All-Or-Nothing data protection for ubiquitous communication: Challenges and perspectives

H Qiu, K Kapusta, Z Lu, M Qiu, G Memmi - Information Sciences, 2019 - Elsevier
As we are in the age of ubiquitous computing and communication, the need to provide safety
and security for such systems is more urgent than ever. Research works of cryptography …

Survey on JPEG compatible joint image compression and encryption algorithms

P Li, KT Lo - IET Signal Processing, 2020 - Wiley Online Library
In recent years, image encryption has been broadly researched. Since a large proportion of
images on Internet are compressed, and JPEG is the most widely adopted standards for …

On the security of permutation-only image encryption schemes

A Jolfaei, XW Wu… - IEEE transactions on …, 2015 - ieeexplore.ieee.org
Permutation is a commonly used primitive in multimedia (image/video) encryption schemes,
and many permutation-only algorithms have been proposed in recent years for the …

A novel hybrid image encryption–compression scheme by combining chaos theory and number theory

I Ahmad, S Shin - Signal Processing: Image Communication, 2021 - Elsevier
Compression and encryption are often performed together for image sharing and/or storage.
The order in which the two operations are carried out affects the overall efficiency of digital …

A user-centric data protection method for cloud storage based on invertible DWT

H Qiu, H Noura, M Qiu, Z Ming… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Protection on end users' data stored in Cloud servers becomes an important issue in today's
Cloud environments. In this paper, we present a novel data protection method combining …

New framework of reversible data hiding in encrypted JPEG bitstreams

Z Qian, H Xu, X Luo, X Zhang - IEEE Transactions on Circuits …, 2018 - ieeexplore.ieee.org
This paper proposes a novel framework of reversible data hiding in encrypted JPEG
bitstream. We first provide a JPEG encryption algorithm to encipher a JPEG image to a …

P3: Toward {Privacy-Preserving} Photo Sharing

MR Ra, R Govindan, A Ortega - 10th USENIX Symposium on Networked …, 2013 - usenix.org
With increasing use of mobile devices, photo sharing services are experiencing greater
popularity. Aside from providing storage, photo sharing services enable bandwidth-efficient …

Separable reversible data hiding in encrypted JPEG bitstreams

Z Qian, H Zhou, X Zhang… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
While most techniques of reversible data hiding in encrypted images (RDH-EI) are
developed for uncompressed images, this paper provides a separable reversible data …

A survey of h. 264 avc/svc encryption

T Stutz, A Uhl - IEEE Transactions on circuits and systems for …, 2011 - ieeexplore.ieee.org
Video encryption has been heavily researched in the recent years. This survey summarizes
the latest research results on video encryption with a special focus on applicability and on …

A commutative digital image watermarking and encryption method in the tree structured Haar transform domain

M Cancellaro, F Battisti, M Carli, G Boato… - Signal Processing …, 2011 - Elsevier
In this paper a commutative watermarking and ciphering scheme for digital images is
presented. The commutative property of the proposed method allows to cipher a …