Performance analysis of compression algorithms for information security: A Review

N Sharma, U Batra - EAI Endorsed Transactions on Scalable Information …, 2020 - eudl.eu
Data compression is a vital part of information security, since compressed data is much more
secure and convenient to handle. Effective data compression technique creates an effective …

[HTML][HTML] Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution

E Setyaningsih, R Wardoyo, AK Sari - Digital Communications and …, 2020 - Elsevier
There are a few issues related to the existing symmetric encryption models for color image
data, such as the key generation and distribution problems. In this paper, we propose a …

Joint jpeg compression and encryption scheme based on order-8-16 block transform

P Li, Z Sun, Z Situ, M He, T Song - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Joint image compression and encryption techniques can be used to ensure the security of
JPEG images. The related works in this field face problems such as low compression …

A simultaneous approach for compression and encryption techniques using deoxyribonucleic acid

DA Zebari, H Haron, DQ Zeebaree… - 2019 13th International …, 2019 - ieeexplore.ieee.org
The Data Compression is a creative skill which defined scientific concepts of providing
contents in a compact form. Thus, it has turned into a need in the field of communication as …

A novel hyper-chaotic image encryption with sparse-representation based compression

J Karmakar, D Nandi, MK Mandal - Multimedia Tools and Applications, 2020 - Springer
This digital era uses lots of images in communication, which are confidential and large in
volume. The transmission channel thus arises the question of security as well as …

Efficient compression and encryption for digital data transmission

B Carpentieri - Security and Communication Networks, 2018 - Wiley Online Library
We live in a digital era in which communication is largely based on the exchange of digital
information on data networks. Communication is often pictured as a sender that transmits a …

Modified AES cipher round and key schedule

EM De Los Reyes, AM Sison… - Indonesian Journal of …, 2019 - section.iaesonline.com
Abstract In this paper, Advanced Encryption Standard was modified to address the
lowdiffusion rate at the early rounds by adding additional primitive operationssuch as …

A lightweight and efficient digital image encryption using hybrid chaotic systems for wireless network applications

IT Almalkawi, R Halloush, A Alsarhan… - Journal of Information …, 2019 - Elsevier
Due to limited processing capabilities and other constraints of most wireless networks, many
existing security algorithms do not consider the network efficiency. This is because most of …

A Metaheuristic Approach to Secure Multimedia Big Data for IoT‐Based Smart City Applications

HS Gill, T Singh, B Kaur, GS Gaba… - Wireless …, 2021 - Wiley Online Library
Media streaming falls into the category of Big Data. Regardless of the video duration, an
enormous amount of information is encoded in accordance with standardized algorithms of …

The design of a novel multiple-parameter fractional number-theoretic transform and its application to image encryption

JR de Oliveira Neto, JB Lima… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this paper, we describe an image encryption scheme based on the multiple-parameter
fractional number-theoretic transform (MFrNTT). In order to define the MFrNTT used in our …