A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography
•This research emphasizes enhancing data security in real-time IoV communication considering secure communication also presents a trust-driven privacy method using encryption and steganography for IoV, "Efficient Algorithm for Secure Transmission (EAST)," integrating encryption and stegano...
Uloženo v:
| Vydáno v: | Computers & electrical engineering Ročník 102; s. 108205 |
|---|---|
| Hlavní autoři: | , , , , , , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Elsevier Ltd
01.09.2022
|
| Témata: | |
| ISSN: | 0045-7906, 1879-0755 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | •This research emphasizes enhancing data security in real-time IoV communication considering secure communication also presents a trust-driven privacy method using encryption and steganography for IoV, "Efficient Algorithm for Secure Transmission (EAST)," integrating encryption and steganography algorithms.•We develop a data encryption method for IoV communication and verification using distinct symmetric encryption for all three components of vehicle communication.•Development of the standards on multiple systems for secure data transmission in IoV. Comprehensive performance measurement from various angles, including transaction cost, memory overhead, processing time, and energy use.•The proposed EAST method is compared with existing AES [12], DES [13], G-DES [14], and standard LSB [15] using different indicators such as time efficiency, avalanche effect, PSNR, and file cover size.
High-speed wireless network technologies play a vital role in autonomous vehicle communication systems (AVS), i.e., IoV (Internet of Vehicles), and enhance the effectiveness and reliability of the communication network. Since the size of IoV communication is rapidly growing, it is now an essential part of our regular routines. Due to its dynamic nature and massive size, it is essential to avoid any miss-communication and protect the data privacy of each vehicle.IoVallowsAVS to link remotely to each other and to various platforms and groups that may be using the same communications system. This quality link between vehicles and the need for information exchanges among vehicles introduces vulnerability and threats that can be exploited by cybercriminals. This research emphasizes on enhancing data security in real-time IoV communication. It presents a trust-driven privacy method using encryption and steganography for IoV. This method uses an Efficient Algorithm for Secure Transmission (EAST) that integrates encryption and steganography algorithms. The proposed EAST is then compared to the various current state of arts, i.e., AES (Advanced Encryption Standard), DES (Data Encryption Standard), G-DES (Generalized DES), and Standard LSB on the basis of various performance measuring parameters, i.e., encryption and decryption time, efficiency, avalanche effect, PSNR, and file cover size. Experimental results are promising for the proposed EAST method, which reported a better time efficiency of 0.86 ms, avalanche effect of 58.81%, and PSNR of 78.58%, compared to the current state arts.
[Display omitted] |
|---|---|
| AbstractList | •This research emphasizes enhancing data security in real-time IoV communication considering secure communication also presents a trust-driven privacy method using encryption and steganography for IoV, "Efficient Algorithm for Secure Transmission (EAST)," integrating encryption and steganography algorithms.•We develop a data encryption method for IoV communication and verification using distinct symmetric encryption for all three components of vehicle communication.•Development of the standards on multiple systems for secure data transmission in IoV. Comprehensive performance measurement from various angles, including transaction cost, memory overhead, processing time, and energy use.•The proposed EAST method is compared with existing AES [12], DES [13], G-DES [14], and standard LSB [15] using different indicators such as time efficiency, avalanche effect, PSNR, and file cover size.
High-speed wireless network technologies play a vital role in autonomous vehicle communication systems (AVS), i.e., IoV (Internet of Vehicles), and enhance the effectiveness and reliability of the communication network. Since the size of IoV communication is rapidly growing, it is now an essential part of our regular routines. Due to its dynamic nature and massive size, it is essential to avoid any miss-communication and protect the data privacy of each vehicle.IoVallowsAVS to link remotely to each other and to various platforms and groups that may be using the same communications system. This quality link between vehicles and the need for information exchanges among vehicles introduces vulnerability and threats that can be exploited by cybercriminals. This research emphasizes on enhancing data security in real-time IoV communication. It presents a trust-driven privacy method using encryption and steganography for IoV. This method uses an Efficient Algorithm for Secure Transmission (EAST) that integrates encryption and steganography algorithms. The proposed EAST is then compared to the various current state of arts, i.e., AES (Advanced Encryption Standard), DES (Data Encryption Standard), G-DES (Generalized DES), and Standard LSB on the basis of various performance measuring parameters, i.e., encryption and decryption time, efficiency, avalanche effect, PSNR, and file cover size. Experimental results are promising for the proposed EAST method, which reported a better time efficiency of 0.86 ms, avalanche effect of 58.81%, and PSNR of 78.58%, compared to the current state arts.
[Display omitted] |
| ArticleNumber | 108205 |
| Author | Saurabh, Praneet Bourouis, Sami Alhakami, Wajdi Lilhore, Umesh Kumar Poongodi, M. Osamor, Jude Rathore, Manjari Singh Hamdi, Mounir |
| Author_xml | – sequence: 1 givenname: Manjari Singh surname: Rathore fullname: Rathore, Manjari Singh organization: Oriental Institute of Technology, Bhopal, Madhya Pradesh, India – sequence: 2 givenname: M. surname: Poongodi fullname: Poongodi, M. organization: Division of Information and Computing Technology, College of Science and Engineering, Hamad Bin Khalifa University, Doha, Qatar – sequence: 3 givenname: Praneet surname: Saurabh fullname: Saurabh, Praneet organization: Mody University of Science and Technology, Lakshmangarh, Rajasthan, India – sequence: 4 givenname: Umesh Kumar surname: Lilhore fullname: Lilhore, Umesh Kumar email: umeshlilhore@gmail.com organization: KIET Group of institutions, Delhi-NCR, Uttar Pradesh, India – sequence: 5 givenname: Sami surname: Bourouis fullname: Bourouis, Sami organization: Department of Information Technology, College of Computers and Information Technology, Taif, Saudi Arabia – sequence: 6 givenname: Wajdi surname: Alhakami fullname: Alhakami, Wajdi organization: Department of Information Technology, College of Computers and Information Technology, Taif, Saudi Arabia – sequence: 7 givenname: Jude surname: Osamor fullname: Osamor, Jude organization: Department of Cyber Security and Networks, Glasgow Caledonian University, Cowcaddens Road, Glasgow, Scotland G4 0BA, United Kingdom – sequence: 8 givenname: Mounir surname: Hamdi fullname: Hamdi, Mounir organization: Division of Information and Computing Technology, College of Science and Engineering, Hamad Bin Khalifa University, Doha, Qatar |
| BookMark | eNqNkN1KAzEQhYNUsK2-Q3yArdl0f7JXUoo_BcEb9TZkk8k2yzYpSVrYtze1XohXnZthhjmHM98MTayzgNB9ThY5yauHfiHdbg8DSLDdghJK055RUl6hac7qJiN1WU7QlJCizOqGVDdoFkJP0lzlbIr6FbbuCAOO_hBi1ooACgeQB2_iiIVVeO_NUcgR75xKZ9p5vLERvIWIncZfsDVygIAPwdgOg5V-3Efj7I82ROiEdZ0X--14i661GALc_fY5-nx--li_Zm_vL5v16i2TS1anCFQXlBRS0bqAShRUK8XyXKZnSNtWqqpVy5gkgjVagW7LmoqWaVmVgpXLVHP0ePaV3oXgQXNpojhlil6YgeeEn9Dxnv9Bx0_o-Bldcmj-OSQIO-HHi7TrsxbSi0cDngdpEhZQxoOMXDlzgcs3dRmV1w |
| CitedBy_id | crossref_primary_10_1109_TIV_2023_3339798 crossref_primary_10_1007_s11276_023_03626_9 crossref_primary_10_1186_s13677_024_00623_x crossref_primary_10_3390_jsan12050073 crossref_primary_10_3390_electronics11162557 crossref_primary_10_1109_IOTM_001_2300156 crossref_primary_10_1109_TVT_2024_3456964 crossref_primary_10_3390_electronics12234825 crossref_primary_10_32604_cmes_2023_031342 crossref_primary_10_26599_TST_2023_9010132 crossref_primary_10_1016_j_neucom_2024_127528 crossref_primary_10_1016_j_measen_2023_100791 crossref_primary_10_1007_s11227_023_05578_5 crossref_primary_10_1038_s41598_023_44701_7 crossref_primary_10_1080_08874417_2024_2329985 crossref_primary_10_1007_s11227_023_05328_7 crossref_primary_10_1111_exsy_13072 crossref_primary_10_3390_s23187856 crossref_primary_10_1016_j_adhoc_2024_103566 crossref_primary_10_1186_s13677_023_00517_4 crossref_primary_10_1016_j_swevo_2025_101878 crossref_primary_10_1016_j_compeleceng_2024_109373 crossref_primary_10_1109_ACCESS_2024_3432786 crossref_primary_10_1002_ett_4751 crossref_primary_10_1109_ACCESS_2024_3478845 crossref_primary_10_1002_ett_4771 crossref_primary_10_1007_s11277_023_10773_x crossref_primary_10_1038_s41598_025_02474_1 crossref_primary_10_1007_s44443_025_00037_y crossref_primary_10_1007_s11276_023_03554_8 crossref_primary_10_1016_j_chb_2024_108140 crossref_primary_10_1109_JIOT_2023_3312348 crossref_primary_10_1007_s13198_024_02574_7 crossref_primary_10_1016_j_eswa_2024_125829 crossref_primary_10_1108_IJPCC_09_2023_0250 crossref_primary_10_1109_TNSM_2024_3394842 crossref_primary_10_1007_s12083_023_01601_x crossref_primary_10_1007_s11277_024_10859_0 crossref_primary_10_1186_s13677_022_00356_9 crossref_primary_10_1038_s41598_025_03498_3 crossref_primary_10_4018_IJITWE_304049 crossref_primary_10_1007_s11276_023_03471_w crossref_primary_10_3390_electronics13132654 crossref_primary_10_4018_IJITWE_304047 crossref_primary_10_1109_TITS_2024_3419988 |
| Cites_doi | 10.1016/j.jvcir.2019.102720 10.1007/s11042-021-10700-x 10.1126/sciadv.abg0363 10.1155/2021/2730246 10.1016/j.jvcir.2019.102678 10.1016/j.forsciint.2021.110691 10.1016/j.engappai.2020.104049 10.1109/ACCESS.2021.3049564 10.1016/j.optlastec.2021.107074 10.1145/3421508 10.1109/ACCESS.2019.2960367 10.1016/j.optlaseng.2021.106881 10.1109/ACCESS.2019.2945682 10.3390/s22062281 10.5114/aoms/141164 10.1016/j.asoc.2021.107618 10.3390/s21237793 10.1155/2021/5536170 10.1109/ACCESS.2020.2980196 10.1002/cpe.6739 10.1109/ACCESS.2020.3018180 10.1080/09540091.2022.2045254 10.3390/electronics11030495 10.22161/ijaers.4.3.27 10.1002/adma.202102023 10.1016/j.cej.2021.132884 10.3390/app12031317 10.1007/s00500-021-05825-y |
| ContentType | Journal Article |
| Copyright | 2022 |
| Copyright_xml | – notice: 2022 |
| DBID | AAYXX CITATION |
| DOI | 10.1016/j.compeleceng.2022.108205 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1879-0755 |
| ExternalDocumentID | 10_1016_j_compeleceng_2022_108205 S0045790622004463 |
| GroupedDBID | --K --M .DC .~1 0R~ 1B1 1~. 1~5 29F 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABEFU ABFNM ABJNI ABMAC ABXDB ABYKQ ACDAQ ACGFO ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADJOM ADMUD ADTZH AEBSH AECPX AEKER AENEX AFFNX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHJVU AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BJAXD BKOJK BLXMC CS3 DU5 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 G-Q GBLVA GBOLZ HLZ HVGLF HZ~ IHE J1W JJJVA KOM LG9 LY7 M41 MO0 N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ Q38 R2- RIG ROL RPZ RXW SBC SDF SDG SDP SES SET SEW SPC SPCBC SST SSV SSZ T5K TAE TN5 UHS VOH WH7 WUQ XPP ZMT ~G- ~S- 9DU AATTM AAXKI AAYWO AAYXX ABWVN ACLOT ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AGQPQ AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS ~HD |
| ID | FETCH-LOGICAL-c387t-b2f4204cd274e6a42fdd811c8790bb6d67db88c0a89fdefb572ab8fc65a853333 |
| ISICitedReferencesCount | 77 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000829289700005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0045-7906 |
| IngestDate | Sat Nov 29 03:04:39 EST 2025 Tue Nov 18 21:48:56 EST 2025 Fri Feb 23 02:36:55 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Steganography Data security Encryption decryption algorithm DES algorithm LSB method Internet of Vehicles |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c387t-b2f4204cd274e6a42fdd811c8790bb6d67db88c0a89fdefb572ab8fc65a853333 |
| ParticipantIDs | crossref_citationtrail_10_1016_j_compeleceng_2022_108205 crossref_primary_10_1016_j_compeleceng_2022_108205 elsevier_sciencedirect_doi_10_1016_j_compeleceng_2022_108205 |
| PublicationCentury | 2000 |
| PublicationDate | September 2022 2022-09-00 |
| PublicationDateYYYYMMDD | 2022-09-01 |
| PublicationDate_xml | – month: 09 year: 2022 text: September 2022 |
| PublicationDecade | 2020 |
| PublicationTitle | Computers & electrical engineering |
| PublicationYear | 2022 |
| Publisher | Elsevier Ltd |
| Publisher_xml | – name: Elsevier Ltd |
| References | Samad, Alam, Mohammed, Bhukhari (bib0008) 2018 Almomani, Alkhayer, El-Shafai (bib0013) 2022; 22 Zermi, Khaldi, Kafi, Kahlessenane, Euschi (bib0023) 2021; 320 Barhoush, Abed-Alguni, Hammad, Al-Fawa, Hassan (bib0012) 2022; 8 Poongodi, Hamdi, Varadarajan, Rawal, Maode (bib0035) 2020 Poongodi, Hamdi, Gao, Rauf (bib0042) 2021 Arumugam, Srimathi, Maurya, Joseph, Asokan, Poongodi, Algethami, Hamdi, Rauf (bib0039) 2021; 21 Dhiman, Kukreja, Manoharan, Kaur, Kamruzzaman, Dhaou, Iwendi (bib0043) 2022; 11 Li, Mou, Xiong, Wang, Xu (bib0025) 2021; 140 Poongodi, Hamdi, Vijayakumar, Rawal, Maode (bib0034) 2020 Hafsa, Sghaier, Malek, Machhout (bib0017) 2021; 80 Rawal, Manogaran, Poongodi, Hamdi (bib0022) 2021; 22 Zhang, Kamruzzaman, Feng (bib0051) 2021; 2021 Kamruzzaman (bib0049) 2014; 9 Karmouni, Sayyouri, Qjidaa (bib0027) 2021; 137 Sharma, Amandeep, Sobti, Lohani, Shabaz (bib0011) 2021; 8 Poongodi, Bourouis, Ahmed, Vijayaragavan, Venkatesan, Alhakami (bib0056) 2022; 1 Ying, Shuanglong, Ximeng, Zhuo, Jianfeng, Robert (bib0004) 2022; 3 Abubaker, Khan, Almogren, Abbas, Javaid, Radwan (bib0003) 2022; 34 Duan, Zhou, Gong, Wu, Zhou (bib0031) 2022; 150 Sahu, Swain, Sahu, Hemalatha (bib0030) 2021; 58 Ma, Zhang (bib0016) 2020; 5 Zheng, Dai, Li, Ye, Xiong, Liu (bib0029) 2021; 7 Dhanaraj, Ramakrishnan, Poongodi, Krishnasamy, Hamdi, Kotecha (bib0044) 2021; 2 Gupta, Lilhore, Agrawal (bib0006) 2017; 3 Hossain, Kamruzzaman, Sen, Azad, Mollah (bib0052) 2021; 32 Shabbir (bib0033) 2021; 9 Kamruzzaman (bib0050) 2014 Anajemba, Yue, Iwendi, Alenezi, Mittal (bib0021) 2020; 8 Lu, Wang, Zhong, Rosin (bib0005) 2021 Hossain, Kamruzzaman, Sen, Azad, Mollah (bib0047) 2022; 32 Chen, Jiang, Kamruzzaman (bib0055) 2020; 71 Liu, Shi, Li, Peng, Zhong, Song (bib0001) 2022; 430 Kumar, Kumar, Tripathi, Gupta, Kumar (bib0010) 2021; 7 Zhu, Nan, Bai, Wang, Ling, Huang (bib0020) 2021; 33 Poongodi, Nguyen, Hamdi, Cengiz (bib0041) 2021; 58 Kumar, Lilhore, Agarwal (bib0007) 2016; 2 Li, Yu, Liu, Feng, Qin, Srivastava (bib0032) 2021; 3 Poongodi, Vijayakumar, Al-Turjman, Hamdi, Ma (bib0037) 2019; 7 Sarker, Raihan, Peng, Chumky, Kamruzzaman, Shouse, Deog (bib0053) 2021 Kurapa, Sahare, Lilhore (bib0014) 2017; 160 Mershad, Cheikhrouhou, Ismail (bib0026) 2021; 32 Pandey, Kumarlilhore (bib0009) 2017; 4 Lydia, Raj, Selvam, Elhoseny, Shankar (bib0015) 2021; 32 Tang, Wu, Wang, Chen, Xie (bib0024) 2021; 25 Chen, Han, Zhang, Lin, Kamruzzaman (bib0048) 2019; 65 Kamruzzaman (bib0046) 2021 Poongodi, Nguyen, Hamdi, Cengiz (bib0038) 2021; 58 Lin, Meng-Yen (bib0002) 2022; 34 Li, Wang, Ma, Wang, Wang, Xia (bib0028) 2021; 110 Shi, Wang, Zhou, Kamruzzaman (bib0054) 2020; 8 Sahoo, Mudligiriyappa, Algethami, Manoharan, Hamdi, Raahemifar (bib0040) 2022; 12 Zhang, Chen, Liao, Zhang, Feng, Hua (bib0018) 2021; 2 Rawal, Manogaran, Poongodi, Hamdi (bib0045) 2021; 22 Pan, Sun, Chu, Abraham, Yan (bib0019) 2021; 97 Poongodi, Hamdi, Sharma, Ma, Singh (bib0036) 2019; 7 Rawal (10.1016/j.compeleceng.2022.108205_bib0045) 2021; 22 Gupta (10.1016/j.compeleceng.2022.108205_bib0006) 2017; 3 Poongodi (10.1016/j.compeleceng.2022.108205_bib0034) 2020 Zhang (10.1016/j.compeleceng.2022.108205_bib0051) 2021; 2021 Liu (10.1016/j.compeleceng.2022.108205_bib0001) 2022; 430 Almomani (10.1016/j.compeleceng.2022.108205_bib0013) 2022; 22 Kumar (10.1016/j.compeleceng.2022.108205_bib0010) 2021; 7 Sahu (10.1016/j.compeleceng.2022.108205_bib0030) 2021; 58 Lu (10.1016/j.compeleceng.2022.108205_bib0005) 2021 Zheng (10.1016/j.compeleceng.2022.108205_bib0029) 2021; 7 Li (10.1016/j.compeleceng.2022.108205_bib0025) 2021; 140 Abubaker (10.1016/j.compeleceng.2022.108205_bib0003) 2022; 34 Ying (10.1016/j.compeleceng.2022.108205_bib0004) 2022; 3 Chen (10.1016/j.compeleceng.2022.108205_bib0055) 2020; 71 Kamruzzaman (10.1016/j.compeleceng.2022.108205_bib0050) 2014 Poongodi (10.1016/j.compeleceng.2022.108205_bib0037) 2019; 7 Ma (10.1016/j.compeleceng.2022.108205_bib0016) 2020; 5 Kamruzzaman (10.1016/j.compeleceng.2022.108205_bib0046) 2021 Mershad (10.1016/j.compeleceng.2022.108205_bib0026) 2021; 32 Poongodi (10.1016/j.compeleceng.2022.108205_bib0056) 2022; 1 Shabbir (10.1016/j.compeleceng.2022.108205_bib0033) 2021; 9 Zhu (10.1016/j.compeleceng.2022.108205_bib0020) 2021; 33 Pandey (10.1016/j.compeleceng.2022.108205_bib0009) 2017; 4 Kumar (10.1016/j.compeleceng.2022.108205_bib0007) 2016; 2 Arumugam (10.1016/j.compeleceng.2022.108205_bib0039) 2021; 21 Kamruzzaman (10.1016/j.compeleceng.2022.108205_bib0049) 2014; 9 Pan (10.1016/j.compeleceng.2022.108205_bib0019) 2021; 97 Samad (10.1016/j.compeleceng.2022.108205_bib0008) 2018 Lin (10.1016/j.compeleceng.2022.108205_bib0002) 2022; 34 Kurapa (10.1016/j.compeleceng.2022.108205_bib0014) 2017; 160 Lydia (10.1016/j.compeleceng.2022.108205_bib0015) 2021; 32 Poongodi (10.1016/j.compeleceng.2022.108205_bib0042) 2021 Sharma (10.1016/j.compeleceng.2022.108205_bib0011) 2021; 8 Hossain (10.1016/j.compeleceng.2022.108205_bib0052) 2021; 32 Barhoush (10.1016/j.compeleceng.2022.108205_bib0012) 2022; 8 Li (10.1016/j.compeleceng.2022.108205_bib0028) 2021; 110 Sahoo (10.1016/j.compeleceng.2022.108205_bib0040) 2022; 12 Poongodi (10.1016/j.compeleceng.2022.108205_bib0036) 2019; 7 Chen (10.1016/j.compeleceng.2022.108205_bib0048) 2019; 65 Anajemba (10.1016/j.compeleceng.2022.108205_bib0021) 2020; 8 Li (10.1016/j.compeleceng.2022.108205_bib0032) 2021; 3 Dhiman (10.1016/j.compeleceng.2022.108205_bib0043) 2022; 11 Hossain (10.1016/j.compeleceng.2022.108205_bib0047) 2022; 32 Dhanaraj (10.1016/j.compeleceng.2022.108205_bib0044) 2021; 2 Zermi (10.1016/j.compeleceng.2022.108205_bib0023) 2021; 320 Duan (10.1016/j.compeleceng.2022.108205_bib0031) 2022; 150 Karmouni (10.1016/j.compeleceng.2022.108205_bib0027) 2021; 137 Sarker (10.1016/j.compeleceng.2022.108205_bib0053) 2021 Tang (10.1016/j.compeleceng.2022.108205_bib0024) 2021; 25 Poongodi (10.1016/j.compeleceng.2022.108205_bib0038) 2021; 58 Shi (10.1016/j.compeleceng.2022.108205_bib0054) 2020; 8 Poongodi (10.1016/j.compeleceng.2022.108205_bib0035) 2020 Hafsa (10.1016/j.compeleceng.2022.108205_bib0017) 2021; 80 Zhang (10.1016/j.compeleceng.2022.108205_bib0018) 2021; 2 Rawal (10.1016/j.compeleceng.2022.108205_bib0022) 2021; 22 Poongodi (10.1016/j.compeleceng.2022.108205_bib0041) 2021; 58 |
| References_xml | – volume: 4 start-page: 7092 year: 2017 end-page: 7102 ident: bib0009 article-title: An improved AES cryptosystem based genetic method on S-box, 256 key sizes, and 14-rounds publication-title: Int J Adv Eng Res Sci – volume: 140 start-page: 1074 year: 2021 end-page: 1085 ident: bib0025 article-title: Fractional-order double-ring erbium-doped fiber laser chaotic system and its application on image encryption publication-title: Opt Laser Technol – volume: 2 start-page: 1 year: 2016 end-page: 6 ident: bib0007 article-title: An efficient auditing protocol with user revocation using cyclic group & AES techniques publication-title: Int J Recent Trends Eng Res (IJRTER) – volume: 32 start-page: 392 year: 2021 end-page: 408 ident: bib0026 article-title: Proof of Accumulated trust: a new consensus protocol forthe security of the IoV publication-title: Veh Commun – volume: 8 start-page: 22 year: 2022 end-page: 33 ident: bib0012 article-title: DES22: DES- based algorithm with improved security publication-title: Jordan J Comput Inf Technol (JJCIT) – volume: 7 start-page: 183532 year: 2019 end-page: 183544 ident: bib0036 article-title: DDoS detection mechanism using trust-based evaluation system in VANET publication-title: IEEE Access – volume: 12 start-page: 1317 year: 2022 ident: bib0040 article-title: Intelligent trust-based utility and reusability model: enhanced security using unmanned aerial vehicles on sensor nodes publication-title: Appl Sci – volume: 430 start-page: 884 year: 2022 end-page: 896 ident: bib0001 article-title: Disguise as fluorescent powder: ultraviolet-B persistent luminescence material without visible light for advanced information encryption anti-counterfeiting applications publication-title: Chem Eng J – volume: 8 start-page: 159067 year: 2020 end-page: 159076 ident: bib0054 article-title: Study on modeling method of forest tree image recognition based on CCD and theodolite publication-title: IEEE Access – volume: 22 start-page: 2281 year: 2022 ident: bib0013 article-title: A crypto-steganography approach for hiding ransomware within HEVC streams in android IoT devices publication-title: Sensors – volume: 9 start-page: 8820 year: 2021 end-page: 8834 ident: bib0033 article-title: Enhancing security of health information using modular encryption standard in mobile cloud computing publication-title: IEEE Access – volume: 2021 year: 2021 ident: bib0051 article-title: Complex system of vertical baduanjin lifting motion sensing recognition under the background of big data publication-title: Complex – volume: 9 start-page: 3200 year: 2014 ident: bib0049 article-title: Performance of decode and forward MIMO relaying using STBC for wireless uplink publication-title: J Netw – volume: 1 start-page: 1 year: 2022 end-page: 14 ident: bib0056 article-title: A novel secured multi-access edge computing based VANET with neuro fuzzy systems based blockchain framework publication-title: Comput Commun – volume: 58 start-page: 808 year: 2021 end-page: 822 ident: bib0030 article-title: Multi-directional block based PVD and modulus function image steganography to avoid FOBP and IEP publication-title: J Inf Secur Appl – volume: 2 start-page: 236 year: 2021 end-page: 248 ident: bib0018 article-title: Deep model intellectual property protection via deep watermarking publication-title: IEEE Trans Pattern Anal Mach Intell – start-page: 1 year: 2021 end-page: 6 ident: bib0042 article-title: A novel security mechanism of 6 G For IMD using authentication and key agreement scheme publication-title: Proceedings of the IEEE globecom workshops (GC Wkshps) – volume: 32 year: 2021 ident: bib0052 article-title: Hexahedron core with sensor based photonic crystal fiber: an approach of design and performance analysis publication-title: Sens Biosens Res – volume: 137 start-page: 1063 year: 2021 end-page: 1074 ident: bib0027 article-title: A novel image encryption method based on fractional discrete Meixner moments publication-title: Opt Lasers Eng – volume: 160 start-page: 225 year: 2017 end-page: 238 ident: bib0014 article-title: A robust fractal code and LSB based image watermarking publication-title: Int J Comput Appl – volume: 2 start-page: 1 year: 2021 end-page: 15 ident: bib0044 article-title: Random forest bagging and X-means clustered antipattern detection from SQL query log for accessing secure mobile data publication-title: Wirel Commun Mob Comput – volume: 3 start-page: 4116 year: 2021 end-page: 4129 ident: bib0032 article-title: An efficient ciphertext-policy weighted attribute- based encryption for the Internet of healththings publication-title: IEEE J Biomed Health Inform – volume: 21 start-page: 7793 year: 2021 ident: bib0039 article-title: Federated transfer learning for authentication and privacy preservation using novel supportive twin delayed DDPG (S-TD3) algorithm for IIoT publication-title: Sensors – volume: 22 start-page: 1 year: 2021 end-page: 20 ident: bib0045 article-title: Multi-tier stack of block chain with proxy publication-title: ACM Trans Internet Technol (TOIT) – start-page: 10816 year: 2021 end-page: 10825 ident: bib0005 article-title: Large-capacity image steganography based on invertible neural networks publication-title: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition – volume: 58 year: 2021 ident: bib0038 article-title: Global cryptocurrency trend prediction using social media publication-title: Inf Process Manag – volume: 33 start-page: 345 year: 2021 end-page: 356 ident: bib0020 article-title: Dual-encryption in a shape-memory hydrogel with tunable fluorescence and reconfigurable architecture publication-title: Adv Mater – volume: 58 year: 2021 ident: bib0041 article-title: Global cryptocurrency trend prediction using social media publication-title: Inf Process Manag – year: 2021 ident: bib0053 article-title: COVID-19: access to information, health service, daily life facility and risk perception of foreigners during coronavirus pandemic in South Korea publication-title: Arch Med Sci – volume: 7 start-page: 158481 year: 2019 end-page: 158491 ident: bib0037 article-title: Intrusion prevention system for DDoS attack on VANET with reCAPTCHA controller using information based metrics publication-title: IEEE Access – volume: 32 start-page: 771 year: 2021 end-page: 791 ident: bib0015 article-title: Application of discrete transforms with selective coefficients for blind image watermarking publication-title: Trans Emerg Telecommun Technol – volume: 25 start-page: 10987 year: 2021 end-page: 11004 ident: bib0024 article-title: An adaptive fuzzy inference approach for color image steganography publication-title: Soft Comput – start-page: 1 year: 2018 end-page: 12 ident: bib0008 article-title: Internet of Vehicles (IoV) requirements, attacks, and countermeasures publication-title: Proceedings of the 12th INDIACom – volume: 110 start-page: 618 year: 2021 end-page: 628 ident: bib0028 article-title: Image steganography based on style transfer and quaternion exponent moments publication-title: Appl Soft Comput – volume: 8 start-page: 1 year: 2021 end-page: 18 ident: bib0011 article-title: A secured frame selection based video watermarking technique to address quality loss of data: combining-based transform, singular valued decomposition, and hyperchaotic encryption publication-title: Secur Commun Netw – volume: 7 start-page: 363 year: 2021 end-page: 381 ident: bib0029 article-title: Metasurface-based key for computational imaging encryption publication-title: Sci Adv – volume: 34 start-page: 1089 year: 2022 end-page: 1118 ident: bib0002 article-title: A dynamic key management and secure data transfer based on an m-tree structure with multi-level security framework for Internet of Vehicles publication-title: Connect Sci – start-page: 455 year: 2014 end-page: 459 ident: bib0050 article-title: Performance of turbo coded vertical bell laboratories layered space time multiple input multiple output system publication-title: Proceedings of the 16th international conference on computer and information technology (ICCIT) – volume: 3 start-page: 1 year: 2022 end-page: 12 ident: bib0004 article-title: Privacy signal: privacy-preserving traffic signal control for intelligent transportation system publication-title: IEEE Trans Intell Transp Syst – volume: 65 year: 2019 ident: bib0048 article-title: Quality-guided key frames selection from video stream based on object detection publication-title: J Vis Commun Image Represent – start-page: 1 year: 2021 end-page: 6 ident: bib0046 article-title: New opportunities, challenges, and applications of edge-AI for connected healthcare in smart cities publication-title: Proceedings of the IEEE globecom workshops (GC Wkshps) – volume: 5 start-page: 115 year: 2020 end-page: 125 ident: bib0016 article-title: A new private information encryption method in the Internet of things under cloud computing environment publication-title: Wirel Commun Mob Comput – volume: 320 start-page: 691 year: 2021 end-page: 703 ident: bib0023 article-title: A DWT-SVD based robust digital watermarking for medical image security publication-title: Forensic Sci Int – volume: 97 start-page: 409 year: 2021 end-page: 421 ident: bib0019 article-title: Digital watermarking with improved SMS applied for Q.R. code publication-title: Eng Appl Artif Intell – volume: 7 start-page: 112 year: 2021 end-page: 142 ident: bib0010 article-title: P2SF-IoV: a privacy-preservation-based secured framework for Internet of Vehicles publication-title: IEEE Trans Intell Transp Syst – volume: 22 start-page: 1 year: 2021 end-page: 20 ident: bib0022 article-title: Multi-tier stack of block chain with proxy publication-title: ACM Trans Internet Technol (TOIT) – start-page: 746 year: 2020 end-page: 753 ident: bib0035 article-title: Building an authentic and ethical keyword search by applying decentralised (Blockchain) verification publication-title: Proceedings of the IEEE INFOCOM 2020-IEEE conference on computer communications workshops (INFOCOM WKSHPS) – volume: 34 start-page: 6739 year: 2022 ident: bib0003 article-title: Trustful data trading through monetizing IoT data using blockchain based review system publication-title: Concurr Comput Pract Exp – volume: 71 year: 2020 ident: bib0055 article-title: Radar remote sensing image retrieval algorithm based on improved Sobel operator publication-title: J Vis Commun Image Represent – volume: 8 start-page: 53931 year: 2020 end-page: 53941 ident: bib0021 article-title: Optimal cooperative offloading scheme for energy efficient multi-access edge computation publication-title: IEEE Access – start-page: 1 year: 2020 end-page: 6 ident: bib0034 article-title: An effective electronic waste management solution based on blockchain smart contract in 5 G communities publication-title: Proceedings of the IEEE 3rd 5 G world forum (5GWF) – volume: 11 start-page: 495 year: 2022 ident: bib0043 article-title: A novel deep learning model for detection of severity level of the disease in citrus fruits publication-title: Electronics – volume: 150 start-page: 1087 year: 2022 end-page: 1099 ident: bib0031 article-title: New color image encryption scheme based on multi- parameter fractional discrete Tche by hev moments and nonlinear fractal permutation method publication-title: Opt Lasers Eng – volume: 32 year: 2022 ident: bib0047 article-title: Hexahedron core with sensor based photonic crystal fiber: an approach of design and performance analysis publication-title: Sens Biosens Res – volume: 3 year: 2017 ident: bib0006 article-title: A trusted TPA model to improve security & reliability for cloudstorage publication-title: Int Res J Eng Technol (IRJET) – volume: 80 start-page: 19769 year: 2021 end-page: 19801 ident: bib0017 article-title: Image encryption method based on improved ECC and modified AES algorithm publication-title: Multimed Tools Appl – start-page: 10816 year: 2021 ident: 10.1016/j.compeleceng.2022.108205_bib0005 article-title: Large-capacity image steganography based on invertible neural networks – volume: 71 year: 2020 ident: 10.1016/j.compeleceng.2022.108205_bib0055 article-title: Radar remote sensing image retrieval algorithm based on improved Sobel operator publication-title: J Vis Commun Image Represent doi: 10.1016/j.jvcir.2019.102720 – volume: 80 start-page: 19769 issue: 13 year: 2021 ident: 10.1016/j.compeleceng.2022.108205_bib0017 article-title: Image encryption method based on improved ECC and modified AES algorithm publication-title: Multimed Tools Appl doi: 10.1007/s11042-021-10700-x – volume: 7 start-page: 363 issue: 21 year: 2021 ident: 10.1016/j.compeleceng.2022.108205_bib0029 article-title: Metasurface-based key for computational imaging encryption publication-title: Sci Adv doi: 10.1126/sciadv.abg0363 – volume: 2 start-page: 1 year: 2021 ident: 10.1016/j.compeleceng.2022.108205_bib0044 article-title: Random forest bagging and X-means clustered antipattern detection from SQL query log for accessing secure mobile data publication-title: Wirel Commun Mob Comput doi: 10.1155/2021/2730246 – volume: 65 year: 2019 ident: 10.1016/j.compeleceng.2022.108205_bib0048 article-title: Quality-guided key frames selection from video stream based on object detection publication-title: J Vis Commun Image Represent doi: 10.1016/j.jvcir.2019.102678 – volume: 5 start-page: 115 year: 2020 ident: 10.1016/j.compeleceng.2022.108205_bib0016 article-title: A new private information encryption method in the Internet of things under cloud computing environment publication-title: Wirel Commun Mob Comput – volume: 32 start-page: 392 year: 2021 ident: 10.1016/j.compeleceng.2022.108205_bib0026 article-title: Proof of Accumulated trust: a new consensus protocol forthe security of the IoV publication-title: Veh Commun – volume: 320 start-page: 691 year: 2021 ident: 10.1016/j.compeleceng.2022.108205_bib0023 article-title: A DWT-SVD based robust digital watermarking for medical image security publication-title: Forensic Sci Int doi: 10.1016/j.forsciint.2021.110691 – volume: 137 start-page: 1063 year: 2021 ident: 10.1016/j.compeleceng.2022.108205_bib0027 article-title: A novel image encryption method based on fractional discrete Meixner moments publication-title: Opt Lasers Eng – volume: 97 start-page: 409 year: 2021 ident: 10.1016/j.compeleceng.2022.108205_bib0019 article-title: Digital watermarking with improved SMS applied for Q.R. code publication-title: Eng Appl Artif Intell doi: 10.1016/j.engappai.2020.104049 – volume: 9 start-page: 8820 year: 2021 ident: 10.1016/j.compeleceng.2022.108205_bib0033 article-title: Enhancing security of health information using modular encryption standard in mobile cloud computing publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3049564 – volume: 140 start-page: 1074 year: 2021 ident: 10.1016/j.compeleceng.2022.108205_bib0025 article-title: Fractional-order double-ring erbium-doped fiber laser chaotic system and its application on image encryption publication-title: Opt Laser Technol doi: 10.1016/j.optlastec.2021.107074 – start-page: 746 year: 2020 ident: 10.1016/j.compeleceng.2022.108205_bib0035 article-title: Building an authentic and ethical keyword search by applying decentralised (Blockchain) verification – volume: 22 start-page: 1 issue: 2 year: 2021 ident: 10.1016/j.compeleceng.2022.108205_bib0045 article-title: Multi-tier stack of block chain with proxy Re-encryption method scheme on the internet of things platform publication-title: ACM Trans Internet Technol (TOIT) doi: 10.1145/3421508 – volume: 3 year: 2017 ident: 10.1016/j.compeleceng.2022.108205_bib0006 article-title: A trusted TPA model to improve security & reliability for cloudstorage publication-title: Int Res J Eng Technol (IRJET) – volume: 7 start-page: 183532 year: 2019 ident: 10.1016/j.compeleceng.2022.108205_bib0036 article-title: DDoS detection mechanism using trust-based evaluation system in VANET publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2960367 – volume: 3 start-page: 1 year: 2022 ident: 10.1016/j.compeleceng.2022.108205_bib0004 article-title: Privacy signal: privacy-preserving traffic signal control for intelligent transportation system publication-title: IEEE Trans Intell Transp Syst – volume: 9 start-page: 3200 issue: 12 year: 2014 ident: 10.1016/j.compeleceng.2022.108205_bib0049 article-title: Performance of decode and forward MIMO relaying using STBC for wireless uplink publication-title: J Netw – volume: 150 start-page: 1087 year: 2022 ident: 10.1016/j.compeleceng.2022.108205_bib0031 article-title: New color image encryption scheme based on multi- parameter fractional discrete Tche by hev moments and nonlinear fractal permutation method publication-title: Opt Lasers Eng doi: 10.1016/j.optlaseng.2021.106881 – volume: 58 start-page: 808 year: 2021 ident: 10.1016/j.compeleceng.2022.108205_bib0030 article-title: Multi-directional block based PVD and modulus function image steganography to avoid FOBP and IEP publication-title: J Inf Secur Appl – volume: 7 start-page: 158481 year: 2019 ident: 10.1016/j.compeleceng.2022.108205_bib0037 article-title: Intrusion prevention system for DDoS attack on VANET with reCAPTCHA controller using information based metrics publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2945682 – start-page: 1 year: 2021 ident: 10.1016/j.compeleceng.2022.108205_bib0046 article-title: New opportunities, challenges, and applications of edge-AI for connected healthcare in smart cities – start-page: 1 year: 2018 ident: 10.1016/j.compeleceng.2022.108205_bib0008 article-title: Internet of Vehicles (IoV) requirements, attacks, and countermeasures – volume: 2 start-page: 1 issue: 9 year: 2016 ident: 10.1016/j.compeleceng.2022.108205_bib0007 article-title: An efficient auditing protocol with user revocation using cyclic group & AES techniques publication-title: Int J Recent Trends Eng Res (IJRTER) – volume: 8 start-page: 22 issue: 01 year: 2022 ident: 10.1016/j.compeleceng.2022.108205_bib0012 article-title: DES22: DES- based algorithm with improved security publication-title: Jordan J Comput Inf Technol (JJCIT) – volume: 22 start-page: 2281 issue: 6 year: 2022 ident: 10.1016/j.compeleceng.2022.108205_bib0013 article-title: A crypto-steganography approach for hiding ransomware within HEVC streams in android IoT devices publication-title: Sensors doi: 10.3390/s22062281 – year: 2021 ident: 10.1016/j.compeleceng.2022.108205_bib0053 article-title: COVID-19: access to information, health service, daily life facility and risk perception of foreigners during coronavirus pandemic in South Korea publication-title: Arch Med Sci doi: 10.5114/aoms/141164 – volume: 160 start-page: 225 issue: 9 year: 2017 ident: 10.1016/j.compeleceng.2022.108205_bib0014 article-title: A robust fractal code and LSB based image watermarking publication-title: Int J Comput Appl – volume: 110 start-page: 618 year: 2021 ident: 10.1016/j.compeleceng.2022.108205_bib0028 article-title: Image steganography based on style transfer and quaternion exponent moments publication-title: Appl Soft Comput doi: 10.1016/j.asoc.2021.107618 – volume: 7 start-page: 112 issue: 4 year: 2021 ident: 10.1016/j.compeleceng.2022.108205_bib0010 article-title: P2SF-IoV: a privacy-preservation-based secured framework for Internet of Vehicles publication-title: IEEE Trans Intell Transp Syst – start-page: 455 year: 2014 ident: 10.1016/j.compeleceng.2022.108205_bib0050 article-title: Performance of turbo coded vertical bell laboratories layered space time multiple input multiple output system – volume: 21 start-page: 7793 year: 2021 ident: 10.1016/j.compeleceng.2022.108205_bib0039 article-title: Federated transfer learning for authentication and privacy preservation using novel supportive twin delayed DDPG (S-TD3) algorithm for IIoT publication-title: Sensors doi: 10.3390/s21237793 – volume: 1 start-page: 1 year: 2022 ident: 10.1016/j.compeleceng.2022.108205_bib0056 article-title: A novel secured multi-access edge computing based VANET with neuro fuzzy systems based blockchain framework publication-title: Comput Commun – volume: 58 issue: 6 year: 2021 ident: 10.1016/j.compeleceng.2022.108205_bib0038 article-title: Global cryptocurrency trend prediction using social media publication-title: Inf Process Manag – volume: 8 start-page: 1 issue: 7 year: 2021 ident: 10.1016/j.compeleceng.2022.108205_bib0011 article-title: A secured frame selection based video watermarking technique to address quality loss of data: combining-based transform, singular valued decomposition, and hyperchaotic encryption publication-title: Secur Commun Netw doi: 10.1155/2021/5536170 – volume: 8 start-page: 53931 year: 2020 ident: 10.1016/j.compeleceng.2022.108205_bib0021 article-title: Optimal cooperative offloading scheme for energy efficient multi-access edge computation publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2980196 – volume: 34 start-page: 6739 issue: 5 year: 2022 ident: 10.1016/j.compeleceng.2022.108205_bib0003 article-title: Trustful data trading through monetizing IoT data using blockchain based review system publication-title: Concurr Comput Pract Exp doi: 10.1002/cpe.6739 – volume: 58 issue: 6 year: 2021 ident: 10.1016/j.compeleceng.2022.108205_bib0041 article-title: Global cryptocurrency trend prediction using social media publication-title: Inf Process Manag – volume: 8 start-page: 159067 year: 2020 ident: 10.1016/j.compeleceng.2022.108205_bib0054 article-title: Study on modeling method of forest tree image recognition based on CCD and theodolite publication-title: IEEE Access doi: 10.1109/ACCESS.2020.3018180 – volume: 34 start-page: 1089 issue: 1 year: 2022 ident: 10.1016/j.compeleceng.2022.108205_bib0002 article-title: A dynamic key management and secure data transfer based on an m-tree structure with multi-level security framework for Internet of Vehicles publication-title: Connect Sci doi: 10.1080/09540091.2022.2045254 – volume: 32 year: 2022 ident: 10.1016/j.compeleceng.2022.108205_bib0047 article-title: Hexahedron core with sensor based photonic crystal fiber: an approach of design and performance analysis publication-title: Sens Biosens Res – volume: 3 start-page: 4116 year: 2021 ident: 10.1016/j.compeleceng.2022.108205_bib0032 article-title: An efficient ciphertext-policy weighted attribute- based encryption for the Internet of healththings publication-title: IEEE J Biomed Health Inform – volume: 22 start-page: 1 issue: 2 year: 2021 ident: 10.1016/j.compeleceng.2022.108205_bib0022 article-title: Multi-tier stack of block chain with proxy Re- encryption method scheme on the internet of things platform publication-title: ACM Trans Internet Technol (TOIT) doi: 10.1145/3421508 – volume: 11 start-page: 495 issue: 3 year: 2022 ident: 10.1016/j.compeleceng.2022.108205_bib0043 article-title: A novel deep learning model for detection of severity level of the disease in citrus fruits publication-title: Electronics doi: 10.3390/electronics11030495 – volume: 2021 year: 2021 ident: 10.1016/j.compeleceng.2022.108205_bib0051 article-title: Complex system of vertical baduanjin lifting motion sensing recognition under the background of big data publication-title: Complex – volume: 4 start-page: 7092 issue: 3 year: 2017 ident: 10.1016/j.compeleceng.2022.108205_bib0009 article-title: An improved AES cryptosystem based genetic method on S-box, 256 key sizes, and 14-rounds publication-title: Int J Adv Eng Res Sci doi: 10.22161/ijaers.4.3.27 – volume: 33 start-page: 345 issue: 29 year: 2021 ident: 10.1016/j.compeleceng.2022.108205_bib0020 article-title: Dual-encryption in a shape-memory hydrogel with tunable fluorescence and reconfigurable architecture publication-title: Adv Mater doi: 10.1002/adma.202102023 – volume: 32 year: 2021 ident: 10.1016/j.compeleceng.2022.108205_bib0052 article-title: Hexahedron core with sensor based photonic crystal fiber: an approach of design and performance analysis publication-title: Sens Biosens Res – volume: 32 start-page: 771 issue: 2 year: 2021 ident: 10.1016/j.compeleceng.2022.108205_bib0015 article-title: Application of discrete transforms with selective coefficients for blind image watermarking publication-title: Trans Emerg Telecommun Technol – volume: 430 start-page: 884 year: 2022 ident: 10.1016/j.compeleceng.2022.108205_bib0001 article-title: Disguise as fluorescent powder: ultraviolet-B persistent luminescence material without visible light for advanced information encryption anti-counterfeiting applications publication-title: Chem Eng J doi: 10.1016/j.cej.2021.132884 – start-page: 1 year: 2021 ident: 10.1016/j.compeleceng.2022.108205_bib0042 article-title: A novel security mechanism of 6 G For IMD using authentication and key agreement scheme – volume: 12 start-page: 1317 issue: 3 year: 2022 ident: 10.1016/j.compeleceng.2022.108205_bib0040 article-title: Intelligent trust-based utility and reusability model: enhanced security using unmanned aerial vehicles on sensor nodes publication-title: Appl Sci doi: 10.3390/app12031317 – volume: 25 start-page: 10987 issue: 16 year: 2021 ident: 10.1016/j.compeleceng.2022.108205_bib0024 article-title: An adaptive fuzzy inference approach for color image steganography publication-title: Soft Comput doi: 10.1007/s00500-021-05825-y – volume: 2 start-page: 236 year: 2021 ident: 10.1016/j.compeleceng.2022.108205_bib0018 article-title: Deep model intellectual property protection via deep watermarking publication-title: IEEE Trans Pattern Anal Mach Intell – start-page: 1 year: 2020 ident: 10.1016/j.compeleceng.2022.108205_bib0034 article-title: An effective electronic waste management solution based on blockchain smart contract in 5 G communities |
| SSID | ssj0004618 |
| Score | 2.6016195 |
| Snippet | •This research emphasizes enhancing data security in real-time IoV communication considering secure communication also presents a trust-driven privacy method... |
| SourceID | crossref elsevier |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 108205 |
| SubjectTerms | Data security DES algorithm Encryption decryption algorithm Internet of Vehicles LSB method Steganography |
| Title | A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography |
| URI | https://dx.doi.org/10.1016/j.compeleceng.2022.108205 |
| Volume | 102 |
| WOSCitedRecordID | wos000829289700005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 customDbUrl: eissn: 1879-0755 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0004618 issn: 0045-7906 databaseCode: AIEXJ dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Za9tAEF7cpJT0IfQk6cUW-iYU5I2OFfTFlIS2JCGQpPhNrPaobRzJWLZJfk__aGcvSaUtTSn1gzAyo7V2Ps3Ojr6ZQeidFCqJVSLCiDASxoRHYS6kCDMRcRVzQVJmSuafZGdndDzOzweDbz4XZjPPqore3OSL_6pqOAfK1qmzf6Hu9qJwAr6D0uEIaofjnRQ_Cqp6IzWFfN2sQr1KiaBxXepcWYDpRjd5N01wDM3QhgWlIQV8kRPDlAvWJooAd7a8tWbFhNhX8iur-mWufZUD1x2iMViyzXWM_mVX8LB7p7SaOHrvKatmsFsPLuDnNjB9XtcVbJcNz-D0oI0BsfWSlTYKBAus7DK3T6Zzf72ra9lMAsMb78czYCvsCVsuyOYTbTpWkzHcsa6sGbmq2dZW00znX9kqv60xN_nbPy8MNkYx03pd6DmAmz_Qo2uOJYmSbjVsOYoXekw9JCHmrffhPbRNsiQH07k9-nQ0_txLvx3aBd_9xwfobUcj_M2Av3aDeq7N5SO06_YkeGSx9BgNZPUEPexVqnyKZiNsUIV7qMIeVRiQgR2qsEEVBlRhjypcK-xRhQ2qcIcqI_sDqp6hq-Ojyw8fQ9emI-SHNIMhiYpJpJ_rLJYpi4kSgg6HHNQTlWUq0kyUlPKI0VwJqcokI6ykiqcJA18RPs_RVlVXcg9hMSw5GA4QYClYkJgxcGAFoyyOOFeK7SPqZ63groa9bqUyLzxZcVb0JrzQE17YCd9HpBVd2EIudxF671VTOI_UepoF4OrP4i_-Tfwl2ukekFdoCzQsX6P7fLOaNss3DoXfAbm4vtI |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+novel+trust-based+security+and+privacy+model+for+Internet+of+Vehicles+using+encryption+and+steganography&rft.jtitle=Computers+%26+electrical+engineering&rft.au=Rathore%2C+Manjari+Singh&rft.au=Poongodi%2C+M.&rft.au=Saurabh%2C+Praneet&rft.au=Lilhore%2C+Umesh+Kumar&rft.date=2022-09-01&rft.pub=Elsevier+Ltd&rft.issn=0045-7906&rft.eissn=1879-0755&rft.volume=102&rft_id=info:doi/10.1016%2Fj.compeleceng.2022.108205&rft.externalDocID=S0045790622004463 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0045-7906&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0045-7906&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0045-7906&client=summon |