Articles with "encryption compression" as a keyword



Photo from wikipedia

Joint image encryption and compression scheme based on IWT and SPIHT

Sign Up to like & get
recommendations!
Published in 2017 at "Optics and Lasers in Engineering"

DOI: 10.1016/j.optlaseng.2016.10.025

Abstract: Abstract A joint lossless image encryption and compression scheme based on integer wavelet transform (IWT) and set partitioning in hierarchical trees (SPIHT) is proposed to achieve lossless image encryption and compression simultaneously. Making use of… read more here.

Keywords: compression scheme; compression; image encryption; encryption compression ... See more keywords
Photo from wikipedia

TinyEnc: Enabling Compressed and Encrypted Big Data Stores With Rich Query Support

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2021.3129332

Abstract: Encryption and compression are two critical techniques to ensure data confidentiality and efficiency for a cloud-based data storage system, respectively. However, directly combing encryption and compression incurs substantial performance degradation. We propose TinyEnc, an encrypted… read more here.

Keywords: query support; rich query; encryption; encryption compression ... See more keywords
Photo by goian from unsplash

Secrecy Amplification of Distributed Encrypted Sources With Correlated Keys Using Post-Encryption-Compression

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2019.2907464

Abstract: In this paper, we are interested in the problem of strengthening the secrecy of distributed encryption in a particular case where the encryption keys are correlated to each other. We show that the post-encryption-compression (PEC)… read more here.

Keywords: secrecy; encryption compression; post encryption; encryption ... See more keywords
Photo by nci from unsplash

Multi-Chaos-Based Lightweight Image Encryption-Compression for Secure Occupancy Monitoring

Sign Up to like & get
recommendations!
Published in 2022 at "Journal of Healthcare Engineering"

DOI: 10.1155/2022/7745132

Abstract: With the advancement of camera and wireless technologies, surveillance camera-based occupancy has received ample attention from the research community. However, camera-based occupancy monitoring and wireless channels, especially Wi-Fi hotspot, pose serious privacy concerns and cybersecurity… read more here.

Keywords: occupancy; occupancy monitoring; encryption; encryption compression ... See more keywords