Digital image encryption using elliptic curve cryptography: A review

M Habek, Y Genc, N Aytas, A Akkoc… - … Congress on Human …, 2022 - ieeexplore.ieee.org
Today, digital images are used in many different applications. They can be social media
applications or critical applications such as military and medical. However, cyber attacks or …

Sparse matrix masking-based non-interactive verifiable (outsourced) computation, revisited

L Zhao, L Chen - IEEE transactions on dependable and secure …, 2018 - ieeexplore.ieee.org
A Privacy-preserving Verifiable (outsourced) Computation (PVC) protocol enables a
resource-constrained client to outsource expensive and sensitive workloads to …

On the security of compressed sensing-based signal cryptosystem

Z Yang, W Yan, Y Xiang - IEEE Transactions on Emerging …, 2014 - ieeexplore.ieee.org
With the development of the cyber-physical systems (CPS), the security analysis of the data
therein becomes more and more important. Recently, due to the advantage of joint …

An enhanced variable-length arithmetic coding and encryption scheme using chaotic maps

Q Lin, KW Wong, J Chen - Journal of Systems and Software, 2013 - Elsevier
We enhance the simultaneous arithmetic coding and encryption scheme previously
proposed by us. By encoding a block of variable number of symbols to a codeword within …

Lossless chaos‐based crypto‐compression scheme for image protection

A Masmoudi, W Puech - IET Image Processing, 2014 - Wiley Online Library
In this study, the authors proposed a new scheme which performs both lossless
compression and encryption of images. Lossless compression is done by arithmetic coding …

[PDF][PDF] 基于改进零树编码的图像联合压缩加密算法

邓家先, 任玉莉 - 光子学报, 2013 - researching.cn
在认真研究算术编码和算术加密的基础上, 提出了一种基于改进零树编码的图像联合压缩加密
算法. 使用密钥对图像压缩产生的原始上下文和原始判决进行修正, 实现了图像联合加密 …

[PDF][PDF] 基于EZW 的图像压缩和树形加密同步算法

邓海涛, 邓家先, 邓小梅 - 物理学报, 2013 - wulixb.iphy.ac.cn
为了实现图像的压缩和加密同步提出一种基于内嵌零树小波编码(embedded zerotree wavelet,
EZW) 的压缩和树形加密算法. 加密过程在比特平面编码与熵编码之间进行 …

SIPTAN: Securing inimitable and plundering track for ad hoc network

S Balaji, M Rajaram - Wireless Personal Communications, 2016 - Springer
An AdHoc network is a temporary network without any centralized agent or router, used for
special purposes. A generalized group based approach delivers probabilities of existence of …

Privacy-Preserving Transformation Used in Verifiable (Outsourced) Computation, Revisited

L Zhao, L Chen - IEEE Transactions on Dependable and …, 2023 - ieeexplore.ieee.org
Recently, a privacy-preserving technique called Privacy-Preserving Matrix Transformation
(PPMT) is widely used to construct efficient privacy-preserving Verifiable (outsourced) …

Secure binary arithmetic coding based on digitalized modified logistic map and linear feedback shift register

Y Zhang, D Xiao, W Wen, H Nan, M Su - Communications in Nonlinear …, 2015 - Elsevier
In this paper, we propose a novel secure arithmetic coding based on digitalized modified
logistic map (DMLM) and linear feedback shift register (LFSR). An input binary sequence is …