Security and privacy in device-to-device (D2D) communication: A review

M Haus, M Waqas, AY Ding, Y Li… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Device-to-device (D2D) communication presents a new paradigm in mobile networking to
facilitate data exchange between physically proximate devices. The development of D2D is …

Survey of security advances in smart grid: A data driven approach

S Tan, D De, WZ Song, J Yang… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
With the integration of advanced computing and communication technologies, smart grid is
considered as the next-generation power system, which promises self healing, resilience …

Encryption-then-compression systems using grayscale-based image encryption for JPEG images

T Chuman, W Sirichotedumrong… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
A block scrambling-based encryption scheme is presented to enhance the security of
Encryption-then-Compression (EtC) systems with JPEG compression, which allow us to …

[PDF][PDF] An overview of compressible and learnable image transformation with secret key and its applications

H Kiya, APM Maung, Y Kinoshita… - … on Signal and …, 2022 - nowpublishers.com
This article presents an overview of image transformation with a secret key and its
applications. Image transformation with a secret key enables us not only to protect visual …

A survey on socially aware device-to-device communications

M Ahmed, Y Li, M Waqas, M Sheraz… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Device-to-device (D2D) communication is continuously evolving and engulfing a wide
diversity of proximate services and applications, which is considered as one of the key …

Image to perturbation: An image transformation network for generating visually protected images for privacy-preserving deep neural networks

H Ito, Y Kinoshita, M Aprilpyone, H Kiya - IEEE Access, 2021 - ieeexplore.ieee.org
We propose a novel image transformation network for generating visually protected images
for privacy-preserving deep neural networks (DNNs). The proposed transformation network …

Grayscale-based block scrambling image encryption using ycbcr color space for encryption-then-compression systems

W Sirichotedumrong, H Kiya - APSIPA Transactions on Signal and …, 2019 - cambridge.org
A novel grayscale-based block scrambling image encryption scheme is presented not only
to enhance security, but also to improve the compression performance for Encryption-then …

An encryption-then-compression system for jpeg/motion jpeg standard

K Kurihara, M Kikuchi, S Imaizumi… - IEICE Transactions on …, 2015 - search.ieice.org
In many multimedia applications, image encryption has to be conducted prior to image
compression. This paper proposes a JPEG-friendly perceptual encryption method, which …

An encryption-then-compression system for jpeg standard

K Kurihara, S Shiota, H Kiya - 2015 Picture Coding Symposium …, 2015 - ieeexplore.ieee.org
In many multimedia applications, image encryption has to be conducted prior to image
compression. This paper proposes an Encryption-then-Compression system using a JPEG …

An encryption-then-compression system for lossless image compression standards

K Kurihara, S Imaizumi, S Shiota… - IEICE transactions on …, 2017 - search.ieice.org
In many multimedia applications, image encryption has to be conducted prior to image
compression. This letter proposes an Encryption-then-Compression system using JPEG …