2015
DOI: 10.1504/ijesdf.2015.070389
|View full text |Cite
|
Sign up to set email alerts
|

Preserving the confidentiality of digital images using a chaotic encryption scheme

Abstract: Confidentiality of digital images is an important requirement for many multimedia applications and services. To maintain confidentiality, encryption of digital images is essential. Digital images are usually very large and encrypting such bulky data induces many performance overheads, which can be too expensive for real-time applications in resource constrained environments. In this paper, we propose a chaotic image encryption scheme which satisfies the need for both lightweightedness and security. To justify … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…36 Data encryption and confidentiality schemes are extremely necessary to protect the collected data from modification and to prevent from malicious code injection. 57,58 However, adding a strong data encryption and key management scheme would result in consuming resources of the IoT devices considerably. Hence, lightweight cryptographic algorithms and protocols are necessary to mitigate this problem.…”
Section: Security Solutions For Iotmentioning
confidence: 99%
See 1 more Smart Citation
“…36 Data encryption and confidentiality schemes are extremely necessary to protect the collected data from modification and to prevent from malicious code injection. 57,58 However, adding a strong data encryption and key management scheme would result in consuming resources of the IoT devices considerably. Hence, lightweight cryptographic algorithms and protocols are necessary to mitigate this problem.…”
Section: Security Solutions For Iotmentioning
confidence: 99%
“…Authentication and access control schemes should be applied in perception layer to prevent illegal node access and to identify network nodes 36 . Data encryption and confidentiality schemes are extremely necessary to protect the collected data from modification and to prevent from malicious code injection 57,58 . However, adding a strong data encryption and key management scheme would result in consuming resources of the IoT devices considerably.…”
Section: Security Solutions For Iotmentioning
confidence: 99%
“…Terefore, image security became an inescapable problem of high importance in diferent areas [16]. Te confdentiality of digital image can be maintained by data encryption [17,18]. A variety of techniques for encrypting images include cryptography [19,20], watermarking [21,22], and steganography [23,24].…”
Section: Introductionmentioning
confidence: 99%