Learn More
With the current emergence of biometric image data applications on devices such as smart phones, security cameras, personal computers etc, there is a need for securing the image templates obtained from crime scenes as well as such devices before storing them in locations such as the cloud etc. In this paper, we proposed an encryption technique of securing(More)
Medical images stored in health information systems, cloud or other systems are of key importance. Privacy and security needs to be guaranteed for such images through encryption and authentication processes. Encrypted and watermarked images in this domain needed to be reversible so that the plain image operated on in the encryption and watermarking process(More)
This paper proposed a new algorithm for digital image encryption. The proposed algorithm encrypts an mxn size image by using the set of array pixel values. At the end, plain images will be encrypted using the algorithm and analysis will be performed on the ciphered images to determine the efficiency of the algorithm in ciphering the image. The algorithm(More)
Security of digital images in today's cyber is a major concern. Transmission of compressed and uncompressed multimedia data is necessary for communication between different devices. Devices of different screen features and resolution need very efficient and fast compression techniques in order to maintain visual features of transmitted media. Robustness is(More)
The high increase in the transmission of digital data over secured and unsecured communications channels poses a lot of security and privacy concerns to both the transmitter and the receiver. Many operations engaged today in urban and warfare, be they for construction, monitory of plants, high voltage lines, military, police, fire service, intelligence etc.(More)
With the increase in structural complexities in modern cities, many operations, be they military, police, fire service, intelligence, rescue, or other field operations, require localization services and online situation awareness to make them effective. The digital data collected from such systems are sensitive hence security concerns regarding the(More)