This paper proposes a novel image compression-encryption scheme based on compressive sensing and bit-level XOR. In the proposed scheme, the encrypted sequences are generated from a 4-D hyper-chaotic Lorenz system and a Logistic system. First, an original image is sampled by a secure block parallel compressive sensing (PCS) scheme. In the PCS phase, a key-controlled discrete cosine transform sparse basis matrix and a key-controlled complex Hadamard measurement matrix are employed. Next, the real part and imaginary part of the resulting complex-valued data are quantized and transformed into bit streams, respectively. After that, the two generated bit streams are combined into one bit stream. Then, the resulting bit stream is further encrypted by a bitlevel XOR operation, where the encrypted key is generated from a chaotic system. The experiment results show the effectiveness and reliability of the proposed joint compression-encryption scheme. The proposed scheme can not only enhance the security of the compressed image but also improve the reconstructed quality of the compressed image.
In this paper, a complex-valued Zadoff–Chu measurement matrix is proposed and used in an image-based quantized compressive sensing (CS) scheme. The results of theoretical analysis and simulations show that the reconstruction performance generated by the proposed Zadoff–Chu measurement matrix is better than that obtained by commonly used real-valued measurement matrices. We also applied block compressive sensing (BCS) to reduce the computational complexity of CS and analyzed the effect of block size on the reconstruction performance of the method. The results of simulations revealed that an appropriate choice of block size can not only reduce the computational complexity but also improve the accuracy of reconstruction. Moreover, we studied the effect of quantization on the reconstruction performance of image-based BCS through simulations, and the results showed that analog-to-digital converters with medium resolutions are sufficient to implement quantization and achieve comparable reconstruction performance to that obtained at high resolutions, based on which an image-based BCS framework with low power consumption can thus be developed.
In e-healthcare system, an increasing number of patients enjoy high-quality medical services by sharing encrypted personal healthcare records (PHRs) with doctors or medical research institutions. However, one of the important issues is that the encrypted PHRs prevent effective search of information, resulting in the decrease of data usage. Another issue is that medical treatment process requires the doctor to be online all the time, which may be unaffordable for all doctors (e.g., to be absent under certain circumstances). In this paper, we design a new secure and practical proxy searchable re-encryption scheme, allowing medical service providers to achieve remote PHRs monitoring and research safely and efficiently. Through our scheme DSAS, (1) patients' healthcare records collected by the devices are encrypted before uploading to the cloud server ensuring privacy and confidentiality of PHRs; (2) only authorized doctors or research institutions have access to the PHRs; (3) Alice (doctor-in-charge) is able to delegate medical research and utilization to Bob (doctor-in-agent) or certain research institution through the cloud server, supporting minimizing information exposure to the cloud server. We formalize the security definition and prove the security of our scheme. Finally, performance evaluation shows the efficiency of our scheme.
Background: With the advent of IoT, the deployment of batteries with a limited lifetime in remote areas is a major concern. In certain conditions, the network lifetime gets restricted due to limited battery constraints. Subsequently, the collaborative approaches for key facilities help to reduce the constraint demands of the current security protocols. Aim: This work covers and combines a wide range of concepts linked by IoT based on security and energy efficiency. Specifically, this study examines the WSN energy efficiency problem in IoT and security for the management of threats in IoT through collaborative approaches and finally outlines the future. The concept of energy-efficient key protocols which clearly cover heterogeneous IoT communications among peers with different resources has been developed. Because of the low capacity of sensor nodes, energy efficiency in WSNs has been an important concern. Methods: Hence, in this paper, we present an algorithm for Artificial Bee Colony (ABC) which reviews security and energy consumption to discuss their constraints in the IoT scenarios. Results: The results of a detailed experimental assessment are analyzed in terms of communication cost, energy consumption and security, which prove the relevance of a proposed ABC approach and a key establishment. Conclusion: The validation of DTLS-ABC consists of designing an inter-node cooperation trust model for the creation of a trusted community of elements that are mutually supportive. Initial attempts to design the key methods for management are appropriate individual IoT devices. This gives the system designers, an option that considers the question of scalability.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.