A Anand, AK Singh - Computer Communications, 2020 - Elsevier
Exchange of patient record over network required a technique to guarantee security and privacy for tele-health services. This paper presents an improved watermarking technique …
KN Singh, AK Singh - ACM Transactions on Multimedia Computing …, 2022 - dl.acm.org
As digital images are consistently generated and transmitted online, the unauthorized utilization of these images is an increasing concern that has a significant impact on both …
P Li, KT Lo - IET Signal Processing, 2020 - Wiley Online Library
In recent years, image encryption has been broadly researched. Since a large proportion of images on Internet are compressed, and JPEG is the most widely adopted standards for …
With the proliferation of digital images over open networks, secure and efficient encryption schemes are imperative for safeguarding image privacy. This paper proposes a novel 5 …
Y Zhang, W Zhou, R Zhao, X Zhang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
People are accustomed to utilizing mobile phones to capture images and uploading them to the cloud due to various incomparable advantages such as saving the storage space on the …
We present a novel privacy-preserving scheme for deep neural networks (DNNs) that enables us not to only apply images without visual information to DNNs but to also consider …
A Gupta, D Singh, M Kaur - Journal of Ambient Intelligence and …, 2020 - Springer
Chaotic maps are extensively utilized in the field of image encryption to generate secret keys. However, these maps suffer from hyper-parameters tuning issues. These parameters …
C Wang, L Song - Information Sciences, 2023 - Elsevier
In this paper, we propose a novel image encryption scheme based on a chaotic system and compressed sensing for multiple application scenarios. It is a dedicated scheme for JPEG …
I Ahmad, S Shin - Signal Processing: Image Communication, 2021 - Elsevier
Compression and encryption are often performed together for image sharing and/or storage. The order in which the two operations are carried out affects the overall efficiency of digital …