Secure surveillance framework for IoT systems using probabilistic image encryption

K Muhammad, R Hamza, J Ahmad… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
This paper proposes a secure surveillance framework for Internet of things (IoT) systems by
intelligent integration of video summarization and image encryption. First, an efficient video …

A privacy-preserving cryptosystem for IoT E-healthcare

R Hamza, Z Yan, K Muhammad, P Bellavista… - Information …, 2020 - Elsevier
Privacy preservation has become a prerequisite for modern applications in the cloud, social
media, Internet of things (IoT), and E-healthcare systems. In general, health and medical …

A blockchain-based secure image encryption scheme for the industrial Internet of Things

PW Khan, Y Byun - Entropy, 2020 - mdpi.com
Smart cameras and image sensors are widely used in industrial processes, from the
designing to the quality checking of the final product. Images generated by these sensors …

Hash based encryption for keyframes of diagnostic hysteroscopy

R Hamza, K Muhammad, N Arunkumar… - IEEE …, 2017 - ieeexplore.ieee.org
In this paper, we address the problem of confidentiality of keyframes, which are extracted
from diagnostic hysteroscopy data using video summarization. We propose an image color …

CES blocks—a novel chaotic encryption schemes-based blockchain system for an IoT environment

R Durga, E Poovammal, K Ramana, RH Jhaveri… - IEEe …, 2022 - ieeexplore.ieee.org
With the advent of the Internet of Things (IoT), smart devices have now changed their
dimensions to provide applications in different domains such as medical, agriculture, and …

The image compression–encryption algorithm based on the compression sensing and fractional-order chaotic system

J Xu, J Mou, J Liu, J Hao - The visual computer, 2022 - Springer
In this paper, a novel image encryption algorithm based on the fractional-order chaotic
system and compression sensing algorithm is proposed. Firstly, the dynamical …

Automated vision system for quality inspection of slate slabs

C Iglesias, J Martínez, J Taboada - Computers in Industry, 2018 - Elsevier
The natural properties of slate have made it a valuable resource for construction purposes,
especially for roofing. However, slate slabs must meet certain requirements to ensure their …

New method for fingerprint images encryption using DNA sequence and chaotic tent map

SYD Nezhad, N Safdarian, SAH Zadeh - Optik, 2020 - Elsevier
The security of data transfer by the web and network is very important, especially in
medicine. So encryption is a challenging and important task in information security …

A secured data hiding using affine transformation in video steganography

M Ramalingam, NAM Isa, R Puviarasi - Procedia Computer Science, 2020 - Elsevier
Network security is the most essential aspect of information technology among today's
emerging digital technologies which demands secured communication of information. In this …

Exploiting size-compatible-match block technique for arbitrary-size thumbnail-preserving encryption

D An, D Hao, J Lu, J Mou, R Zhao… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
In traditional image encryption, privacy is protected at the expense of all visual content
resulting in poor usability. Recently, a novel image encryption concept, thumbnail preserving …