Security and privacy in device-to-device (D2D) communication: A review
Device-to-device (D2D) communication presents a new paradigm in mobile networking to
facilitate data exchange between physically proximate devices. The development of D2D is …
facilitate data exchange between physically proximate devices. The development of D2D is …
Survey of security advances in smart grid: A data driven approach
With the integration of advanced computing and communication technologies, smart grid is
considered as the next-generation power system, which promises self healing, resilience …
considered as the next-generation power system, which promises self healing, resilience …
Encryption-then-compression systems using grayscale-based image encryption for JPEG images
T Chuman, W Sirichotedumrong… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
A block scrambling-based encryption scheme is presented to enhance the security of
Encryption-then-Compression (EtC) systems with JPEG compression, which allow us to …
Encryption-then-Compression (EtC) systems with JPEG compression, which allow us to …
[PDF][PDF] An overview of compressible and learnable image transformation with secret key and its applications
H Kiya, APM Maung, Y Kinoshita… - … on Signal and …, 2022 - nowpublishers.com
This article presents an overview of image transformation with a secret key and its
applications. Image transformation with a secret key enables us not only to protect visual …
applications. Image transformation with a secret key enables us not only to protect visual …
A survey on socially aware device-to-device communications
Device-to-device (D2D) communication is continuously evolving and engulfing a wide
diversity of proximate services and applications, which is considered as one of the key …
diversity of proximate services and applications, which is considered as one of the key …
Image to perturbation: An image transformation network for generating visually protected images for privacy-preserving deep neural networks
We propose a novel image transformation network for generating visually protected images
for privacy-preserving deep neural networks (DNNs). The proposed transformation network …
for privacy-preserving deep neural networks (DNNs). The proposed transformation network …
Grayscale-based block scrambling image encryption using ycbcr color space for encryption-then-compression systems
W Sirichotedumrong, H Kiya - APSIPA Transactions on Signal and …, 2019 - cambridge.org
A novel grayscale-based block scrambling image encryption scheme is presented not only
to enhance security, but also to improve the compression performance for Encryption-then …
to enhance security, but also to improve the compression performance for Encryption-then …
An encryption-then-compression system for jpeg/motion jpeg standard
K Kurihara, M Kikuchi, S Imaizumi… - IEICE Transactions on …, 2015 - search.ieice.org
In many multimedia applications, image encryption has to be conducted prior to image
compression. This paper proposes a JPEG-friendly perceptual encryption method, which …
compression. This paper proposes a JPEG-friendly perceptual encryption method, which …
An encryption-then-compression system for jpeg standard
In many multimedia applications, image encryption has to be conducted prior to image
compression. This paper proposes an Encryption-then-Compression system using a JPEG …
compression. This paper proposes an Encryption-then-Compression system using a JPEG …
An encryption-then-compression system for lossless image compression standards
K Kurihara, S Imaizumi, S Shiota… - IEICE transactions on …, 2017 - search.ieice.org
In many multimedia applications, image encryption has to be conducted prior to image
compression. This letter proposes an Encryption-then-Compression system using JPEG …
compression. This letter proposes an Encryption-then-Compression system using JPEG …