2023
DOI: 10.3390/cryptography7020023
|View full text |Cite
|
Sign up to set email alerts
|

Neural Crypto-Coding Based Approach to Enhance the Security of Images over the Untrusted Cloud Environment

Abstract: The cloud provides on-demand, high-quality services to its users without the burden of managing hardware and software. Though the users benefit from the remote services provided by the cloud, they do not have their personal data in their physical possession. This certainly poses new security threats for personal and confidential data, bringing the focus back on trusting the use of the cloud for sensitive data. The benefits of the cloud outweigh the concerns raised earlier, and with an increase in cloud usage, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 22 publications
(40 reference statements)
0
1
0
Order By: Relevance
“…In privacy-preserving techniques, we need a symmetric cryptosystem, such as AES, to encrypt/decrypt communicated messages using a common shared key. In [2], the authors proposed a new shared key generation technique for securing AES. Their research results show that the proposed technique is superior to other existing techniques in terms of security and performance.…”
Section: Summary Of the Special Issuementioning
confidence: 99%
“…In privacy-preserving techniques, we need a symmetric cryptosystem, such as AES, to encrypt/decrypt communicated messages using a common shared key. In [2], the authors proposed a new shared key generation technique for securing AES. Their research results show that the proposed technique is superior to other existing techniques in terms of security and performance.…”
Section: Summary Of the Special Issuementioning
confidence: 99%