A comprehensive review on image encryption techniques

M Kaur, V Kumar - Archives of Computational Methods in Engineering, 2020 - Springer
Image encryption techniques play a significant role in multimedia applications to secure and
authenticate digital images. This paper presents a comprehensive study of various image …

Driverless vehicle security: Challenges and future research opportunities

G De La Torre, P Rad, KKR Choo - Future Generation Computer Systems, 2020 - Elsevier
As self-driving vehicles become increasingly popular, new generations of attackers will seek
to exploit vulnerabilities introduced by the technologies that underpin such vehicles for a …

Cryptography in wireless multimedia sensor networks: A survey and research directions

DG Costa, S Figuerêdo, G Oliveira - Cryptography, 2017 - mdpi.com
Wireless multimedia sensor networks will play a central role in the Internet of Things world,
providing content-rich information for an uncountable number of monitoring and control …

IRS-aided energy-efficient secure WBAN transmission based on deep reinforcement learning

L Xiao, S Hong, S Xu, H Yang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Wireless body area networks (WBANs) are vulnerable to active eavesdropping that
simultaneously perform sniffing and jamming to raise the sensor transmit power, and thus …

Design and FPGA-based realization of a chaotic secure video communication system

S Chen, S Yu, J Lü, G Chen, J He - IEEE transactions on circuits …, 2017 - ieeexplore.ieee.org
This paper initiates a systematic methodology for real-time chaos-based video encryption
and decryption communications on the system design and algorithm analysis. The proposed …

Design and ARM-embedded implementation of a chaotic map-based real-time secure video communication system

Z Lin, S Yu, J Lü, S Cai, G Chen - IEEE Transactions on circuits …, 2014 - ieeexplore.ieee.org
A systematic methodology is proposed for a chaotic map-based real-time video encryption
and decryption system with advanced Reduced Instruction Set Computer machine (ARM) …

Parallel strength Pareto evolutionary algorithm‐II based image encryption

M Kaur, D Singh, R Singh Uppal - IET Image Processing, 2020 - Wiley Online Library
In recent years, many image encryption approaches have been proposed on the basis of
chaotic maps. The various types of chaotic maps such as one‐dimensional and multi …

Energy-aware encryption for securing video transmission in internet of multimedia things

K Thiyagarajan, R Lu, K El-Sankary… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
High Efficiency Video Coding (HEVC) encryption, which has been proposed to encrypt intra
prediction modes (structural information), transform coefficients (texture information), and …

A survey of image security in wireless sensor networks

DDO Gonçalves, DG Costa - Journal of Imaging, 2015 - mdpi.com
Wireless sensor networks are increasingly gaining attention. In recent years, a great deal of
monitoring, control and tracking applications have been designed for different scenarios. For …

[PDF][PDF] A survey on driverless vehicles: From their diffusion to security

F Arena, G Pau, M Collotta - J. Internet Serv. Inf. Secur, 2018 - isyou.info
This paper focuses on state of the art concerning autonomous driving vehicles (AV), with
particular attention to standard equipment currently in use and future improvements. The …