-title: Quality-guided key frames selection from video stream based on object detection
  publication-title: J Vis Commun Image Represent
– start-page: 1
  year: 2021
  end-page: 6
  ident: bib0046
  article-title: New opportunities, challenges, and applications of edge-AI for connected healthcare in smart cities
  publication-title: Proceedings of the IEEE globecom workshops (GC Wkshps)
– volume: 5
  start-page: 115
  year: 2020
  end-page: 125
  ident: bib0016
  article-title: A new private information encryption method in the Internet of things under cloud computing environment
  publication-title: Wirel Commun Mob Comput
– volume: 320
  start-page: 691
  year: 2021
  end-page: 703
  ident: bib0023
  article-title: A DWT-SVD based robust digital watermarking for medical image security
  publication-title: Forensic Sci Int
– volume: 97
  start-page: 409
  year: 2021
  end-page: 421
  ident: bib0019
  article-title: Digital watermarking with improved SMS applied for Q.R. code
  publication-title: Eng Appl Artif Intell
– volume: 7
  start-page: 112
  year: 2021
  end-page: 142
  ident: bib0010
  article-title: P2SF-IoV: a privacy-preservation-based secured framework for Internet of Vehicles
  publication-title: IEEE Trans Intell Transp Syst
– volume: 22
  start-page: 1
  year: 2021
  end-page: 20
  ident: bib0022
  article-title: Multi-tier stack of block chain with proxy
  publication-title: ACM Trans Internet Technol (TOIT)
– start-page: 746
  year: 2020
  end-page: 753
  ident: bib0035
  article-title: Building an authentic and ethical keyword search by applying decentralised (Blockchain) verification
  publication-title: Proceedings of the IEEE INFOCOM 2020-IEEE conference on computer communications workshops (INFOCOM WKSHPS)
– volume: 34
  start-page: 6739
  year: 2022
  ident: bib0003
  article-title: Trustful data trading through monetizing IoT data using blockchain based review system
  publication-title: Concurr Comput Pract Exp
– volume: 71
  year: 2020
  ident: bib0055
  article-title: Radar remote sensing image retrieval algorithm based on improved Sobel operator
  publication-title: J Vis Commun Image Represent
– volume: 8
  start-page: 53931
  year: 2020
  end-page: 53941
  ident: bib0021
  article-title: Optimal cooperative offloading scheme for energy efficient multi-access edge computation
  publication-title: IEEE Access
– start-page: 1
  year: 2020
  end-page: 6
  ident: bib0034
  article-title: An effective electronic waste management solution based on blockchain smart contract in 5 G communities
  publication-title: Proceedings of the IEEE 3rd 5 G world forum (5GWF)
– volume: 11
  start-page: 495
  year: 2022
  ident: bib0043
  article-title: A novel deep learning model for detection of severity level of the disease in citrus fruits
  publication-title: Electronics
– volume: 150
  start-page: 1087
  year: 2022
  end-page: 1099
  ident: bib0031
  article-title: New color image encryption scheme based on multi- parameter fractional discrete Tche by hev moments and nonlinear fractal permutation method
  publication-title: Opt Lasers Eng
– volume: 32
  year: 2022
  ident: bib0047
  article-title: Hexahedron core with sensor based photonic crystal fiber: an approach of design and performance analysis
  publication-title: Sens Biosens Res
– volume: 3
  year: 2017
  ident: bib0006
  article-title: A trusted TPA model to improve security & reliability for cloudstorage
  publication-title: Int Res J Eng Technol (IRJET)
– volume: 80
  start-page: 19769
  year: 2021
  end-page: 19801
  ident: bib0017
  article-title: Image encryption method based on improved ECC and modified AES algorithm
  publication-title: Multimed Tools Appl
– start-page: 10816
  year: 2021
  ident: 10.1016/j.compeleceng.2022.108205_bib0005
  article-title: Large-capacity image steganography based on invertible neural networks
– volume: 71
  year: 2020
  ident: 10.1016/j.compeleceng.2022.108205_bib0055
  article-title: Radar remote sensing image retrieval algorithm based on improved Sobel operator
  publication-title: J Vis Commun Image Represent
  doi: 10.1016/j.jvcir.2019.102720
– volume: 80
  start-page: 19769
  issue: 13
  year: 2021
  ident: 10.1016/j.compeleceng.2022.108205_bib0017
  article-title: Image encryption method based on improved ECC and modified AES algorithm
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-021-10700-x
– volume: 7
  start-page: 363
  issue: 21
  year: 2021
  ident: 10.1016/j.compeleceng.2022.108205_bib0029
  article-title: Metasurface-based key for computational imaging encryption
  publication-title: Sci Adv
  doi: 10.1126/sciadv.abg0363
– volume: 2
  start-page: 1
  year: 2021
  ident: 10.1016/j.compeleceng.2022.108205_bib0044
  article-title: Random forest bagging and X-means clustered antipattern detection from SQL query log for accessing secure mobile data
  publication-title: Wirel Commun Mob Comput
  doi: 10.1155/2021/2730246
– volume: 65
  year: 2019
  ident: 10.1016/j.compeleceng.2022.108205_bib0048
  article-title: Quality-guided key frames selection from video stream based on object detection
  publication-title: J Vis Commun Image Represent
  doi: 10.1016/j.jvcir.2019.102678
– volume: 5
  start-page: 115
  year: 2020
  ident: 10.1016/j.compeleceng.2022.108205_bib0016
  article-title: A new private information encryption method in the Internet of things under cloud computing environment
  publication-title: Wirel Commun Mob Comput
– volume: 32
  start-page: 392
  year: 2021
  ident: 10.1016/j.compeleceng.2022.108205_bib0026
  article-title: Proof of Accumulated trust: a new consensus protocol forthe security of the IoV
  publication-title: Veh Commun
– volume: 320
  start-page: 691
  year: 2021
  ident: 10.1016/j.compeleceng.2022.108205_bib0023
  article-title: A DWT-SVD based robust digital watermarking for medical image security
  publication-title: Forensic Sci Int
  doi: 10.1016/j.forsciint.2021.110691
– volume: 137
  start-page: 1063
  year: 2021
  ident: 10.1016/j.compeleceng.2022.108205_bib0027
  article-title: A novel image encryption method based on fractional discrete Meixner moments
  publication-title: Opt Lasers Eng
– volume: 97
  start-page: 409
  year: 2021
  ident: 10.1016/j.compeleceng.2022.108205_bib0019
  article-title: Digital watermarking with improved SMS applied for Q.R. code
  publication-title: Eng Appl Artif Intell
  doi: 10.1016/j.engappai.2020.104049
– volume: 9
  start-page: 8820
  year: 2021
  ident: 10.1016/j.compeleceng.2022.108205_bib0033
  article-title: Enhancing security of health information using modular encryption standard in mobile cloud computing
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2021.3049564
– volume: 140
  start-page: 1074
  year: 2021
  ident: 10.1016/j.compeleceng.2022.108205_bib0025
  article-title: Fractional-order double-ring erbium-doped fiber laser chaotic system and its application on image encryption
  publication-title: Opt Laser Technol
  doi: 10.1016/j.optlastec.2021.107074
– start-page: 746
  year: 2020
  ident: 10.1016/j.compeleceng.2022.108205_bib0035
  article-title: Building an authentic and ethical keyword search by applying decentralised (Blockchain) verification
– volume: 22
  start-page: 1
  issue: 2
  year: 2021
  ident: 10.1016/j.compeleceng.2022.108205_bib0045
  article-title: Multi-tier stack of block chain with proxy Re-encryption method scheme on the internet of things platform
  publication-title: ACM Trans Internet Technol (TOIT)
  doi: 10.1145/3421508
– volume: 3
  year: 2017
  ident: 10.1016/j.compeleceng.2022.108205_bib0006
  article-title: A trusted TPA model to improve security & reliability for cloudstorage
  publication-title: Int Res J Eng Technol (IRJET)
– volume: 7
  start-page: 183532
  year: 2019
  ident: 10.1016/j.compeleceng.2022.108205_bib0036
  article-title: DDoS detection mechanism using trust-based evaluation system in VANET
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2960367
– volume: 3
  start-page: 1
  year: 2022
  ident: 10.1016/j.compeleceng.2022.108205_bib0004
  article-title: Privacy signal: privacy-preserving traffic signal control for intelligent transportation system
  publication-title: IEEE Trans Intell Transp Syst
– volume: 9
  start-page: 3200
  issue: 12
  year: 2014
  ident: 10.1016/j.compeleceng.2022.108205_bib0049
  article-title: Performance of decode and forward MIMO relaying using STBC for wireless uplink
  publication-title: J Netw
– volume: 150
  start-page: 1087
  year: 2022
  ident: 10.1016/j.compeleceng.2022.108205_bib0031
  article-title: New color image encryption scheme based on multi- parameter fractional discrete Tche by hev moments and nonlinear fractal permutation method
  publication-title: Opt Lasers Eng
  doi: 10.1016/j.optlaseng.2021.106881
– volume: 58
  start-page: 808
  year: 2021
  ident: 10.1016/j.compeleceng.2022.108205_bib0030
  article-title: Multi-directional block based PVD and modulus function image steganography to avoid FOBP and IEP
  publication-title: J Inf Secur Appl
– volume: 7
  start-page: 158481
  year: 2019
  ident: 10.1016/j.compeleceng.2022.108205_bib0037
  article-title: Intrusion prevention system for DDoS attack on VANET with reCAPTCHA controller using information based metrics
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2945682
– start-page: 1
  year: 2021
  ident: 10.1016/j.compeleceng.2022.108205_bib0046
  article-title: New opportunities, challenges, and applications of edge-AI for connected healthcare in smart cities
– start-page: 1
  year: 2018
  ident: 10.1016/j.compeleceng.2022.108205_bib0008
  article-title: Internet of Vehicles (IoV) requirements, attacks, and countermeasures
– volume: 2
  start-page: 1
  issue: 9
  year: 2016
  ident: 10.1016/j.compeleceng.2022.108205_bib0007
  article-title: An efficient auditing protocol with user revocation using cyclic group & AES techniques
  publication-title: Int J Recent Trends Eng Res (IJRTER)
– volume: 8
  start-page: 22
  issue: 01
  year: 2022
  ident: 10.1016/j.compeleceng.2022.108205_bib0012
  article-title: DES22: DES- based algorithm with improved security
  publication-title: Jordan J Comput Inf Technol (JJCIT)
– volume: 22
  start-page: 2281
  issue: 6
  year: 2022
  ident: 10.1016/j.compeleceng.2022.108205_bib0013
  article-title: A crypto-steganography approach for hiding ransomware within HEVC streams in android IoT devices
  publication-title: Sensors
  doi: 10.3390/s22062281
– year: 2021
  ident: 10.1016/j.compeleceng.2022.108205_bib0053
  article-title: COVID-19: access to information, health service, daily life facility and risk perception of foreigners during coronavirus pandemic in South Korea
  publication-title: Arch Med Sci
  doi: 10.5114/aoms/141164
– volume: 160
  start-page: 225
  issue: 9
  year: 2017
  ident: 10.1016/j.compeleceng.2022.108205_bib0014
  article-title: A robust fractal code and LSB based image watermarking
  publication-title: Int J Comput Appl
– volume: 110
  start-page: 618
  year: 2021
  ident: 10.1016/j.compeleceng.2022.108205_bib0028
  article-title: Image steganography based on style transfer and quaternion exponent moments
  publication-title: Appl Soft Comput
  doi: 10.1016/j.asoc.2021.107618
– volume: 7
  start-page: 112
  issue: 4
  year: 2021
  ident: 10.1016/j.compeleceng.2022.108205_bib0010
  article-title: P2SF-IoV: a privacy-preservation-based secured framework for Internet of Vehicles
  publication-title: IEEE Trans Intell Transp Syst
– start-page: 455
  year: 2014
  ident: 10.1016/j.compeleceng.2022.108205_bib0050
  article-title: Performance of turbo coded vertical bell laboratories layered space time multiple input multiple output system
– volume: 21
  start-page: 7793
  year: 2021
  ident: 10.1016/j.compeleceng.2022.108205_bib0039
  article-title: Federated transfer learning for authentication and privacy preservation using novel supportive twin delayed DDPG (S-TD3) algorithm for IIoT
  publication-title: Sensors
  doi: 10.3390/s21237793
– volume: 1
  start-page: 1
  year: 2022
  ident: 10.1016/j.compeleceng.2022.108205_bib0056
  article-title: A novel secured multi-access edge computing based VANET with neuro fuzzy systems based blockchain framework
  publication-title: Comput Commun
– volume: 58
  issue: 6
  year: 2021
  ident: 10.1016/j.compeleceng.2022.108205_bib0038
  article-title: Global cryptocurrency trend prediction using social media
  publication-title: Inf Process Manag
– volume: 8
  start-page: 1
  issue: 7
  year: 2021
  ident: 10.1016/j.compeleceng.2022.108205_bib0011
  article-title: A secured frame selection based video watermarking technique to address quality loss of data: combining-based transform, singular valued decomposition, and hyperchaotic encryption
  publication-title: Secur Commun Netw
  doi: 10.1155/2021/5536170
– volume: 8
  start-page: 53931
  year: 2020
  ident: 10.1016/j.compeleceng.2022.108205_bib0021
  article-title: Optimal cooperative offloading scheme for energy efficient multi-access edge computation
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2980196
– volume: 34
  start-page: 6739
  issue: 5
  year: 2022
  ident: 10.1016/j.compeleceng.2022.108205_bib0003
  article-title: Trustful data trading through monetizing IoT data using blockchain based review system
  publication-title: Concurr Comput Pract Exp
  doi: 10.1002/cpe.6739
– volume: 58
  issue: 6
  year: 2021
  ident: 10.1016/j.compeleceng.2022.108205_bib0041
  article-title: Global cryptocurrency trend prediction using social media
  publication-title: Inf Process Manag
– volume: 8
  start-page: 159067
  year: 2020
  ident: 10.1016/j.compeleceng.2022.108205_bib0054
  article-title: Study on modeling method of forest tree image recognition based on CCD and theodolite
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.3018180
– volume: 34
  start-page: 1089
  issue: 1
  year: 2022
  ident: 10.1016/j.compeleceng.2022.108205_bib0002
  article-title: A dynamic key management and secure data transfer based on an m-tree structure with multi-level security framework for Internet of Vehicles
  publication-title: Connect Sci
  doi: 10.1080/09540091.2022.2045254
– volume: 32
  year: 2022
  ident: 10.1016/j.compeleceng.2022.108205_bib0047
  article-title: Hexahedron core with sensor based photonic crystal fiber: an approach of design and performance analysis
  publication-title: Sens Biosens Res
– volume: 3
  start-page: 4116
  year: 2021
  ident: 10.1016/j.compeleceng.2022.108205_bib0032
  article-title: An efficient ciphertext-policy weighted attribute- based encryption for the Internet of healththings
  publication-title: IEEE J Biomed Health Inform
– volume: 22
  start-page: 1
  issue: 2
  year: 2021
  ident: 10.1016/j.compeleceng.2022.108205_bib0022
  article-title: Multi-tier stack of block chain with proxy Re- encryption method scheme on the internet of things platform
  publication-title: ACM Trans Internet Technol (TOIT)
  doi: 10.1145/3421508
– volume: 11
  start-page: 495
  issue: 3
  year: 2022
  ident: 10.1016/j.compeleceng.2022.108205_bib0043
  article-title: A novel deep learning model for detection of severity level of the disease in citrus fruits
  publication-title: Electronics
  doi: 10.3390/electronics11030495
– volume: 2021
  year: 2021
  ident: 10.1016/j.compeleceng.2022.108205_bib0051
  article-title: Complex system of vertical baduanjin lifting motion sensing recognition under the background of big data
  publication-title: Complex
– volume: 4
  start-page: 7092
  issue: 3
  year: 2017
  ident: 10.1016/j.compeleceng.2022.108205_bib0009
  article-title: An improved AES cryptosystem based genetic method on S-box, 256 key sizes, and 14-rounds
  publication-title: Int J Adv Eng Res Sci
  doi: 10.22161/ijaers.4.3.27
– volume: 33
  start-page: 345
  issue: 29
  year: 2021
  ident: 10.1016/j.compeleceng.2022.108205_bib0020
  article-title: Dual-encryption in a shape-memory hydrogel with tunable fluorescence and reconfigurable architecture
  publication-title: Adv Mater
  doi: 10.1002/adma.202102023
– volume: 32
  year: 2021
  ident: 10.1016/j.compeleceng.2022.108205_bib0052
  article-title: Hexahedron core with sensor based photonic crystal fiber: an approach of design and performance analysis
  publication-title: Sens Biosens Res
– volume: 32
  start-page: 771
  issue: 2
  year: 2021
  ident: 10.1016/j.compeleceng.2022.108205_bib0015
  article-title: Application of discrete transforms with selective coefficients for blind image watermarking
  publication-title: Trans Emerg Telecommun Technol
– volume: 430
  start-page: 884
  year: 2022
  ident: 10.1016/j.compeleceng.2022.108205_bib0001
  article-title: Disguise as fluorescent powder: ultraviolet-B persistent luminescence material without visible light for advanced information encryption anti-counterfeiting applications
  publication-title: Chem Eng J
  doi: 10.1016/j.cej.2021.132884
– start-page: 1
  year: 2021
  ident: 10.1016/j.compeleceng.2022.108205_bib0042
  article-title: A novel security mechanism of 6 G For IMD using authentication and key agreement scheme
– volume: 12
  start-page: 1317
  issue: 3
  year: 2022
  ident: 10.1016/j.compeleceng.2022.108205_bib0040
  article-title: Intelligent trust-based utility and reusability model: enhanced security using unmanned aerial vehicles on sensor nodes
  publication-title: Appl Sci
  doi: 10.3390/app12031317
– volume: 25
  start-page: 10987
  issue: 16
  year: 2021
  ident: 10.1016/j.compeleceng.2022.108205_bib0024
  article-title: An adaptive fuzzy inference approach for color image steganography
  publication-title: Soft Comput
  doi: 10.1007/s00500-021-05825-y
– volume: 2
  start-page: 236
  year: 2021
  ident: 10.1016/j.compeleceng.2022.108205_bib0018
  article-title: Deep model intellectual property protection via deep watermarking
  publication-title: IEEE Trans Pattern Anal Mach Intell
– start-page: 1
  year: 2020
  ident: 10.1016/j.compeleceng.2022.108205_bib0034
  article-title: An effective electronic waste management solution based on blockchain smart contract in 5 G communities
SSID ssj0004618
Score 2.6016195
Snippet •This research emphasizes enhancing data security in real-time IoV communication considering secure communication also presents a trust-driven privacy method...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 108205
SubjectTerms Data security
DES algorithm
Encryption decryption algorithm
Internet of Vehicles
LSB method
Steganography
Title A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography
URI https://dx.doi.org/10.1016/j.compeleceng.2022.108205
Volume 102
WOSCitedRecordID wos000829289700005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals 2021
  customDbUrl:
  eissn: 1879-0755
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0004618
  issn: 0045-7906
  databaseCode: AIEXJ
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Za9tAEF7cpJT0IfQk6cUW-iYU5I2OFfTFlIS2JCGQpPhNrPaobRzJWLZJfk__aGcvSaUtTSn1gzAyo7V2Ps3Ojr6ZQeidFCqJVSLCiDASxoRHYS6kCDMRcRVzQVJmSuafZGdndDzOzweDbz4XZjPPqore3OSL_6pqOAfK1qmzf6Hu9qJwAr6D0uEIaofjnRQ_Cqp6IzWFfN2sQr1KiaBxXepcWYDpRjd5N01wDM3QhgWlIQV8kRPDlAvWJooAd7a8tWbFhNhX8iur-mWufZUD1x2iMViyzXWM_mVX8LB7p7SaOHrvKatmsFsPLuDnNjB9XtcVbJcNz-D0oI0BsfWSlTYKBAus7DK3T6Zzf72ra9lMAsMb78czYCvsCVsuyOYTbTpWkzHcsa6sGbmq2dZW00znX9kqv60xN_nbPy8MNkYx03pd6DmAmz_Qo2uOJYmSbjVsOYoXekw9JCHmrffhPbRNsiQH07k9-nQ0_txLvx3aBd_9xwfobUcj_M2Av3aDeq7N5SO06_YkeGSx9BgNZPUEPexVqnyKZiNsUIV7qMIeVRiQgR2qsEEVBlRhjypcK-xRhQ2qcIcqI_sDqp6hq-Ojyw8fQ9emI-SHNIMhiYpJpJ_rLJYpi4kSgg6HHNQTlWUq0kyUlPKI0VwJqcokI6ykiqcJA18RPs_RVlVXcg9hMSw5GA4QYClYkJgxcGAFoyyOOFeK7SPqZ63groa9bqUyLzxZcVb0JrzQE17YCd9HpBVd2EIudxF671VTOI_UepoF4OrP4i_-Tfwl2ukekFdoCzQsX6P7fLOaNss3DoXfAbm4vtI
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+novel+trust-based+security+and+privacy+model+for+Internet+of+Vehicles+using+encryption+and+steganography&rft.jtitle=Computers+%26+electrical+engineering&rft.au=Rathore%2C+Manjari+Singh&rft.au=Poongodi%2C+M.&rft.au=Saurabh%2C+Praneet&rft.au=Lilhore%2C+Umesh+Kumar&rft.date=2022-09-01&rft.pub=Elsevier+Ltd&rft.issn=0045-7906&rft.eissn=1879-0755&rft.volume=102&rft_id=info:doi/10.1016%2Fj.compeleceng.2022.108205&rft.externalDocID=S0045790622004463
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0045-7906&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0045-7906&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0045-7906&client=summon