A comprehensive review on image encryption techniques
Image encryption techniques play a significant role in multimedia applications to secure and
authenticate digital images. This paper presents a comprehensive study of various image …
authenticate digital images. This paper presents a comprehensive study of various image …
Private machine learning classification based on fully homomorphic encryption
Machine learning classification is an useful tool for trend prediction by analyzing big data. As
supporting homomorphic operations over encrypted data without decryption, fully …
supporting homomorphic operations over encrypted data without decryption, fully …
Parallel strength Pareto evolutionary algorithm‐II based image encryption
In recent years, many image encryption approaches have been proposed on the basis of
chaotic maps. The various types of chaotic maps such as one‐dimensional and multi …
chaotic maps. The various types of chaotic maps such as one‐dimensional and multi …
Efficient and secure content-based image retrieval with deep neural networks in the mobile cloud computing
Smart devices offer a variety of more convenient forms to help us record our lives and
generate a large amount of data in this process. Limited by the local storage capacity, many …
generate a large amount of data in this process. Limited by the local storage capacity, many …
Privacy and data protection in mobile cloud computing: A systematic map** study
As a result of a shift in the world of technology, the combination of ubiquitous mobile
networks and cloud computing produced the mobile cloud computing (MCC) domain. As a …
networks and cloud computing produced the mobile cloud computing (MCC) domain. As a …
Privacy-preserving threshold-based image retrieval in cloud-assisted Internet of Things
Encrypted image retrieval is a promising technique for achieving data confidentiality and
searchability the in cloud-assisted Internet of Things (IoT) environment. However, most of the …
searchability the in cloud-assisted Internet of Things (IoT) environment. However, most of the …
Secure and verifiable multikey image search in cloud-assisted edge computing
With the development of outsourcing services, users with limited resources tend to store
encrypted images on remote servers and search them anytime and anywhere. However …
encrypted images on remote servers and search them anytime and anywhere. However …
Intelligent and secure content-based image retrieval for mobile users
F Liu, Y Wang, FC Wang, YZ Zhang, J Lin - IEEE Access, 2019 - ieeexplore.ieee.org
With the tremendous growth of smart mobile devices, the Content-Based Image Retrieval
(CBIR) becomes popular and has great market potentials. Secure image retrieval has …
(CBIR) becomes popular and has great market potentials. Secure image retrieval has …
A novel image-based homomorphic approach for preserving the privacy of autonomous vehicles connected to the cloud
A Sultan, S Tahir, H Tahir, T Anwer… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Autonomous vehicles are taking a leap forward by performing operations without human
intervention through continuous monitoring of their surroundings using multiple sensors …
intervention through continuous monitoring of their surroundings using multiple sensors …
Secure similar image matching (sesim): An improved privacy preserving image retrieval protocol over encrypted cloud database
The emergence of cloud computing provides new dimension for the user to perform
computations and store huge amount of data say images, video, audio etc,. However, the …
computations and store huge amount of data say images, video, audio etc,. However, the …