咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Novel Image Encryption and Com... 收藏

Novel Image Encryption and Compression Scheme for IoT Environment

作     者:Mesfer Al Duhayyim Fahd N.Al-Wesabi Radwa Marzouk Manar Ahmed Hamza Anwer Mustafa Hilal Majdy M.Eltahir 

作者机构:Department of Natural and Applied SciencesCollege of Community-AflajPrince Sattam bin Abdulaziz UniversitySaudi Arabia Department of Computer ScienceCollege of Science&Art at MahayilKing Khalid UniversitySaudi Arabia Department of Information SystemsCollege of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversitySaudi Arabia Department of Computer and Self DevelopmentPreparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia 

出 版 物:《Computers, Materials & Continua》 (计算机、材料和连续体(英文))

年 卷 期:2022年第71卷第4期

页      面:1443-1457页

核心收录:

学科分类:0809[工学-电子科学与技术(可授工学、理学学位)] 08[工学] 0701[理学-数学] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

基  金:Deanship of Scientific Research at Princess Nourah bint Abdulrahman University Deanship of Scientific Research, King Faisal University, DSR, KFU, (RGP 2/209/42) 

主  题:Data compression image security encryption signcryption optimal key generation 

摘      要:Latest advancements made in the processing abilities of smartdevices have resulted in the designing of Intelligent Internet of Things (IoT)environment. This advanced environment enables the nodes to connect, collect, perceive, and examine useful data from its surroundings. Wireless Multimedia Surveillance Networks (WMSNs) form a vital part in IoT-assistedenvironment since it contains visual sensors that examine the surroundingsfrom a number of overlapping views by capturing the images *** IoT devices generate a massive quantity of digital media, it is thereforerequired to save the media, especially images, in a secure way. In order toachieve security, encryption techniques as well as compression techniques areemployed to reduce the amount of digital data, being communicated overthe network. Encryption Then Compression (ETC) techniques pave a wayfor secure and compact transmission of the available data to prevent unauthorized access. With this background, the current research paper presentsa new ETC technique to accomplish image security in IoT *** proposed model involves three major processes namely, IoT-based imageacquisition, encryption, and compression. The presented model involves optimal Signcryption Technique with Whale Optimization Algorithm (NMWOA)abbreviated as ST-NMWOA. The optimal key generation of signcryptiontechnique takes place with the help of NMWOA. Besides, the presented modelalso uses Discrete Fourier Transform (DFT) and Matrix Minimization (MM)algorithm-based compression technique. Extensive set of experimental analysis was conducted to validate the effective performance of the proposed *** obtained values infer that the presented model is superior in terms of bothcompression efficiency and data secrecy in resource-limited IoT environment.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分