Novel Image Encryption and Compression Scheme for IoT Environment  

在线阅读下载全文

作  者:Mesfer Al Duhayyim Fahd N.Al-Wesabi Radwa Marzouk Manar Ahmed Hamza Anwer Mustafa Hilal Majdy M.Eltahir 

机构地区:[1]Department of Natural and Applied Sciences,College of Community-Aflaj,Prince Sattam bin Abdulaziz University,Saudi Arabia [2]Department of Computer Science,College of Science&Art at Mahayil,King Khalid University,Saudi Arabia [3]Department of Information Systems,College of Computer and Information Sciences,Princess Nourah bint Abdulrahman University,Saudi Arabia [4]Department of Computer and Self Development,Preparatory Year Deanship,Prince Sattam bin Abdulaziz University,AlKharj,Saudi Arabia

出  处:《Computers, Materials & Continua》2022年第4期1443-1457,共15页计算机、材料和连续体(英文)

摘  要:Latest advancements made in the processing abilities of smartdevices have resulted in the designing of Intelligent Internet of Things (IoT)environment. This advanced environment enables the nodes to connect, collect, perceive, and examine useful data from its surroundings. Wireless Multimedia Surveillance Networks (WMSNs) form a vital part in IoT-assistedenvironment since it contains visual sensors that examine the surroundingsfrom a number of overlapping views by capturing the images incessantly.Since IoT devices generate a massive quantity of digital media, it is thereforerequired to save the media, especially images, in a secure way. In order toachieve security, encryption techniques as well as compression techniques areemployed to reduce the amount of digital data, being communicated overthe network. Encryption Then Compression (ETC) techniques pave a wayfor secure and compact transmission of the available data to prevent unauthorized access. With this background, the current research paper presentsa new ETC technique to accomplish image security in IoT environment.The proposed model involves three major processes namely, IoT-based imageacquisition, encryption, and compression. The presented model involves optimal Signcryption Technique with Whale Optimization Algorithm (NMWOA)abbreviated as ST-NMWOA. The optimal key generation of signcryptiontechnique takes place with the help of NMWOA. Besides, the presented modelalso uses Discrete Fourier Transform (DFT) and Matrix Minimization (MM)algorithm-based compression technique. Extensive set of experimental analysis was conducted to validate the effective performance of the proposed model.The obtained values infer that the presented model is superior in terms of bothcompression efficiency and data secrecy in resource-limited IoT environment.

关 键 词:Data compression image security ENCRYPTION SIGNCRYPTION optimal key generation 

分 类 号:TP309.7[自动化与计算机技术—计算机系统结构]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象