Shafiq et al., 2025 - Google Patents
EPVCNet: Enhancing privacy and security for image authentication in computing-sensitive 6G environmentShafiq et al., 2025
View HTML- Document ID
- 8415651765497188273
- Author
- Shafiq M
- Ren L
- Zhang D
- Gadekallu T
- Alam M
- Publication year
- Publication venue
- Digital Communications and Networks
External Links
Snippet
As the 5G architecture gains momentum, interest in 6G is growing. The proliferation of Internet of Things (IoT) devices, capable of capturing sensitive images, has increased the need for secure transmission and robust access control mechanisms. The vast amount of …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogramme communication; Intertask communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kakkad et al. | Biometric authentication and image encryption for image security in cloud framework | |
Meden et al. | Privacy–enhancing face biometrics: A comprehensive survey | |
Kiya et al. | An overview of compressible and learnable image transformation with secret key and its applications | |
Rao et al. | A Secured Cloud Architecture for Storing Image Data using Steganography | |
Shen et al. | Optical selective encryption based on the FRFCM algorithm and face biometric for the medical image | |
Xu et al. | CGIR: Conditional generative instance reconstruction attacks against federated learning | |
Kaur et al. | Image steganography for securing secret data using hybrid hiding model | |
Rajput et al. | Privacy-preserving human action recognition as a remote cloud service using RGB-D sensors and deep CNN | |
Madhu et al. | An overview of image security techiques | |
Shawkat et al. | A proposed model for text and image encryption using different techniques | |
Ganapathi et al. | Handbook of research on machine and deep learning applications for cyber security | |
Wang et al. | TPE-ISE: approximate thumbnail preserving encryption based on multilevel DWT information self-embedding | |
Maekawa et al. | Privacy-preserving svm computing in the encrypted domain | |
Singh et al. | Images as graphical password: verification and analysis using non-regular low-density parity check coding | |
Jasmine et al. | A privacy preserving based multi-biometric system for secure identification in cloud environment | |
Bachiphale et al. | Optimal multisecret image sharing using lightweight visual sign-cryptography scheme with optimal key generation for gray/color images | |
Chaker et al. | Color image encryption system based fractional hyperchaotic, fibonacci matrix and quaternion algebra | |
Ross et al. | Visual cryptography for face privacy | |
Bian et al. | Verifiable privacy-enhanced rotation invariant LBP feature extraction in fog computing | |
Ren et al. | Toward privacy protection of sensed biometric features with extended visual cryptography | |
Jang et al. | Unveiling hidden visual information: A reconstruction attack against adversarial visual information hiding | |
Eldawy et al. | A robust cancellable face and palmprint recognition system based on 3D optical chaos-DNA cryptosystem | |
Ligier et al. | Information leakage analysis of inner-product functional encryption based data classification | |
Saini et al. | An intelligent and efficient CNN-AES framework for image block encryption with a multi-key approach | |
Ren et al. | A new data model for the privacy protection of medical images |