2020
DOI: 10.1109/access.2020.3014346
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Framework for Secure Image Archival and Retrieval System Using Multiple Secret Share Creation Scheme

Abstract: Due to the advanced growth in multimedia data and Cloud Computing (CC), Secure Image Archival and Retrieval System (SIARS) on cloud has gained more interest in recent times. Content based image retrieval (CBIR) systems generally retrieve the images relevant to the query image (QI) from massive databases. However, the secure image retrieval process is needed to ensure data confidentiality and secure data transmission between cloud storage and users. Existing secure image retrieval models faces difficulties like… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 26 publications
(10 citation statements)
references
References 31 publications
(29 reference statements)
0
10
0
Order By: Relevance
“…In this final stage, AFSA is applied to improve the efficacy of GRU model by optimal-tuning of the hyperparameters [22][23][24]. AFSA approach is a swarm intelligence technique that is developed based on the behaviour of animals [25].…”
Section: Afsa Based Hyperparameter Optimizationmentioning
confidence: 99%
“…In this final stage, AFSA is applied to improve the efficacy of GRU model by optimal-tuning of the hyperparameters [22][23][24]. AFSA approach is a swarm intelligence technique that is developed based on the behaviour of animals [25].…”
Section: Afsa Based Hyperparameter Optimizationmentioning
confidence: 99%
“…Each pixel, present in the input image, is regarded as the framework of n transformed techniques and is named as share. Each share includes a fixed number of sub-pixels as Red-Green-Blue (RGB) images [16]. The share towards RGB is separately denoted as R sh , G sh, and B sh and are determined as follows.…”
Section: Share Creationmentioning
confidence: 99%
“…After the shares are reconstructed, the encrypted and decrypted processes utilizing EPKC method, which is applied to all color bands of the reconstructed share. All color bands of image are separated as to blocks before the encrypted and decrypted procedures [24]. The blocks are divided into 4*4 in size.…”
Section: Share Reconstructionmentioning
confidence: 99%