Provably secure and fast color image encryption algorithm based on s-boxes and hyperchaotic map

ZA Abduljabbar, IQ Abduljaleel, J Ma… - IEEE …, 2022 - ieeexplore.ieee.org
The World Wide Web is experiencing a daily increase in data transmission because of
developments in multimedia technologies. Consequently, each user should prioritize …

A privacy-preserving image retrieval scheme using secure local binary pattern in cloud computing

Z Xia, L Wang, J Tang, NN Xiong… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The rapid growth of digital images motivates organizations and individuals to outsource
image storage and computation to the cloud. However, the defenseless upload will raise the …

IoT data security in outsourced databases: A survey of verifiable database

A Chen, S Yu, X Yang, D Huang, Y Ren - Heliyon, 2024 - cell.com
With the swift advancement of cloud computing and the Internet of Things (IoT), to address
the issue of massive data storage, IoT devices opt to offload their data to cloud servers so as …

Efficient and secure content-based image Retrieval in Cloud-assisted internet of things

L Chen, Y Yang, L Yang, C Xu, Y Miao… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
With the rapid growth of encrypted image data outsourced to cloud servers, achieving data
confidentiality and searchability in cloud-assisted Internet of Things (IoT) environments has …

Enhancing societal security: a multimodal deep learning approach for a public person identification and tracking system

D Yuvasini, S Jegadeesan, S Selvarajan, FA Mon - Scientific Reports, 2024 - nature.com
In public spaces, threats to societal security are a major concern, and emerging
technologies offer potential countermeasures. The proposed intelligent person identification …

A provably lightweight and secure DSSE scheme, with a constant storage cost for a smart device client

SS Bulbul, ZA Abduljabbar, RJ Mohammed… - Plos one, 2024 - journals.plos.org
Outsourcing data to remote cloud providers is becoming increasingly popular amongst
organizations and individuals. A semi-trusted server uses Searchable Symmetric Encryption …

Flsir: Secure image retrieval based on federated learning and additive secret sharing

L Zhang, R Xia, W Tian, Z Cheng, Z Yan, P Tang - IEEE Access, 2022 - ieeexplore.ieee.org
With the rapid deployment of electronic imaging devices, plenty of high-quality images are in
the general public's hands. These images can be profitable, such as providing retrieval …

Comprehensive Challenges to E-government in Iraq

HK Abdali, MA Hussain, ZA Abduljabbar… - Computer Science On …, 2024 - Springer
In recent years, governments and commercial organizations all over the world have
endeavored to explore new searches, opportunities, and investments for making their …

Fast Multi-User Searchable Encryption with Forward and Backward Private Access Control

SS Bulbul, ZA Abduljabbar, DF Najem… - Journal of Sensor and …, 2024 - mdpi.com
Untrusted servers are servers or storage entities lacking complete trust from the data owner
or users. This characterization implies that the server hosting encrypted data may not enjoy …

A Privacy-preserving Large-scale Image Retrieval Framework with Vision GNN Hashing

Y Cao, F Meng, X Shang, J Gui… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
With the growing popularity of cloud services, companies and individuals outsource images
to cloud servers to reduce storage and computing burdens. The images are encrypted …