A comprehensive review on image encryption techniques

M Kaur, V Kumar - Archives of Computational Methods in Engineering, 2020 - Springer
Image encryption techniques play a significant role in multimedia applications to secure and
authenticate digital images. This paper presents a comprehensive study of various image …

Private machine learning classification based on fully homomorphic encryption

X Sun, P Zhang, JK Liu, J Yu… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Machine learning classification is an useful tool for trend prediction by analyzing big data. As
supporting homomorphic operations over encrypted data without decryption, fully …

Parallel strength Pareto evolutionary algorithm‐II based image encryption

M Kaur, D Singh, R Singh Uppal - IET Image Processing, 2020 - Wiley Online Library
In recent years, many image encryption approaches have been proposed on the basis of
chaotic maps. The various types of chaotic maps such as one‐dimensional and multi …

Efficient and secure content-based image retrieval with deep neural networks in the mobile cloud computing

Y Wang, L Chen, G Wu, K Yu, T Lu - Computers & Security, 2023 - Elsevier
Smart devices offer a variety of more convenient forms to help us record our lives and
generate a large amount of data in this process. Limited by the local storage capacity, many …

Privacy and data protection in mobile cloud computing: A systematic map** study

HM Alnajrani, AA Norman, BH Ahmed - Plos one, 2020 - journals.plos.org
As a result of a shift in the world of technology, the combination of ubiquitous mobile
networks and cloud computing produced the mobile cloud computing (MCC) domain. As a …

Privacy-preserving threshold-based image retrieval in cloud-assisted Internet of Things

L Song, Y Miao, J Weng, KKR Choo… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Encrypted image retrieval is a promising technique for achieving data confidentiality and
searchability the in cloud-assisted Internet of Things (IoT) environment. However, most of the …

Secure and verifiable multikey image search in cloud-assisted edge computing

Y Li, J Ma, Y Miao, L Liu, X Liu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
With the development of outsourcing services, users with limited resources tend to store
encrypted images on remote servers and search them anytime and anywhere. However …

Intelligent and secure content-based image retrieval for mobile users

F Liu, Y Wang, FC Wang, YZ Zhang, J Lin - IEEE Access, 2019 - ieeexplore.ieee.org
With the tremendous growth of smart mobile devices, the Content-Based Image Retrieval
(CBIR) becomes popular and has great market potentials. Secure image retrieval has …

A novel image-based homomorphic approach for preserving the privacy of autonomous vehicles connected to the cloud

A Sultan, S Tahir, H Tahir, T Anwer… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Autonomous vehicles are taking a leap forward by performing operations without human
intervention through continuous monitoring of their surroundings using multiple sensors …

Secure similar image matching (sesim): An improved privacy preserving image retrieval protocol over encrypted cloud database

T Janani, M Brindha - IEEE Transactions on Multimedia, 2021 - ieeexplore.ieee.org
The emergence of cloud computing provides new dimension for the user to perform
computations and store huge amount of data say images, video, audio etc,. However, the …