2022
DOI: 10.1155/2022/7745132
|View full text |Cite
|
Sign up to set email alerts
|

Multi-Chaos-Based Lightweight Image Encryption-Compression for Secure Occupancy Monitoring

Abstract: With the advancement of camera and wireless technologies, surveillance camera-based occupancy has received ample attention from the research community. However, camera-based occupancy monitoring and wireless channels, especially Wi-Fi hotspot, pose serious privacy concerns and cybersecurity threats. Eavesdroppers can easily access confidential multimedia information and the privacy of individuals can be compromised. As a solution, novel encryption techniques for the multimedia data concealing have been propose… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 41 publications
0
3
0
Order By: Relevance
“…The first part of the chaotic system produces random 6dimensional numbers (Key1, Key2,... Key6) in each part of the chaotic system. Thus, the excessive change is done by making the 6-D key a chaotic structure with six positive values for Lyapunov, as shown in equations (2-7) from [23].…”
Section: Proposed Chaos Keys Generator Using Extended Lorenzmentioning
confidence: 99%
See 2 more Smart Citations
“…The first part of the chaotic system produces random 6dimensional numbers (Key1, Key2,... Key6) in each part of the chaotic system. Thus, the excessive change is done by making the 6-D key a chaotic structure with six positive values for Lyapunov, as shown in equations (2-7) from [23].…”
Section: Proposed Chaos Keys Generator Using Extended Lorenzmentioning
confidence: 99%
“…The behavior is chaotic and cannot be determined quantitatively. That is, chaos would occur when λ >0 , jth LE is equal [24][25]: 1), (b = 8/3 and σ = 10 for all subfigures,) , First 6-D keys from [19] is illustrated in equations (2)(3)(4)(5)(6)(7). :…”
Section: Proposed Chaos Keys Generator Using Extended Lorenzmentioning
confidence: 99%
See 1 more Smart Citation
“…It is important to say that contrast measures the differences between neighboring points. Moreover, it is expected to have high values [43], which indicates high-quality encryption.…”
Section: Energy Contrast and Homogeneitymentioning
confidence: 99%
“…For the additive noise, an integer τ c (x, y) is chosen randomly for each point and color. The discrete value f dc (x, y) is calculated according to Equation (43); subsequently, f c (x, y) is changed by the discrete value of f dc (x, y).…”
Section: The Additive and Multiplicative Noisesmentioning
confidence: 99%