An Approach for Safe Network Image Communication Using Hybrid Cloud and Half Tensor Product Compression Perception

An Approach for Safe Network Image Communication Using Hybrid Cloud and Half Tensor Product Compression Perception

Madhura K. (Presidency University, India), Roshan Baa (St. Xavier's College, India), Rohaila Naaz (Teerthanker Mahaveer University, India), Siddth Kumar Chhajer (St. Peter's University, India), Kamal Kant (Jai Narain Vyas University, India), Sabyasachi Pramanik (Haldia Institute of Technology, India), and Ankur Gupta (Vaish College of Engineering, India)
Copyright: © 2024 |Pages: 17
DOI: 10.4018/979-8-3693-2691-6.ch011
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Since the beginning of the digital era, there has been an increasing focus on picture security since it is a crucial medium for the transfer of information. In this regard, the study develops a hybrid cloud and half-tensor compression-aware technology network image security transmission technique. Following an introduction to the fundamentals of cryptography and its use in the encryption of images, the relevant compression perception methods are expounded upon. In order to further secure the security of network pictures during transmission, the research then suggests the half-tensor product compression perception approach and integrates this technique with the hybrid cloud idea to build a new image encryption and decryption algorithm. According to the findings, the suggested method obtains the greatest peak signal-to-noise ratio value of 31.89 and structural similarity index value of 0.97, respectively. In addition, the lowest values for the times spent on encryption and decryption are 2.128 and 0.288, respectively, indicating that these techniques need less time than others.
Chapter Preview
Top

1. Introduction

Network pictures are becoming more and more essential in everyday life and a variety of businesses as a vital information carrier. But this also poses serious problems for the safe transfer of picture data, particularly when it comes to private information and trade secrets. Techniques for transmitting images that are both secure and efficient are crucial for protecting the confidentiality and integrity (Amin S N et al. 2023) of data. Presently, compression-aware approaches and classic encryption algorithms are the main focus of picture encryption and transmission methods. However, when working with large-scale picture data, these approaches often run into issues with slowness and inadequate security. Furthermore, some academics have suggested cloud-based picture transmission and storage solutions via the use of cloud computing technology; nevertheless, these solutions continue to face difficulties with processing complexity and cost-effectiveness. This context informs the research's construction of an algorithm that combines the notion of a hybrid cloud with semi-tensor product compression perception to enable safe picture transmission across networks. The primary components of this method are picture encryption and image decryption. Its goal is to fulfill the growing demands of network security while simultaneously improving the security and efficiency of image transmission (Bao W et al. 2022). The novel aspect of this study is how the algorithm's processing of high-dimensional data may be made more flexible and efficient by using the semi-tensor product compression perception approach. In the meanwhile, the image processing system's scalability and security may be further increased by using the hybrid cloud architecture, which combines edge and center clouds to maximize data processing and transmission. The research's findings have significant theoretical and practical implications for network image transmission security. In addition to offering a fresh technological avenue for safe picture transfer, the developed encryption and decryption algorithm encourages the use and development of cloud computing and compressed sensing technologies in the realm of network security. The research is broken up into four sections. Prior research is examined and analyzed in order to establish the primary focus of current investigation. Creating a safe transmission technique for network photos is the second step. Testing and analysis of the algorithm developed by the research institution constitute the third section. The research information is summarized and given a view in the last section.

Complete Chapter List

Search this Book:
Reset