A comprehensive review on image encryption techniques
Image encryption techniques play a significant role in multimedia applications to secure and
authenticate digital images. This paper presents a comprehensive study of various image …
authenticate digital images. This paper presents a comprehensive study of various image …
Driverless vehicle security: Challenges and future research opportunities
G De La Torre, P Rad, KKR Choo - Future Generation Computer Systems, 2020 - Elsevier
As self-driving vehicles become increasingly popular, new generations of attackers will seek
to exploit vulnerabilities introduced by the technologies that underpin such vehicles for a …
to exploit vulnerabilities introduced by the technologies that underpin such vehicles for a …
Cryptography in wireless multimedia sensor networks: A survey and research directions
DG Costa, S Figuerêdo, G Oliveira - Cryptography, 2017 - mdpi.com
Wireless multimedia sensor networks will play a central role in the Internet of Things world,
providing content-rich information for an uncountable number of monitoring and control …
providing content-rich information for an uncountable number of monitoring and control …
IRS-aided energy-efficient secure WBAN transmission based on deep reinforcement learning
Wireless body area networks (WBANs) are vulnerable to active eavesdropping that
simultaneously perform sniffing and jamming to raise the sensor transmit power, and thus …
simultaneously perform sniffing and jamming to raise the sensor transmit power, and thus …
Design and FPGA-based realization of a chaotic secure video communication system
This paper initiates a systematic methodology for real-time chaos-based video encryption
and decryption communications on the system design and algorithm analysis. The proposed …
and decryption communications on the system design and algorithm analysis. The proposed …
Design and ARM-embedded implementation of a chaotic map-based real-time secure video communication system
A systematic methodology is proposed for a chaotic map-based real-time video encryption
and decryption system with advanced Reduced Instruction Set Computer machine (ARM) …
and decryption system with advanced Reduced Instruction Set Computer machine (ARM) …
Parallel strength Pareto evolutionary algorithm‐II based image encryption
In recent years, many image encryption approaches have been proposed on the basis of
chaotic maps. The various types of chaotic maps such as one‐dimensional and multi …
chaotic maps. The various types of chaotic maps such as one‐dimensional and multi …
Energy-aware encryption for securing video transmission in internet of multimedia things
High Efficiency Video Coding (HEVC) encryption, which has been proposed to encrypt intra
prediction modes (structural information), transform coefficients (texture information), and …
prediction modes (structural information), transform coefficients (texture information), and …
A survey of image security in wireless sensor networks
DDO Gonçalves, DG Costa - Journal of Imaging, 2015 - mdpi.com
Wireless sensor networks are increasingly gaining attention. In recent years, a great deal of
monitoring, control and tracking applications have been designed for different scenarios. For …
monitoring, control and tracking applications have been designed for different scenarios. For …
[PDF][PDF] A survey on driverless vehicles: From their diffusion to security
This paper focuses on state of the art concerning autonomous driving vehicles (AV), with
particular attention to standard equipment currently in use and future improvements. The …
particular attention to standard equipment currently in use and future improvements. The …