2021
DOI: 10.1007/s42979-020-00397-4
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Analysis on Image Encryption and Compression Techniques with the Assessment of Performance Evaluation Metrics

Abstract: The explosive generation of data in the digital era directs to the requirements of effective approaches to transmit and store the data. The necessities of security and limited resources have led to the development of image encryption and compression approaches, respectively. The digital contents are transmitted over the internet which may subject to security threats. To overcome these limitations, image encryption approaches are developed. The image compression approaches result in the efficient usage of avail… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 69 publications
(37 reference statements)
0
7
0
Order By: Relevance
“…There are certain differences in the value of each member's work content and contribution to a team. There is no appraisal of the group members' necessity in the scientific research tasks, making it difficult for team managers to provide necessary performance rewards [ 23 , 24 ].…”
Section: Innovation Performance and Construction Of Appraisal Index S...mentioning
confidence: 99%
“…There are certain differences in the value of each member's work content and contribution to a team. There is no appraisal of the group members' necessity in the scientific research tasks, making it difficult for team managers to provide necessary performance rewards [ 23 , 24 ].…”
Section: Innovation Performance and Construction Of Appraisal Index S...mentioning
confidence: 99%
“…Say it is ancient; it is because humans used simple cryptography thousands of years ago, in order to preserve and transmit classi ed political and military information. But the cryptographic ideas and technologies of this period were not so much a science as an art [10] because at this time, when cryptographers design and analyze cryptographic algorithms, they mainly rely on intuition and manual calculations, and there is no strict theory as the basis.…”
Section: Literature Reviewmentioning
confidence: 99%
“…According to Ref. 22, the correlation of the adjacent pixels is calculated as rxy=cov(x,y)D(x)D(y),where cov(x,y)=1Ni=1N(xiE(x))(yiE(y)),D(x)=1Ni=1N(xiE(x))2, E(x)=1Ni=1Nxi,where xi and yi…”
Section: Experimental Results and Analysismentioning
confidence: 99%