One-pass lossless data hiding and compression of remote sensing data

B Carpentieri, A Castiglione, A De Santis… - Future generation …, 2019 - Elsevier
The information obtained by means of spectral remote sensing (ie, the hyperspectral
images) are involved in several real-life scenarios and applications. Historical research …

Efficient compression and encryption for digital data transmission

B Carpentieri - Security and Communication Networks, 2018 - Wiley Online Library
We live in a digital era in which communication is largely based on the exchange of digital
information on data networks. Communication is often pictured as a sender that transmits a …

On the protection of consumer genomic data in the Internet of Living Things

R Pizzolante, A Castiglione, B Carpentieri… - Computers & …, 2018 - Elsevier
Several companies have recently emerged to provide online Direct-To-Consumer (DTC)
DNA analysis and sequencing. Those activities will be, in the near future, the foundations of …

[HTML][HTML] Secure smart cameras by aggregate-signcryption with decryption fairness for multi-receiver IoT applications

S Ullah, L Marcenaro, B Rinner - Sensors, 2019 - mdpi.com
Smart cameras are key sensors in Internet of Things (IoT) applications and often capture
highly sensitive information. Therefore, security and privacy protection is a key concern. This …

From the paper to the tablet: on the design of an AR-based tool for the inspection of pre-fab buildings. Preliminary results of the SIRAE project

C Portalés, S Casas, J Gimeno, M Fernández, M Poza - Sensors, 2018 - mdpi.com
Energy-efficient Buildings (EeB) are demanded in today's constructions, fulfilling the
requirements for green cities. Pre-fab buildings, which are modularly fully-built in factories …

Low-cost prioritization of image blocks in wireless sensor networks for border surveillance

K Irgan, C Ünsalan, S Baydere - Journal of Network and Computer …, 2014 - Elsevier
Abstract Wireless Sensor Networks (WSNs) are becoming more imperative in monitoring
and surveillance applications, such as border surveillance. For these applications, cameras …

[HTML][HTML] An effective grou** method for privacy-preserving bike sharing data publishing

ASMT Hasan, Q Jiang, C Li - Future Internet, 2017 - mdpi.com
Bike sharing programs are eco-friendly transportation systems that are widespread in smart
city environments. In this paper, we study the problem of privacy-preserving bike sharing …

Compression‐based steganography

B Carpentieri, A Castiglione, A De Santis… - Concurrency and …, 2020 - Wiley Online Library
Conventional privacy‐enforcement mechanisms, such as encryption‐based ones, are
frequently used to prevent third‐party eavesdroppers to intercept confidential information …

[HTML][HTML] Subliminal channels in visual cryptography

K Koptyra, MR Ogiela - Cryptography, 2022 - mdpi.com
This paper describes three methods of creating a subliminal channel in visual cryptography
that are defined for a (2, 2) sharing scheme. They work by hiding additional covert …

A model of UAV-based waste monitoring system for urban areas

D Dobrilovic, G Jotanovic, A Stjepanovic… - Cyber Security, Privacy …, 2022 - Springer
This paper presents an approach in using unmanned aerial vehicles (UAVs) with remote
imaging for urban waste monitoring. The system is designed to monitor green areas, public …