2017
DOI: 10.1109/tmc.2016.2595573
|View full text |Cite
|
Sign up to set email alerts
|

Harnessing Encrypted Data in Cloud for Secure and Efficient Mobile Image Sharing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 21 publications
(7 citation statements)
references
References 33 publications
0
7
0
Order By: Relevance
“…7. From the figure it is clearly observed that the performance of proposed method is better of 15.2%, 12.8%, and 14.45% for image 1, 14.9%, 12.7%, and 14.7% for image 2, 15%, 12.77%, and 14.47% for image 3, and 15.43%, 13.8%, and 15.7% for image 4 when compared with Cui et al [17], Liao et al [21], Deepthi et al [22] research works. The analysis of encryption quality with various images is shown in Fig.…”
Section: Run Timementioning
confidence: 71%
See 4 more Smart Citations
“…7. From the figure it is clearly observed that the performance of proposed method is better of 15.2%, 12.8%, and 14.45% for image 1, 14.9%, 12.7%, and 14.7% for image 2, 15%, 12.77%, and 14.47% for image 3, and 15.43%, 13.8%, and 15.7% for image 4 when compared with Cui et al [17], Liao et al [21], Deepthi et al [22] research works. The analysis of encryption quality with various images is shown in Fig.…”
Section: Run Timementioning
confidence: 71%
“…From the figure it is observed that, the encryption quality of proposed method is 20.9%, 21.4%, 17.7% and 17.03% superior to Cui et al [17], 14.5%, 15.7%, 15.6% and 15.4% superior to Liao et al [21], 9.1%, 10.46%, 10.48% and 9.4% superior to Deepthi et al [22] techniques for various image sizes. Cui et al [17] Liao et al [21] Deepthi et al [22] proposed The execution time analysis of various images is shown in Fig. 9.…”
Section: Run Timementioning
confidence: 84%
See 3 more Smart Citations