2017
DOI: 10.24017/science.2017.3.34
|View full text |Cite
|
Sign up to set email alerts
|

A Proposed Lossy Image Compression based on Multiplication Table

Abstract: Lately, Internet improved in the various trends, especially, the use of the image increased due to the daily use in several scopes like social media (Facebook, Twitter, WhatsApp, etc.), connected devices (sensor, IP camera, Internet of Things (IoT) Internet of Everything (IoE), etc) and smart phone devices that users interchanged images estimated in the billions. So, images issues in internet can be summarized into two criteria, the first criteria is considered with transmit image size. The second criteria is … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 6 publications
0
6
0
Order By: Relevance
“…Cryptography is an imaginative transformation of data into an unreadable format such that it can only be interpreted and used by the intended receiver. The art and science of cryptography is the defense against improper access to sensitive or confidential information [17][18][19][20]. In general, therefore, cryptography is all about shielding and safeguarding information from cybercriminals or someone other than the intended recipient.…”
Section: Information Securitymentioning
confidence: 99%
“…Cryptography is an imaginative transformation of data into an unreadable format such that it can only be interpreted and used by the intended receiver. The art and science of cryptography is the defense against improper access to sensitive or confidential information [17][18][19][20]. In general, therefore, cryptography is all about shielding and safeguarding information from cybercriminals or someone other than the intended recipient.…”
Section: Information Securitymentioning
confidence: 99%
“…As for the second column, it includes the random numbers for the three-dimensional box locations, which it contains the record numbers that include the first name in the first column in the database. Table (3)(4)(5)(6)(7)(8)(9) shows the structure of inverted table that derived from the first column of the original database (database of Iraqi voter). We notice that the first column in the table (3)(4)(5)(6)(7)(8)(9) contains all the names of the first column of the database without repetition while the second column includes numbers )038,849,213,237) refer to the locations of 3D box that contain all the names of ‫.…”
Section: Construction Of Inverted Tablesmentioning
confidence: 99%
“…Organization databases include sensitive data that can be unprotected from attacks and misuse [3]. Many techniques, such as encryption and other steganography methods, can solve this type of problem [4][5][6]. Cryptography provides important security for the database.…”
Section: Introductionmentioning
confidence: 99%
“…Data encryption is one of the most critical areas in information and communication technology, which shields data from alteration or manipulation to prevent security breaches. Additionally, as technology has advanced, image encryption has become popular due to concerns about user privacy [1] and the fact that information security should always be considered [2]. The two forms of encryption are block ciphers and stream ciphers; the stream cipher algorithms encrypt the message using a secret key generator mechanism.…”
Section: Introductionmentioning
confidence: 99%