2021
DOI: 10.1109/tcsvt.2020.3039112
|View full text |Cite
|
Sign up to set email alerts
|

CFB-Then-ECB Mode-Based Image Encryption for an Efficient Correction of Noisy Encrypted Images

Abstract: During the last few decades, the transmission of images over secure networks has exponentially grown. Data security in certain applications such as secure storage, authentication or privacy protection on cloud platforms, require specific strategies for multimedia. Cryptography can be used for this purpose. Indeed, using a secret key, it is possible to make data unreadable in order to secure it. Although encryption approaches are effective to make the original data unreadable, they are also very sensitive to no… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(6 citation statements)
references
References 31 publications
0
6
0
Order By: Relevance
“…The system is divided into robot management, motion mode control, image processing, database management, and patrol log, which can save some human resources and improve the troubleshooting ability of abnormal equipment [15]. The monitoring system of substation inspection robot shall also meet the image quality requirements of video transmission to ensure that remote personnel can clearly identify the target image [16]. The inspection robot should have certain intelligence, but the research in this direction is still scarce at present.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The system is divided into robot management, motion mode control, image processing, database management, and patrol log, which can save some human resources and improve the troubleshooting ability of abnormal equipment [15]. The monitoring system of substation inspection robot shall also meet the image quality requirements of video transmission to ensure that remote personnel can clearly identify the target image [16]. The inspection robot should have certain intelligence, but the research in this direction is still scarce at present.…”
Section: Literature Reviewmentioning
confidence: 99%
“…If there is a match, the respective segment file is not stored, meaning that the segment file is duplicate. The proposed Image Decompression Model with Reversible Pixel Interchange Decryption model using Data Deduplication (IDRPID-DD) model is compared with the Chunk Based Deduplication Model (CDM) [24], Cipher Feedback based Electronic Code Book (CFB-ECB) model [25], Equal Modulus Decomposition (EMD) model [26] and Image Compression and Encryption Scheme based on Compressive Sensing (ICES-CS) [27] model and the results are represented.…”
Section: Resultsmentioning
confidence: 99%
“…Data Replication technology optimises the storage providers' computing capacity to use disc space efficiently. Another advantage of deduplication is that the duplicate data copies are not transmitted and upload bandwidth is not saved when performed at source [25]. The deduction of data helps to accommodate increased data volume and decreases operating costs and storage costs.…”
Section: Proposed Modelmentioning
confidence: 99%
“…In [16], several methods for maintaining database security are proposed, including physical security, network security, password access control, biometric authentication, data encryption, auditing, and logging. While systems that uses password have a long history [17], a comparative analysis can highlight their advantages and disadvantages [18]. Despite their simplicity and prevalence, password-based authentication solutions pose security risks and challenges [19].…”
Section: Review Of Related Literaturementioning
confidence: 99%