{"id":"https://openalex.org/W4400727836","doi":"https://doi.org/10.1109/iwcmc61514.2024.10592572","title":"Lightweight Image Crypto-Compression Using Haar Transform and Selective Encryption for Grayscale IoT Images","display_name":"Lightweight Image Crypto-Compression Using Haar Transform and Selective Encryption for Grayscale IoT Images","publication_year":2024,"publication_date":"2024-05-27","ids":{"openalex":"https://openalex.org/W4400727836","doi":"https://doi.org/10.1109/iwcmc61514.2024.10592572"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc61514.2024.10592572","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iwcmc61514.2024.10592572","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054228684","display_name":"Joseph Azar","orcid":"https://orcid.org/0000-0002-4068-2996"},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"government","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I2802759292","display_name":"Franche-Comt\u00e9 \u00c9lectronique M\u00e9canique Thermique et Optique - Sciences et Technologies","ror":"https://ror.org/004fmxv66","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I2802759292","https://openalex.org/I37553959","https://openalex.org/I4210095849","https://openalex.org/I4405256580","https://openalex.org/I53262699"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Joseph Azar","raw_affiliation_strings":["Univ. Franche-Comt&#x00E9; (UFC),FEMTO-ST Institute, CNRS,Belfort,France"],"affiliations":[{"raw_affiliation_string":"Univ. Franche-Comt&#x00E9; (UFC),FEMTO-ST Institute, CNRS,Belfort,France","institution_ids":["https://openalex.org/I2802759292","https://openalex.org/I1294671590"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048673395","display_name":"Hassan Noura","orcid":"https://orcid.org/0000-0002-2589-5053"},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"government","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I2802759292","display_name":"Franche-Comt\u00e9 \u00c9lectronique M\u00e9canique Thermique et Optique - Sciences et Technologies","ror":"https://ror.org/004fmxv66","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I2802759292","https://openalex.org/I37553959","https://openalex.org/I4210095849","https://openalex.org/I4405256580","https://openalex.org/I53262699"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Hassan Noura","raw_affiliation_strings":["Univ. Franche-Comt&#x00E9; (UFC),FEMTO-ST Institute, CNRS,Belfort,France"],"affiliations":[{"raw_affiliation_string":"Univ. Franche-Comt&#x00E9; (UFC),FEMTO-ST Institute, CNRS,Belfort,France","institution_ids":["https://openalex.org/I2802759292","https://openalex.org/I1294671590"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031503129","display_name":"Rapha\u00ebl Couturier","orcid":"https://orcid.org/0000-0003-1490-9592"},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"government","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I2802759292","display_name":"Franche-Comt\u00e9 \u00c9lectronique M\u00e9canique Thermique et Optique - Sciences et Technologies","ror":"https://ror.org/004fmxv66","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I2802759292","https://openalex.org/I37553959","https://openalex.org/I4210095849","https://openalex.org/I4405256580","https://openalex.org/I53262699"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Raphael Couturier","raw_affiliation_strings":["Univ. Franche-Comt&#x00E9; (UFC),FEMTO-ST Institute, CNRS,Belfort,France"],"affiliations":[{"raw_affiliation_string":"Univ. Franche-Comt&#x00E9; (UFC),FEMTO-ST Institute, CNRS,Belfort,France","institution_ids":["https://openalex.org/I2802759292","https://openalex.org/I1294671590"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5054228684"],"corresponding_institution_ids":["https://openalex.org/I1294671590","https://openalex.org/I2802759292"],"apc_list":null,"apc_paid":null,"fwci":0.2616,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.50814592,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"2","issue":null,"first_page":"969","last_page":"974"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9545999765396118,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/grayscale","display_name":"Grayscale","score":0.8882699012756348},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7426228523254395},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7052048444747925},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.5691481828689575},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5247331261634827},{"id":"https://openalex.org/keywords/compression","display_name":"Compression (physics)","score":0.496568500995636},{"id":"https://openalex.org/keywords/image-compression","display_name":"Image compression","score":0.472780704498291},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4670744240283966},{"id":"https://openalex.org/keywords/transform-coding","display_name":"Transform coding","score":0.44888627529144287},{"id":"https://openalex.org/keywords/computer-graphics","display_name":"Computer graphics (images)","score":0.3646056652069092},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.24687984585762024},{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.17630985379219055},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1502440869808197},{"id":"https://openalex.org/keywords/materials-science","display_name":"Materials science","score":0.11023345589637756}],"concepts":[{"id":"https://openalex.org/C78201319","wikidata":"https://www.wikidata.org/wiki/Q685727","display_name":"Grayscale","level":3,"score":0.8882699012756348},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7426228523254395},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7052048444747925},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.5691481828689575},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5247331261634827},{"id":"https://openalex.org/C180016635","wikidata":"https://www.wikidata.org/wiki/Q2712821","display_name":"Compression (physics)","level":2,"score":0.496568500995636},{"id":"https://openalex.org/C13481523","wikidata":"https://www.wikidata.org/wiki/Q412438","display_name":"Image compression","level":4,"score":0.472780704498291},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4670744240283966},{"id":"https://openalex.org/C169805256","wikidata":"https://www.wikidata.org/wiki/Q1361381","display_name":"Transform coding","level":4,"score":0.44888627529144287},{"id":"https://openalex.org/C121684516","wikidata":"https://www.wikidata.org/wiki/Q7600677","display_name":"Computer graphics (images)","level":1,"score":0.3646056652069092},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.24687984585762024},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.17630985379219055},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1502440869808197},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.11023345589637756},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwcmc61514.2024.10592572","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iwcmc61514.2024.10592572","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1498887648","https://openalex.org/W2113972033","https://openalex.org/W2144052068","https://openalex.org/W2157130275","https://openalex.org/W2164942544","https://openalex.org/W2170023599","https://openalex.org/W2267477823","https://openalex.org/W2891455212","https://openalex.org/W2901794945","https://openalex.org/W2903798713","https://openalex.org/W2946005927","https://openalex.org/W2952253055","https://openalex.org/W2963470893","https://openalex.org/W2988262122","https://openalex.org/W3109248695","https://openalex.org/W6633997413","https://openalex.org/W6634470314"],"related_works":["https://openalex.org/W115686965","https://openalex.org/W2768918307","https://openalex.org/W2110031805","https://openalex.org/W2040020606","https://openalex.org/W4362659915","https://openalex.org/W2113071088","https://openalex.org/W2116526828","https://openalex.org/W2321543601","https://openalex.org/W2126847096","https://openalex.org/W1575921859"],"abstract_inverted_index":{"With":[0],"the":[1,4,19,34,65,141,144,162,165,173,180],"advent":[2],"of":[3,7,70,143,157,164,186],"Multimedia":[5,83],"Internet":[6],"Things":[8],"(MIoT),":[9],"many":[10,29],"image":[11,81,119],"compression":[12,84,145],"techniques":[13],"have":[14,43],"been":[15],"proposed":[16,169],"to":[17,24,57,62,89,105,123,139,160],"address":[18],"network\u2019s":[20],"considerable":[21,54],"challenges":[22,55,175],"related":[23,56],"performance":[25,58],"and":[26,59,68,110,117,133,147,188,191,200],"security.":[27],"However,":[28],"MIoT":[30,51,71,94,181],"devices,":[31],"such":[32],"as":[33],"nRF52832":[35],"SoC":[36],"with":[37,176],"64Kb":[38],"RAM":[39],"or":[40],"even":[41],"less,":[42],"significant":[44],"memory":[45,69],"constraints,":[46],"making":[47],"conventional":[48],"methods":[49],"unsuitable.":[50],"networks":[52],"face":[53],"security":[60,107],"due":[61],"limitations":[63,74],"in":[64,76,78,184,197],"power,":[66],"computation,":[67],"devices.":[72],"These":[73],"result":[75],"difficulties":[77],"handling":[79],"high":[80],"volumes.":[82],"is":[85],"a":[86,115,134,148,154],"potential":[87],"solution":[88],"reduce":[90,140,161],"data":[91],"size.":[92],"As":[93],"devices":[95,124],"often":[96],"rely":[97],"on":[98,179],"wireless":[99],"connections,":[100],"they":[101],"are":[102],"also":[103,129],"vulnerable":[104],"diverse":[106],"attacks":[108],"(passive":[109],"active).":[111],"This":[112],"work":[113],"introduces":[114],"secure":[116],"efficient":[118],"crypto-compression":[120],"technique":[121],"dedicated":[122],"having":[125],"limited":[126],"memory.":[127],"It":[128],"proposes":[130],"using":[131],"denoising":[132],"super-resolution":[135],"deep":[136],"learning":[137],"model":[138],"overhead":[142,163,178],"process":[146],"lightweight":[149],"cipher":[150],"scheme":[151],"that":[152],"requires":[153],"single":[155],"round":[156],"simple":[158],"operations":[159],"encryption":[166],"process.":[167],"The":[168],"approach":[170],"effectively":[171],"addresses":[172],"mentioned":[174],"minimal":[177],"device,":[182],"especially":[183],"terms":[185],"computational":[187],"communication":[189],"delays,":[190],"extensive":[192],"experimentation":[193],"underscores":[194],"its":[195],"suitability":[196],"both":[198],"effectiveness":[199],"robustness.":[201]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-02-27T16:54:17.756197","created_date":"2025-10-10T00:00:00"}
