Adaptive optimal multi key based encryption for digital image security

K Shankar, SK Lakshmanaprabu… - Concurrency and …, 2020 - Wiley Online Library
The security of digital images is an essential and challenging task on shared communication
Model. Generally, high secure working environment and data are also secured with an …

[PDF][PDF] Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm

K Shankar, SK Lakshmanaprabu - International Journal of …, 2018 - researchgate.net
The security of digital images is a basic and difficult task on the shared communication
channel. Different strategies are utilized to secure the digital image, for example, encryption …

An efficient image homomorphic encryption scheme with small ciphertext expansion

P Zheng, J Huang - Proceedings of the 21st ACM international …, 2013 - dl.acm.org
The field of image processing in the encrypted domain has been given increasing attention
for the extensive potential applications, for example, providing efficient and secure solutions …

Efficient encrypted images filtering and transform coding with walsh-hadamard transform and parallelization

P Zheng, J Huang - IEEE Transactions on Image Processing, 2018 - ieeexplore.ieee.org
Since homomorphic encryption operations have high computational complexity, image
applications based on homomorphic encryption are often time consuming, which makes …

Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images

L Li, AA Abd El-Latif, X Niu - Signal Processing, 2012 - Elsevier
This paper proposes an encryption scheme with a new additive homomorphism based on
Elliptic Curve ElGamal (EC-ElGamal) for sharing secret images over unsecured channel …

An efficient homomorphic medical image encryption algorithm for cloud storage security

AM Vengadapurvaja, G Nisha, R Aarthy… - Procedia computer …, 2017 - Elsevier
Abstract The Health Information Technology for Economic and clinical Health (HITECH) Act
of 2009 encourages the use of Electronic Health Records. EHR improves the data …

A secure data protection technique for healthcare data in the cloud using homomorphic encryption and Jaya–Whale optimization algorithm

I Sudha, R Nedunchelian - International Journal of Modeling …, 2019 - World Scientific
Cloud computing has become a powerful mechanism for initiating secure communication
among users. The advancements in the technology lead to provide various services, like …

Fully Enhanced Homomorphic Encryption algorithm of MORE approach for real world applications

K Hariss, H Noura, AE Samhat - Journal of Information Security and …, 2017 - Elsevier
The design of a Homomorphic Encryption (HE) algorithm that allows computation over the
encrypted data is required in real world modern applications to preserve the privacy. Such …

[HTML][HTML] A Novel Effective Lightweight Homomorphic Cryptographic Algorithm for data security in cloud computing

F Thabit, O Can, S Alhomdy, GH Al-Gaphari… - International Journal of …, 2022 - Elsevier
Cloud computing is a technology in which the resources are delivered as services. Users
can access them anywhere, anytime via the Internet without any need to know the …

Homomorphic encryption as a service for outsourced images in mobile cloud computing environment

M Ibtihal, N Hassan - Cryptography: breakthroughs in research …, 2020 - igi-global.com
The integration of cloud computing with mobile computing and internet has given birth to
mobile cloud computing. This technology offers many advantages to users, like Storage …