2022
DOI: 10.1007/s11042-022-12169-8
|View full text |Cite
|
Sign up to set email alerts
|

An efficient image encryption technique based on two-level security for internet of things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
27
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 40 publications
(28 citation statements)
references
References 35 publications
1
27
0
Order By: Relevance
“…An unauthorized user cannot get identity of authorized user because PKG saves the identity of a user in Lagrange polynomial equation form which is computationally hard for an outsider to crack and get original identity [45]. When Bob sends his identity to Alice in midway of network, an attacker cannot get the identity because they share these identities using secure socket connection (SSL) [35][36][37][38].…”
Section: Algorithmmentioning
confidence: 99%
“…An unauthorized user cannot get identity of authorized user because PKG saves the identity of a user in Lagrange polynomial equation form which is computationally hard for an outsider to crack and get original identity [45]. When Bob sends his identity to Alice in midway of network, an attacker cannot get the identity because they share these identities using secure socket connection (SSL) [35][36][37][38].…”
Section: Algorithmmentioning
confidence: 99%
“…In [ 19 ], a role-based encryption (RBE) paradigm, which integrated cryptographic approaches with a system known as role-based access control (RBAC), to protect sensitive information (RBAC) was suggested. On the basis of this approach, a secure RBE is provided which is based on hybrid cloud storage planning and provides an organization with the ability to store data safely in the public cloud while simultaneously maintaining the confidentiality of the company's information in a private cloud environment [ 30 ].…”
Section: Related Workmentioning
confidence: 99%
“…When measuring symmetrical blood flow between the left and right cerebral hemispheres, the Brain Symmetry Index (BSI) uses Fast Fourier Transform (FFT) coefficients, for example. Between zero and one, the symmetry index is measured, with one reflecting the highest imbalance in blood flow [ 23 ]. It is well known that the Traditional Fourier Transform (TFT) has limitations in the study of nonlinear and nonstationary signals.…”
Section: Background Analysismentioning
confidence: 99%