Progressive researches on IoT security: An exhaustive analysis from the perspective of protocols, vulnerabilities, and preemptive architectonics
M Mahbub - Journal of Network and Computer Applications, 2020 - Elsevier
The IoT is the upcoming one of the major networking technologies. Using the IoT, different
items or devices can be allowed to continuously generate, obtain, and exchange …
items or devices can be allowed to continuously generate, obtain, and exchange …
A Systematic Review on Image Data Protection Methods
FA Alyaqobi, NAB Yahaya - … Journal of Informatics and Information Systems, 2022 - ijiis.org
Securing data is the main goal of any data security system (DSS). Valuable data must be
protected all the time and stored in a very highly secure data storage device. This need has …
protected all the time and stored in a very highly secure data storage device. This need has …
Robust reversible watermarking in encrypted image with secure multi-party based on lightweight cryptography
With the rapid development of network media, increasing research on reversible
watermarking has focused on improving its robustness to resisting attacks during digital …
watermarking has focused on improving its robustness to resisting attacks during digital …
Reversible data hiding over encrypted images via preprocessing-free matrix secret sharing
Cloud service is a natural choice to store and manage the exponentially produced images.
Data privacy is one of the most concerned points in cloud-based image services. Reversible …
Data privacy is one of the most concerned points in cloud-based image services. Reversible …
Homomorphic encryption based privacy-preservation for iomt
Healthcare applications store private user data on cloud servers and perform computation
operations that support several patient diagnoses. Growing cyber-attacks on hospital …
operations that support several patient diagnoses. Growing cyber-attacks on hospital …
Reversible data hiding in encrypted images using cipher-feedback secret sharing
Reversible data hiding in encrypted images (RDH-EIs) has attracted increasing attention
since it can protect the privacy of original images while exactly extracting the embedded …
since it can protect the privacy of original images while exactly extracting the embedded …
Secret sharing based reversible data hiding in encrypted images with multiple data-hiders
The existing models of reversible data hiding in encrypted images (RDH-EI) are based on
single data-hider, where the original image cannot be reconstructed when the data-hider is …
single data-hider, where the original image cannot be reconstructed when the data-hider is …
A reversible data hiding scheme in encrypted domain for secret image sharing based on Chinese remainder theorem
Y Ke, M Zhang, X Zhang, J Liu, T Su… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Schemes of reversible data hiding in encrypted domain (RDH-ED) based on symmetric or
public key encryption are mainly applied in the scenarios of end-to-end communication. To …
public key encryption are mainly applied in the scenarios of end-to-end communication. To …
Reversible Data Hiding in Encrypted Image via Secret Sharing Based on GF(p) and GF(2⁸)
Secret sharing is a useful method which divides a secret message into several shares for
security. During the recovery procedure, only when sufficient shares are obtained, the secret …
security. During the recovery procedure, only when sufficient shares are obtained, the secret …
Reversible data hiding in encrypted images with secret sharing and hybrid coding
Reversible data hiding in encrypted images (RDHEI) is an essential data security technique.
Most RDHEI methods cannot perform well in embedding capacity and security. To address …
Most RDHEI methods cannot perform well in embedding capacity and security. To address …