A comprehensive survey on encryption techniques for digital images

M Singh, AK Singh - Multimedia Tools and Applications, 2023 - Springer
With the widespread adoption of smart devices and high-speed networks, investigators are
focusing on securing digital image applications, such as those on social media, in …

Towards integrating image encryption with compression: a survey

KN Singh, AK Singh - ACM Transactions on Multimedia Computing …, 2022 - dl.acm.org
As digital images are consistently generated and transmitted online, the unauthorized
utilization of these images is an increasing concern that has a significant impact on both …

A novel hybrid image encryption–compression scheme by combining chaos theory and number theory

I Ahmad, S Shin - Signal Processing: Image Communication, 2021 - Elsevier
Compression and encryption are often performed together for image sharing and/or storage.
The order in which the two operations are carried out affects the overall efficiency of digital …

Ecis: encryption prior to compression for digital image security with reduced memory

KN Singh, OP Singh, AK Singh - Computer Communications, 2022 - Elsevier
Digital images are a popular source of information and play an important role in several
applications. However, the large amount of available data in the form of images causes …

A novel approach for multilevel multi-secret image sharing scheme

K Bisht, M Deshmukh - The Journal of Supercomputing, 2021 - Springer
Multi-secret sharing (MSS) is an effective technique that securely encodes multiple secrets
to generate shares and distributes them among the participants in such a way that these …

Frei-Chen bases based lossy digital image compression technique

M Al-khassaweneh, O AlShorman - Applied Computing and …, 2024 - emerald.com
In the big data era, image compression is of significant importance in today's world.
Importantly, compression of large sized images is required for everyday tasks; including …

Object detection framework to generate secret shares

A Agarwal, M Deshmukh, M Singh - Multimedia Tools and Applications, 2020 - Springer
Nowadays, the sharing of images via the Internet has been widely used. The security
concern during transmission of images has been a very important issue, as images contain …

Efficient implementation of Chinese remainder theorem in minimally redundant residue number system

M Selianinau - Computer Science, 2020 - yadda.icm.edu.pl
The Chinese remainder theorem is widely used in many modern computer applications. This
paper presents an efficient approach to the calculation of the rank of a number, a principal …

Analysis of Chinese remainder theorem for data compression

I Ahmad, B Lee, S Shin - 2020 International Conference on …, 2020 - ieeexplore.ieee.org
Chinese remainder theorem (CRT) forms the foundation of recent simultaneous encryption
and compression schemes for image data. In the schemes moduli sequence is being used …

A permission‐combination scalable access control model for Internet of things

Q Zhang, Y Li, C Zheng, L Zhu… - Transactions on …, 2022 - Wiley Online Library
Abstract Development of the Internet of things (IoT) is considered as one of the major events
in modern manufacturing industry, and IoT devices are expected to create and exchange …