A comprehensive review on image encryption techniques

M Kaur, V Kumar - Archives of Computational Methods in Engineering, 2020 - Springer
Image encryption techniques play a significant role in multimedia applications to secure and
authenticate digital images. This paper presents a comprehensive study of various image …

Real-time and spatio-temporal crowd-sourced social network data publishing with differential privacy

Q Wang, Y Zhang, X Lu, Z Wang… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Nowadays gigantic crowd-sourced data from mobile devices have become widely available
in social networks, enabling the possibility of many important data mining applications to …

Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data

X Jiang, J Yu, J Yan, R Hao - Information Sciences, 2017 - Elsevier
With the prevalence of the cloud computing, data owners can outsource their data to the
cloud server to enjoy convenient services. To ensure the user's data confidentiality, the …

Multi-client secure and efficient dpf-based keyword search for cloud storage

C Huang, D Liu, A Yang, R Lu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In this paper, we propose a multi-client secure and efficient keyword search scheme for
cloud storage, which is built upon distributed point function (DPF). Specifically, outsourced …

Parallel strength Pareto evolutionary algorithm‐II based image encryption

M Kaur, D Singh, R Singh Uppal - IET Image Processing, 2020 - Wiley Online Library
In recent years, many image encryption approaches have been proposed on the basis of
chaotic maps. The various types of chaotic maps such as one‐dimensional and multi …

Chaotic and Paillier secure image data sharing based on blockchain and cloud security

CEJ Singh, CA Sunitha - Expert Systems with Applications, 2022 - Elsevier
Abstract Internet of Things (IoT) is a materializing technology that has considerable
technical, social, and economic importance. The present day predictions for the influence of …

Secure IoT-enabled sharing of digital medical records: An integrated approach with reversible data hiding, symmetric cryptosystem, and IPFS

C Sekar, VR Falmari, M Brindha - Internet of Things, 2023 - Elsevier
In the digitizing medical field, secure sharing of patients' medical records over the Internet
while preserving privacy is critical. Medical image encryption safeguards healthcare, IoMT …

You can access but you cannot leak: Defending against illegal content redistribution in encrypted cloud media center

LY Zhang, Y Zheng, J Weng, C Wang… - … on Dependable and …, 2018 - ieeexplore.ieee.org
The wide adoption of cloud greatly facilitates the sharing of explosively generated media
content today, yet deprives content providers' direct control over the outsourced media …

Privacy-preserving similarity joins over encrypted data

X Yuan, X Wang, C Wang, C Yu… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Similarity search on high-dimensional data has been intensively studied for data processing
and analytics. Despite its broad applicability, data security and privacy concerns along the …

Lightweight Feistel structure based hybrid-crypto model for multimedia data security over uncertain cloud environment

D Rayappan, M Pandiyan - Wireless Networks, 2021 - Springer
The exponential rise in software computing and internet technologies have broadened the
horizon of cloud computing applications serving numerous purposes like business …