2021
DOI: 10.1007/s11277-021-08800-w
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain Enabled Emperor Penguin Optimizer Based Encryption Technique for Secure Image Management System

Abstract: In recent years, the electronic sharing of digital images faces a major threat to security, as the existing image transmission infrastructure is mainly based on the trust of third parties. At the same time, the available solutions are placed on the cloud based centralized data center, which is expensive, requires large storage area, and security issues regarding the transmission of data over the network. So, it is needed to develop an image management system which enables sharing and storing of digital images … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 28 publications
(29 reference statements)
0
1
0
Order By: Relevance
“…The common utility served by IPFS in these proposals is to store the actual information in the file system and keep the related hash values in the blockchain to sustain the scalability of the network. Apart from hashing techniques, cryptographic strategies are also applied in research works such as in Reference 62. In many of these approaches, the blockchain is chosen to store hash values and user details, to enable a concrete access control mechanism.…”
Section: Related Workmentioning
confidence: 99%
“…The common utility served by IPFS in these proposals is to store the actual information in the file system and keep the related hash values in the blockchain to sustain the scalability of the network. Apart from hashing techniques, cryptographic strategies are also applied in research works such as in Reference 62. In many of these approaches, the blockchain is chosen to store hash values and user details, to enable a concrete access control mechanism.…”
Section: Related Workmentioning
confidence: 99%