2021
DOI: 10.1155/2021/6615512
|View full text |Cite
|
Sign up to set email alerts
|

Securing Digital Images through Simple Permutation-Substitution Mechanism in Cloud-Based Smart City Environment

Abstract: Data security plays a significant role in data transfer in cloud-based smart cities. Chaotic maps are commonly used in designing modern cryptographic applications, in which one-dimensional (1D) chaotic systems are widely used due to their simple design and low computational complexity. However, 1D chaotic maps suffer from different kinds of attacks because of their chaotic discontinuous ranges and small key-space. To own the benefits of 1D chaotic maps and avoid their drawbacks, the cascading of two integrated… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
34
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 61 publications
(34 citation statements)
references
References 28 publications
0
34
0
Order By: Relevance
“…be more accessible and efficient than conventional trade [5]. The possible market scale for e-commerce firms is about equal to the global population's connectivity.…”
Section: Global Access -E-commerce Enables Cross-country Commercial Interactions Tomentioning
confidence: 99%
See 1 more Smart Citation
“…be more accessible and efficient than conventional trade [5]. The possible market scale for e-commerce firms is about equal to the global population's connectivity.…”
Section: Global Access -E-commerce Enables Cross-country Commercial Interactions Tomentioning
confidence: 99%
“…It's as sophisticated as TV technology [9]. 5. Interconnectivity -Electronic trade innovation of the 20th Century is known as interaction to provide two-way contact between companies and customers [10].…”
Section: Global Access -E-commerce Enables Cross-country Commercial Interactions Tomentioning
confidence: 99%
“…In various graphics applications such as military, medicine, homeland security, etc., advanced image encryption techniques are increasingly needed for the safe transfer, storage, and recuperation of digital images. A well-designed image cryptosystem should meet the two principles: diffusion and confusion [1]. Confusion indicates that all possible traces or information related to the plaintext or key are deleted from the ciphertext.…”
Section: Introductionmentioning
confidence: 99%
“…With the rapid development of the Internet of ings, wireless sensor networks (WSNs) are not only widely used in transportation, agriculture, home furnishing, military, environmental monitoring, and other fields [1] but also used in smart city environments [2], smart grid [3], and smart healthcare system [4], and Underwater Sensor Networks (USNs) have become widespread and are being deployed in a wide range of applications ranging from harbor security to monitoring underwater pipelines and fish farms [5] recently. Since WSNs are constructed by a large number of sensor nodes in a wireless and multihop way, and the sensor nodes are restricted by calculation, storage, and communication, they are easy to be captured as malicious nodes by attackers.…”
Section: Introductionmentioning
confidence: 99%
“…(1) A homomorphic fingerprinting-based detection and location of malicious nodes (HFDLMN) scheme in wireless sensor networks is presented; using homomorphic fingerprint and coding technology, the HFDLMN scheme can detect and locate malicious nodes in multiple paths. (2) In order to detect and locate malicious nodes, the HFDLMN scheme does not need any complex evaluation model to evaluate and calculate the trust value of the node, nor any monitoring nodes. (3) e HFDLMN scheme can resist the malicious node interfere with the base station to detect malicious nodes.…”
Section: Introductionmentioning
confidence: 99%