2010 International Conference on Communication Control and Computing Technologies 2010
DOI: 10.1109/icccct.2010.5670766
|View full text |Cite
|
Sign up to set email alerts
|

Image Encryption for mobile devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…Many studies and research have been conducted in the last decade due to the importance of picture encryption methods in the process of enhancing security, and the urgent need for them has arisen since the growth of the Android environment; therefore, in this section, we will examine some research in the field of encryption. In this paper, authors [5], Presented a method for encoding images using "elliptic curve coding" methodology. The applied technique uses an effective approach to address image coding issues, with the original image represented as a collection of pieces that produced a two-dimensional image on the coordinates where the ECC system was employed.…”
Section: Survey Of Literaturementioning
confidence: 99%
“…Many studies and research have been conducted in the last decade due to the importance of picture encryption methods in the process of enhancing security, and the urgent need for them has arisen since the growth of the Android environment; therefore, in this section, we will examine some research in the field of encryption. In this paper, authors [5], Presented a method for encoding images using "elliptic curve coding" methodology. The applied technique uses an effective approach to address image coding issues, with the original image represented as a collection of pieces that produced a two-dimensional image on the coordinates where the ECC system was employed.…”
Section: Survey Of Literaturementioning
confidence: 99%
“…Miller and Koblitz proposed in 2010 a method for encoding images for mobile devices using the publickey (Elliptic Curve Cryptography (ECC) algorithm for encryption [10]. This algorithm has been implemented as a way to solve problems related to image encryption, which can be used to ensure the protection of images in mobile devices .…”
Section: Introductionmentioning
confidence: 99%
“…In the recent decades, some researches related to protecting privacy information for mobile services on different techniques, such as the redesign of the architecture of network [6], the non-interactive privacy-preserving protocol for image similarity computation [7], the data sharing protocol by using a new cryptographic primitive named online/offline attribute-based proxy re-encryption, and the transform key technique [8], have been developed. Also, some encryption methods based on cryptography, such as homomorphic encryption [9], elliptic curve cryptography based encryption [10] and chaotic oscillation theory-based encryption [11,12], were designed and applied to provide the confidentiality of patients' health information.…”
Section: Introductionmentioning
confidence: 99%