Perceptual encryption (PE) hides the identifiable information of an image in such a way that its intrinsic characteristics remain intact. This recognizable perceptual quality can be used to enable computation in the encryption domain. A class of PE algorithms based on block-level processing has recently gained popularity for their ability to generate JPEG-compressible cipher images.
View Article and Find Full Text PDFPerceptual encryption (PE) of images protects visual information while retaining the intrinsic properties necessary to enable computation in the encryption domain. Block-based PE produces JPEG-compliant images with almost the same compression savings as that of the plain images. The methods represent an input color image as a pseudo grayscale image to benefit from a smaller block size.
View Article and Find Full Text PDFHuman-induced pluripotent stem cell-derived cardiomyocytes (hiPS-CMs) beating can be efficiently characterized by time-lapse quantitative phase imaging (QPIs) obtained by digital holographic microscopy. Particularly, the CM's nucleus section can precisely reflect the associated rhythmic beating pattern of the CM suitable for subsequent beating pattern characterization. In this paper, we describe an automated method to characterize single CMs by nucleus extraction from QPIs and subsequent beating pattern reconstruction and quantification.
View Article and Find Full Text PDFIn the last few years, multicast device-to-device (D2D) cellular networks has become a highly attractive area of research. However, a particularly challenging class of issues in this area is data traffic, which increases due to increase in video and audio streaming applications. Therefore, there is need for smart spectrum management policies.
View Article and Find Full Text PDFSensors (Basel)
February 2019
In wireless sensor networks, clustering routing algorithms have been widely used owing to their high energy-efficiency and scalability. In clustering schemes, the nodes are organized in the form of clusters, and each cluster is governed by a cluster head. Once the cluster heads are selected, they form a backbone network to periodically collect, aggregate, and forward data to the base station using minimum energy (cost) routing.
View Article and Find Full Text PDFAchieving high source location privacy is critical when Wireless Sensor Networks (WSNs) are used in sensitive applications such as in asset or battlefield monitoring. Due to the sensitivity of information in these applications, it is important to ensure the flow of data between sensor nodes is secure and it does not expose any information about the monitored assets to an adversary. This paper proposes a routing scheme with stronger source location privacy than the privacy of traditional routing schemes.
View Article and Find Full Text PDFDevice-to-device (D2D) communications can be adopted as a promising solution to attain high quality of service (QoS) for a network. However, D2D communications generates harmful interference when available resources are shared with traditional cellular users (CUs). In this paper, network architecture for the uplink resource management issue for D2D communications underlaying uplink cellular networks is proposed.
View Article and Find Full Text PDFWireless sensor networks (WSNs) are deployed in sensitive applications, such as in military and asset monitoring. In these applications, it is important to ensure good source location privacy. This is owing to the open nature of WSNs and the easiness of an adversary to eavesdrop on sensor communication and back trace the location of the source node.
View Article and Find Full Text PDFSensors (Basel)
February 2017
Ubiquitous healthcare is a promising technology that has attracted significant attention in recent years; this has led to the realization of wireless body area networks (WBANs). For designing a robust WBAN system, the WBAN has to solve the drawbacks of wireless technology. Also, a WBAN has to support immediate, reliable data transmission for medical services during emergencies.
View Article and Find Full Text PDF