Progressive researches on IoT security: An exhaustive analysis from the perspective of protocols, vulnerabilities, and preemptive architectonics

M Mahbub - Journal of Network and Computer Applications, 2020 - Elsevier
The IoT is the upcoming one of the major networking technologies. Using the IoT, different
items or devices can be allowed to continuously generate, obtain, and exchange …

A Systematic Review on Image Data Protection Methods

FA Alyaqobi, NAB Yahaya - … Journal of Informatics and Information Systems, 2022 - ijiis.org
Securing data is the main goal of any data security system (DSS). Valuable data must be
protected all the time and stored in a very highly secure data storage device. This need has …

Robust reversible watermarking in encrypted image with secure multi-party based on lightweight cryptography

L Xiong, X Han, CN Yang, YQ Shi - IEEE transactions on …, 2021 - ieeexplore.ieee.org
With the rapid development of network media, increasing research on reversible
watermarking has focused on improving its robustness to resisting attacks during digital …

Reversible data hiding over encrypted images via preprocessing-free matrix secret sharing

Z Hua, X Liu, Y Zheng, S Yi… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Cloud service is a natural choice to store and manage the exponentially produced images.
Data privacy is one of the most concerned points in cloud-based image services. Reversible …

Homomorphic encryption based privacy-preservation for iomt

MM Salim, I Kim, U Doniyor, C Lee, JH Park - Applied Sciences, 2021 - mdpi.com
Healthcare applications store private user data on cloud servers and perform computation
operations that support several patient diagnoses. Growing cyber-attacks on hospital …

Reversible data hiding in encrypted images using cipher-feedback secret sharing

Z Hua, Y Wang, S Yi, Y Zhou… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Reversible data hiding in encrypted images (RDH-EIs) has attracted increasing attention
since it can protect the privacy of original images while exactly extracting the embedded …

Secret sharing based reversible data hiding in encrypted images with multiple data-hiders

B Chen, W Lu, J Huang, J Weng… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The existing models of reversible data hiding in encrypted images (RDH-EI) are based on
single data-hider, where the original image cannot be reconstructed when the data-hider is …

A reversible data hiding scheme in encrypted domain for secret image sharing based on Chinese remainder theorem

Y Ke, M Zhang, X Zhang, J Liu, T Su… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Schemes of reversible data hiding in encrypted domain (RDH-ED) based on symmetric or
public key encryption are mainly applied in the scenarios of end-to-end communication. To …

Reversible Data Hiding in Encrypted Image via Secret Sharing Based on GF(p) and GF(2⁸)

C Qin, C Jiang, Q Mo, H Yao… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Secret sharing is a useful method which divides a secret message into several shares for
security. During the recovery procedure, only when sufficient shares are obtained, the secret …

Reversible data hiding in encrypted images with secret sharing and hybrid coding

C Yu, X Zhang, C Qin, Z Tang - IEEE Transactions on Circuits …, 2023 - ieeexplore.ieee.org
Reversible data hiding in encrypted images (RDHEI) is an essential data security technique.
Most RDHEI methods cannot perform well in embedding capacity and security. To address …