Journal articles on the topic 'Data encryption (Computer science) Image compression'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Data encryption (Computer science) Image compression.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Ahmed, Mahmood Ali, and Khamees Khalaf Hasan. "Data Compression and Encryption for Remote Sensor Networks Using Different Techniques Methods." Journal of Cases on Information Technology 23, no. 2 (April 2021): 39–49. http://dx.doi.org/10.4018/jcit.20210401.oa4.
Full textHuang, Bin, Chun Wan, and Kaimeng Chen. "High-Capacity Reversible Data Hiding in Encrypted Images Based on Adaptive Predictor and Compression of Prediction Errors." Mathematics 9, no. 17 (September 5, 2021): 2166. http://dx.doi.org/10.3390/math9172166.
Full textGa, H., and W. Zeng. "Image compression and encryption based on wavelet transform and chaos." Computer Optics 43, no. 2 (April 2019): 258–63. http://dx.doi.org/10.18287/2412-6179-2019-43-2-258-263.
Full textMehta, Garima, Malay Kishore Dutta, and Pyung Soo Kim. "An Efficient and Lossless Cryptosystem for Security in Tele-Ophthalmology Applications Using Chaotic Theory." International Journal of E-Health and Medical Communications 7, no. 4 (October 2016): 28–47. http://dx.doi.org/10.4018/ijehmc.2016100102.
Full textPrasad, Bhagwati, and Kunti Mishra. "A Combined Encryption Compression Scheme Using Chaotic Maps." Cybernetics and Information Technologies 13, no. 2 (June 1, 2013): 75–81. http://dx.doi.org/10.2478/cait-2013-0016.
Full textDengre, Amit, and A. D. Gawande. "Audio Encryption and Digital Image Watermarking in an Uncompress Video." International Journal of Advances in Applied Sciences 4, no. 2 (June 1, 2015): 66. http://dx.doi.org/10.11591/ijaas.v4.i2.pp66-72.
Full textTütüncü, Kemal, and Özcan Çataltaş. "Compensation of degradation, security, and capacity of LSB substitution methods by a new proposed hybrid n-LSB approach." Computer Science and Information Systems, no. 00 (2021): 48. http://dx.doi.org/10.2298/csis210227048t.
Full textTu, Rongxin, Wenying Wen, and Changsheng Hua. "An Unequal Image Privacy Protection Method Based on Saliency Detection." Security and Communication Networks 2020 (December 3, 2020): 1–13. http://dx.doi.org/10.1155/2020/8842376.
Full textWang, Jijun, and Soo Fun Tan. "Separable Reversible Data Hiding in Encryption Image with Two-Tuples Coding." Computers 10, no. 7 (July 7, 2021): 86. http://dx.doi.org/10.3390/computers10070086.
Full textGoldberg, Mark A. "Image data compression." Journal of Digital Imaging 11, S1 (August 1998): 230–32. http://dx.doi.org/10.1007/bf03168323.
Full textGoldberg, Mark A. "Image data compression." Journal of Digital Imaging 10, S1 (August 1997): 9–11. http://dx.doi.org/10.1007/bf03168640.
Full textLi, Peiya, and Kwok-Tung Lo. "A Content-Adaptive Joint Image Compression and Encryption Scheme." IEEE Transactions on Multimedia 20, no. 8 (August 2018): 1960–72. http://dx.doi.org/10.1109/tmm.2017.2786860.
Full textTan, Yanli, and Yongqiang Zhao. "Digital Watermarking Image Compression Method Based on Symmetric Encryption Algorithms." Symmetry 11, no. 12 (December 11, 2019): 1505. http://dx.doi.org/10.3390/sym11121505.
Full textSaidhbi, Sheik. "An Intelligent Multimedia Data Encryption and Compression and Secure Data Transmission of Public Cloud." Asian Journal of Engineering and Applied Technology 8, no. 2 (May 5, 2019): 37–40. http://dx.doi.org/10.51983/ajeat-2019.8.2.1141.
Full textNaseer, Yasir, Tariq Shah, Attaullah, and Adnan Javeed. "Advance image encryption technique utilizing compression, dynamical system and S-boxes." Mathematics and Computers in Simulation 178 (December 2020): 207–17. http://dx.doi.org/10.1016/j.matcom.2020.06.007.
Full textSiddeq, Mohammed M., and Marcos A. Rodrigues. "A novel Hexa data encoding method for 2D image crypto-compression." Multimedia Tools and Applications 79, no. 9-10 (December 12, 2019): 6045–59. http://dx.doi.org/10.1007/s11042-019-08405-3.
Full textFerdush, Jannatul, Mahbuba Begum, and Mohammad Shorif Uddin. "Chaotic Lightweight Cryptosystem for Image Encryption." Advances in Multimedia 2021 (May 22, 2021): 1–16. http://dx.doi.org/10.1155/2021/5527295.
Full textXu, Dawen. "Commutative Encryption and Data Hiding in HEVC Video Compression." IEEE Access 7 (2019): 66028–41. http://dx.doi.org/10.1109/access.2019.2916484.
Full textGschwandtner, Michael, Andreas Uhl, and Peter Wild. "Transmission Error and Compression Robustness of 2D Chaotic Map Image Encryption Schemes." EURASIP Journal on Information Security 2007 (2007): 1–16. http://dx.doi.org/10.1155/2007/48179.
Full textQiu, Shi, Ying Cui, and XianJia Meng. "A Data Encryption and Fast Transmission Algorithm Based on Surveillance Video." Wireless Communications and Mobile Computing 2020 (August 5, 2020): 1–12. http://dx.doi.org/10.1155/2020/8842412.
Full textZhang, Miao, Xiao-Jun Tong, Jie Liu, Zhu Wang, Jinlong Liu, Baolong Liu, and Jing Ma. "Image Compression and Encryption Scheme Based on Compressive Sensing and Fourier Transform." IEEE Access 8 (2020): 40838–49. http://dx.doi.org/10.1109/access.2020.2976798.
Full textDong, Hao, Enjian Bai, Xue-Qin Jiang, and Yun Wu. "Color Image Compression-Encryption Using Fractional-Order Hyperchaotic System and DNA Coding." IEEE Access 8 (2020): 163524–40. http://dx.doi.org/10.1109/access.2020.3022398.
Full textYang, Feifei, Jun Mou, Kehui Sun, Yinghong Cao, and Jiyu Jin. "Color Image Compression-Encryption Algorithm Based on Fractional-Order Memristor Chaotic Circuit." IEEE Access 7 (2019): 58751–63. http://dx.doi.org/10.1109/access.2019.2914722.
Full textMurtagh, F., M. Louys, J. L. Starck, and F. Bonnarel. "Compression of grayscale scientific and medical image data." Data Science Journal 1 (2002): 111–27. http://dx.doi.org/10.2481/dsj.1.111.
Full textSingh, A. K., S. Thakur, Alireza Jolfaei, Gautam Srivastava, MD Elhoseny, and A. Mohan. "Joint Encryption and Compression-Based Watermarking Technique for Security of Digital Documents." ACM Transactions on Internet Technology 21, no. 1 (February 2021): 1–20. http://dx.doi.org/10.1145/3414474.
Full textYang, Tingting, Yangyang Li, Chengzhe Lai, Jie Dong, and Minghua Xia. "The Improved Hill Encryption Algorithm towards the Unmanned Surface Vessel Video Monitoring System Based on Internet of Things Technology." Wireless Communications and Mobile Computing 2018 (October 3, 2018): 1–11. http://dx.doi.org/10.1155/2018/5183451.
Full textAlrikabi, Haider Th Salim, and Hussein Tuama Hazim. "Enhanced Data Security of Communication System Using Combined Encryption and Steganography." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 16 (August 23, 2021): 144. http://dx.doi.org/10.3991/ijim.v15i16.24557.
Full textHu, Haiying, Yinghong Cao, Ji Xu, Chenguang Ma, and Huizhen Yan. "An Image Compression and Encryption Algorithm Based on the Fractional-Order Simplest Chaotic Circuit." IEEE Access 9 (2021): 22141–55. http://dx.doi.org/10.1109/access.2021.3054842.
Full textKhaleel, Shahbaa. "Image Compression Using Swarm Intelligence." International Journal of Intelligent Engineering and Systems 14, no. 1 (February 28, 2021): 257–69. http://dx.doi.org/10.22266/ijies2021.0228.25.
Full textWang, Xu, Li-Yao Li, Ching-Chun Chang, and Chih-Cheng Chen. "High-Capacity Reversible Data Hiding in Encrypted Images Based on Prediction Error Compression and Block Selection." Security and Communication Networks 2021 (June 30, 2021): 1–12. http://dx.doi.org/10.1155/2021/9606116.
Full textKim, Jungwon, and Jeffrey S. Vetter. "Implementing efficient data compression and encryption in a persistent key-value store for HPC." International Journal of High Performance Computing Applications 33, no. 6 (May 23, 2019): 1098–112. http://dx.doi.org/10.1177/1094342019847264.
Full textSingh, K. John, and R. Jayanthi. "Image encryption techniques for data transmission in networks: a survey." International Journal of Advanced Intelligence Paradigms 12, no. 1/2 (2019): 178. http://dx.doi.org/10.1504/ijaip.2019.10017748.
Full textLi, Xinyan, Di Xiao, Huajian Mou, Dianjun Lu, and Mei Peng. "A Compressive Sensing Based Image Encryption and Compression Algorithm With Identity Authentication and Blind Signcryption." IEEE Access 8 (2020): 211676–90. http://dx.doi.org/10.1109/access.2020.3039643.
Full textWang, Zhongpeng. "Secure Image Transmission in Wireless OFDM Systems Using Secure Block Compression-Encryption and Symbol Scrambling." IEEE Access 7 (2019): 126985–97. http://dx.doi.org/10.1109/access.2019.2939266.
Full textWang, Wei, Dongming Peng, Honggang Wang, Hamid Sharif, and Hsiao-Hwa Chen. "Energy-Constrained Quality Optimization for Secure Image Transmission in Wireless Sensor Networks." Advances in Multimedia 2007 (2007): 1–9. http://dx.doi.org/10.1155/2007/25187.
Full textKhlif, Naziha, Ahmed Ghorbel, Walid Aydi, and Nouri Masmoudi. "Generation of Chaotic Signal for Scrambling Matrix Content." International Arab Journal of Information Technology 17, no. 4 (July 1, 2020): 548–53. http://dx.doi.org/10.34028/iajit/17/4/13.
Full textNagm, Ahmad, and Mohammed Safy Elwan. "Protection of the patient data against intentional attacks using a hybrid robust watermarking code." PeerJ Computer Science 7 (March 22, 2021): e400. http://dx.doi.org/10.7717/peerj-cs.400.
Full textWang, Zhou, and Yinglin Yu. "Dynamic fractal transform with applications to image data compression." Journal of Computer Science and Technology 12, no. 3 (May 1997): 202–9. http://dx.doi.org/10.1007/bf02948970.
Full textRatan, Ram, and Arvind Yadav. "Security Analysis of Bit plane Level Image Encryption Schemes." Defence Science Journal 71, no. 2 (March 10, 2021): 209–21. http://dx.doi.org/10.14429/dsj.71.15643.
Full textKamal, Ahmed, Esam Hagras, and H. A. El-Kamchochi. "Dynamic fractional chaotic biometric isomorphic elliptic curve for partial image encryption." Computer Science and Information Systems 18, no. 3 (2021): 1057–76. http://dx.doi.org/10.2298/csis200502018k.
Full textSi, Zhuang-hao, Wei Wei, Bi-song Li, and Wei-jie Feng. "Analysis of DNA Image Encryption Effect by Logistic‐Sine System Combined with Fractional Chaos Stability Theory." Journal of Imaging Science and Technology 64, no. 4 (July 1, 2020): 40413–1. http://dx.doi.org/10.2352/j.imagingsci.technol.2020.64.4.040413.
Full textSaad, Abdul-Malik H. Y., and Mohd Z. Abdullah. "High-Speed Fractal Image Compression Featuring Deep Data Pipelining Strategy." IEEE Access 6 (2018): 71389–403. http://dx.doi.org/10.1109/access.2018.2880480.
Full textWilkinson, M. H. F. "A simple data compression scheme for binary images of bacteria compared with commonly used image data compression schemes." Computer Methods and Programs in Biomedicine 42, no. 4 (April 1994): 255–62. http://dx.doi.org/10.1016/0169-2607(94)90097-3.
Full textCao, Xinyue, Zhangjie Fu, and Xingming Sun. "A Privacy-Preserving Outsourcing Data Storage Scheme with Fragile Digital Watermarking-Based Data Auditing." Journal of Electrical and Computer Engineering 2016 (2016): 1–7. http://dx.doi.org/10.1155/2016/3219042.
Full textRezk, Ahmed A., Ahmed H. Madian, Ahmed G. Radwan, and Ahmed M. Soliman. "On-the-Fly Parallel Processing IP-Core for Image Blur Detection, Compression, and Chaotic Encryption Based on FPGA." IEEE Access 9 (2021): 82726–46. http://dx.doi.org/10.1109/access.2021.3086044.
Full textShahmohammadi Beni, Mehrdad, Hiroshi Watabe, and Kwan Ngok Yu. "SecureVision: An Open-Source User-Customizable Image Encryption Program." Applied Sciences 11, no. 17 (August 27, 2021): 7915. http://dx.doi.org/10.3390/app11177915.
Full textGafsi, Mohamed, Nessrine Abbassi, Mohamed Ali Hajjaji, Jihene Malek, and Abdellatif Mtibaa. "Improved Chaos-Based Cryptosystem for Medical Image Encryption and Decryption." Scientific Programming 2020 (December 17, 2020): 1–22. http://dx.doi.org/10.1155/2020/6612390.
Full textKochańska, Paula Adrianna, and Michal Makowski. "Compression of computer-generated holograms in image projection." Photonics Letters of Poland 9, no. 2 (July 1, 2017): 60. http://dx.doi.org/10.4302/plp.v9i2.719.
Full textDu, Anyu, Liejun Wang, Shuli Cheng, and Naixiang Ao. "A Privacy-Protected Image Retrieval Scheme for Fast and Secure Image Search." Symmetry 12, no. 2 (February 14, 2020): 282. http://dx.doi.org/10.3390/sym12020282.
Full textShukla, Awdhesh Kumar, Awdhesh K. Shukla, Balvinder Singh, and Amod Kumar. "A Secure and High-Capacity Data-Hiding Method Using Compression, Encryption and Optimized Pixel Value Differencing." IEEE Access 6 (2018): 51130–39. http://dx.doi.org/10.1109/access.2018.2868192.
Full text