Skip Content
You are currently on the new version of our website. Access the old version .

11 Results Found

  • Article
  • Open Access
235 Views
21 Pages

28 December 2025

Encryption-then-compression (EtC) enables secure image processing while retaining coding efficiency. In grayscale-based EtC pipelines with YCbCr transformation and component serialization, reversible data hiding (RDH) becomes challenging because cros...

  • Article
  • Open Access
156 Views
29 Pages

26 January 2026

Encryption-then-compression (EtC) based on block scrambling enables privacy-preserving image sharing while maintaining compatibility with standard image codecs, yet it disrupts the spatial correlations and synchronization cues required by conventiona...

  • Article
  • Open Access

5 February 2026

Grayscale-based Encryption-then-Compression (EtC) systems transform RGB images into the YCbCr color space, concatenate the components into a single grayscale image, and apply block permutation, block rotation/flipping, and block-wise negative–p...

  • Article
  • Open Access
544 Views
35 Pages

Cryptosystem for JPEG Images with Encryption Before and After Lossy Compression

  • Manuel Alejandro Cardona-López,
  • Juan Carlos Chimal-Eguía,
  • Víctor Manuel Silva-García and
  • Rolando Flores-Carapia

31 October 2025

JPEG images are widely used in multimedia transmission, such as on social media platforms, owing to their efficiency for reducing storage and transmission requirements. However, because such images may contain sensitive information, encryption is ess...

  • Article
  • Open Access
3 Citations
2,906 Views
16 Pages

6 December 2021

Nowadays, it remains a major challenge to efficiently compress encrypted images. In this paper, we propose a novel encryption-then-compression (ETC) scheme to enhance the performance of lossy compression on encrypted gray images through heuristic opt...

  • Article
  • Open Access
1 Citations
2,717 Views
15 Pages

PP-JPEG: A Privacy-Preserving JPEG Image-Tampering Localization

  • Riyanka Jena,
  • Priyanka Singh and
  • Manoranjan Mohanty

27 August 2023

The widespread availability of digital image-processing software has given rise to various forms of image manipulation and forgery, which can pose a significant challenge in different fields, such as law enforcement, journalism, etc. It can also lead...

  • Article
  • Open Access
3 Citations
3,124 Views
25 Pages

A Chaotic Compressive Sensing Based Data Transmission Method for Sensors within BBNs

  • Wei Wu,
  • Haipeng Peng,
  • Fenghua Tong,
  • Lixiang Li and
  • Binzhu Xie

7 August 2022

Body to body networks (BBNs) are a kind of large-scaled sensor network that are composed of several wireless body area networks (WBANs) in the distributed structure, and in recent decades, BBNs have played a key role in medical, aerospace, and milita...

  • Article
  • Open Access
19 Citations
4,850 Views
21 Pages

Adaptive Digital Hologram Binarization Method Based on Local Thresholding, Block Division and Error Diffusion

  • Pavel A. Cheremkhin,
  • Ekaterina A. Kurbatova,
  • Nikolay N. Evtikhiev,
  • Vitaly V. Krasnov,
  • Vladislav G. Rodin and
  • Rostislav S. Starikov

18 January 2022

High-speed optical reconstruction of 3D-scenes can be achieved using digital holography with binary digital micromirror devices (DMD) or a ferroelectric spatial light modulator (fSLM). There are many algorithms for binarizing digital holograms. The m...

  • Article
  • Open Access
1 Citations
1,971 Views
19 Pages

For confidential and sensitive electronic documents within enterprises and organizations, failure to conduct proper checks before sending can easily lead to incidents such as security degradation. Sensitive information transmission has become one of...

  • Article
  • Open Access
8 Citations
4,372 Views
33 Pages

5 May 2019

In this paper, we propose a new theoretical security model for Shannon cipher systems under side-channel attacks, where the adversary is not only allowed to collect ciphertexts by eavesdropping the public communication channel but is also allowed to...

  • Article
  • Open Access
34 Citations
4,178 Views
30 Pages

Efficient Biomedical Signal Security Algorithm for Smart Internet of Medical Things (IoMTs) Applications

  • Achraf Daoui,
  • Mohamed Yamni,
  • Hicham Karmouni,
  • Mhamed Sayyouri,
  • Hassan Qjidaa,
  • Saad Motahhir,
  • Ouazzani Jamil,
  • Walid El-Shafai,
  • Abeer D. Algarni and
  • Moustafa H. Aly
  • + 1 author

23 November 2022

Due to the rapid development of information and emerging communication technologies, developing and implementing solutions in the Internet of Medical Things (IoMTs) field have become relevant. This work developed a novel data security algorithm for d...