{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T21:00:10Z","timestamp":1773522010124,"version":"3.50.1"},"reference-count":90,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2017,1,5]],"date-time":"2017-01-05T00:00:00Z","timestamp":1483574400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>Wireless multimedia sensor networks will play a central role in the Internet of Things world, providing content-rich information for an uncountable number of monitoring and control scenarios. As more applications rely on multimedia data, security concerns gain attention, and new approaches arise to provide security for such networks. However, the usual resource constraints of processing, memory and the energy of multimedia-based sensors have brought different challenges for data encryption, which have driven the development of different security approaches. In this context, this article presents the state-of-the-art of cryptography in wireless multimedia sensor networks, surveying innovative works in this area and discussing promising research directions.<\/jats:p>","DOI":"10.3390\/cryptography1010004","type":"journal-article","created":{"date-parts":[[2017,1,5]],"date-time":"2017-01-05T08:18:25Z","timestamp":1483604305000},"page":"4","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":35,"title":["Cryptography in Wireless Multimedia Sensor Networks: A Survey and Research Directions"],"prefix":"10.3390","volume":"1","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3988-8476","authenticated-orcid":false,"given":"Daniel","family":"Costa","sequence":"first","affiliation":[{"name":"Department of Technology, State University of Feira de Santana, 44036-900, Brazil"}]},{"given":"Solenir","family":"Figuer\u00eado","sequence":"additional","affiliation":[{"name":"Department of Technology, State University of Feira de Santana, 44036-900, Brazil"}]},{"given":"Gledson","family":"Oliveira","sequence":"additional","affiliation":[{"name":"Department of Technology, State University of Feira de Santana, 44036-900, Brazil"}]}],"member":"1968","published-online":{"date-parts":[[2017,1,5]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","article-title":"Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications","volume":"17","author":"Mohammadi","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","article-title":"The Internet of Things: A Survey","volume":"54","author":"Atzori","year":"2010","journal-title":"Comput. Netw."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1016\/j.adhoc.2014.08.001","article-title":"Security in the Integration of Low-Power Wireless Sensor Networks with the Internet: A Survey","volume":"24","author":"Granjal","year":"2015","journal-title":"Ad Hoc Netw."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"6662","DOI":"10.3390\/s100706662","article-title":"Wireless multimedia sensor networks: Current trends and future directions","volume":"10","author":"Almalkawi","year":"2010","journal-title":"Sensors"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/s11235-009-9235-0","article-title":"The future of security in wireless multimedia sensor networks","volume":"45","author":"Zilan","year":"2010","journal-title":"Telecommun. Syst."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Harjito, B., and Han, S. (2010, January 4\u20136). Wireless Multimedia Sensor Networks Applications and Security Challenges. Proceedings of the International Conference on Broadband, Wireless Computing, Communication and Applications, Fukuoka, Japan.","DOI":"10.1109\/BWCCA.2010.182"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1145\/2545883","article-title":"Security and Privacy Protection in Visual Sensor Networks: A Survey","volume":"47","author":"Winkler","year":"2014","journal-title":"ACM Comput. Surv."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"4","DOI":"10.3390\/jimaging1010004","article-title":"A Survey of Image Security in Wireless Sensor Networks","volume":"1","author":"Costa","year":"2015","journal-title":"J. Imaging"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Hayouni, H., Hamdi, M., and Kim, T.H. (2014, January 20\u201323). A Survey on Encryption Schemes in Wireless Sensor Networks. Proceedings of the International Conference on Advanced Software Engineering and Its Applications, Hainan, China.","DOI":"10.1109\/ASEA.2014.14"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1109\/COMST.2015.2459691","article-title":"A Survey of Public-Key Cryptographic Primitives in Wireless Sensor Networks","volume":"18","author":"Shim","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1760","DOI":"10.3390\/s150101760","article-title":"Research Trends in Wireless Visual Sensor Networks When Exploiting Prioritization","volume":"1","author":"Costa","year":"2015","journal-title":"Sensors"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1084","DOI":"10.3390\/s110505439","article-title":"A Survey on Multimedia-Based Cross-Layer Optimization in Visual Sensor Networks","volume":"11","author":"Costa","year":"2011","journal-title":"Sensors"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"8215","DOI":"10.3390\/s100908215","article-title":"The coverage problem in video-based wireless sensor networks: A survey","volume":"10","author":"Costa","year":"2010","journal-title":"Sensors"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"3425","DOI":"10.1007\/s11042-014-2443-y","article-title":"Securing data exchange in wireless multimedia sensor networks: Perspectives and challenges","volume":"75","author":"Ghadi","year":"2016","journal-title":"Multimed. Tools Appl."},{"key":"ref_15","first-page":"97","article-title":"Security issues in wireless sensor networks: A survey","volume":"6","author":"Wang","year":"2013","journal-title":"Int. J. Future Gener. Commun. Netw."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/SURV.2009.090205","article-title":"Sensor network security: A survey","volume":"11","author":"Chen","year":"2009","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_17","first-page":"62","article-title":"Wireless sensor networks: Security issues and challenges","volume":"2","author":"Pathan","year":"2011","journal-title":"Int. J. Comput. Inf. Technol."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1007\/s11042-011-0961-4","article-title":"Exploiting the sensing relevancies of source nodes for optimizations in visual sensor networks","volume":"64","author":"Costa","year":"2013","journal-title":"Multimed. Tools Appl."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MPRV.2008.6","article-title":"Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses","volume":"7","author":"Raymond","year":"2008","journal-title":"IEEE Pervasive Comput."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Ouyang, X., Tian, B., Li, Q., Zhang, J., Hu, Z.M., and Xin, Y. (2011, January 23\u201325). A Novel Framework of Defense System Against DoS Attacks in Wireless Sensor Networks. Proceedings of the 7th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), Wuhan, China.","DOI":"10.1109\/wicom.2011.6040342"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Manju, V.C., and Sasi, K.M. (2012, January 6\u20138). Detection of jamming style DoS attack in Wireless Sensor Network. Proceedings of the 2nd IEEE International Conference on Parallel Distributed and Grid Computing (PDGC), Solan, India.","DOI":"10.1109\/PDGC.2012.6449882"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1109\/SURV.2013.050113.00191","article-title":"A Survey of Intrusion Detection Systems in Wireless Sensor Networks","volume":"16","author":"Butun","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_23","unstructured":"Karlof, C., and Wagner, D. (2003, January 11). Secure routing in wireless sensor networks: Attacks and countermeasures. Proceedings of the IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage, AK, USA."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Buttyan, L., and Grilo, A.M. (2011, January 5\u20139). A Secure Distributed Transport Protocol for Wireless Sensor Networks. Proceedings of the IEEE International Conference on Communications (ICC), Kyoto, Japan.","DOI":"10.1109\/icc.2011.5962646"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Xu, M., Liu, G., and Guan, J. (2015). Towards a Secure Medium Access Control Protocol for Cluster-Based Underwater Wireless Sensor Networks. Int. J. Distrib. Sens. Netw., 2015.","DOI":"10.1155\/2015\/325474"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Dener, M. (2014). Security Analysis in Wireless Sensor Networks. Int. J. Distrib. Sens. Netw., 2014.","DOI":"10.1155\/2014\/303501"},{"key":"ref_27","first-page":"55","article-title":"A Survey on Wireless Sensor Network Security","volume":"1","author":"Sen","year":"2009","journal-title":"Int. J. Commun. Netw. Inf. Secur."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Modares, H., Salleh, R., and Moravejosharieh, A. (2011, January 20\u201322). Overview of security issues in wireless sensor networks. Proceedings of the International Conference on Computational Intelligence, Modelling & Simulation, Langkawi, Malaysia.","DOI":"10.1109\/CIMSim.2011.62"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.scico.2013.01.005","article-title":"A semantic analysis of key management protocols for wireless sensor networks","volume":"81","author":"Macedonio","year":"2014","journal-title":"Sci. Comput. Programm."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Gaubatz, G., Kaps, J.P., Ozturk, E., and Sunar, B. (2005, January 8\u201312). State of the art in ultra-low power public key cryptography for wireless sensor networks. Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, Kauai Island, HI, USA.","DOI":"10.1109\/PERCOMW.2005.76"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Wang, Q.X., Xu, T., and Zhou Wu, P. (2011, January 10\u201312). Application research of the AES encryption algorithm on the engine anti-theft system. Proceedings of the IEEE International Conference on Vehicular Electronics and Safety (ICVES), Beijing, China.","DOI":"10.1109\/ICVES.2011.5983781"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Panda, M. (2015, January 9\u201310). Data security in wireless sensor networks via AES algorithm. Proceedings of the 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO), Coimbatore, India.","DOI":"10.1109\/ISCO.2015.7282377"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Jindal, P., and Singh, B. (2014, January 9\u201310). Performance analysis of modified RC4 encryption algorithm. Proceedings of the International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014), Jaipur, India.","DOI":"10.1109\/ICRAIE.2014.6909247"},{"key":"ref_34","first-page":"1191","article-title":"RC5-based Security in Wireless Sensor Networks: Utilization and Performance","volume":"9","author":"Kukkurainen","year":"2010","journal-title":"WSEAS Trans. Comput."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Al-Hamami, A.H., and Aldariseh, I.A. (2012, January 26\u201328). Enhanced Method for RSA Cryptosystem Algorithm. Proceedings of the International Conference on Advanced Computer Science Applications and Technologies, Kuala Lumpur, Malaysia.","DOI":"10.1109\/ACSAT.2012.102"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"639","DOI":"10.1016\/j.procs.2014.07.091","article-title":"A Tiny RSA Cryptosystem Based On Arduino Microcontroller Useful For Small Scale Networks","volume":"34","author":"Tarayrah","year":"2014","journal-title":"Procedia Comput. Sci."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Liu, A., and Ning, P. (2008, January 22\u201324). TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. Proceedings of the International Conference on Information Processing in Sensor Networks (IPSN \u201908), St. Louis, MO, USA.","DOI":"10.1109\/IPSN.2008.47"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Ahmed, M.H., Alam, S.W., Qureshi, N., and Baig, I. (2011, January 11\u201313). Security for WSN based on elliptic curve cryptography. Proceedings of the International Conference on Computer Networks and Information Technology (ICCNIT), Abbottabad, Pakistan.","DOI":"10.1109\/ICCNIT.2011.6020911"},{"key":"ref_39","unstructured":"Othman, S.B., Trad, A., and Youssef, H. (2012, January 24\u201326). Performance evaluation of encryption algorithm for wireless sensor networks. Proceedings of the International Conference on Information Technology and e-Services (ICITeS), Sousse, Tunisia."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Trad, A., Bahattab, A.A., and Othman, S.B. (2014, January 24\u201326). Performance trade-offs of encryption algorithms for Wireless Sensor Networks. Proceedings of the World Congress on Computer Applications and Information Systems (WCCAIS), Prague, Czech Republic.","DOI":"10.1109\/WCCAIS.2014.6916625"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"2795","DOI":"10.3390\/s140202795","article-title":"Availability Issues in Wireless Visual Sensor Networks","volume":"14","author":"Costa","year":"2014","journal-title":"Sensors"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1016\/j.asej.2014.11.001","article-title":"Image compression algorithms in wireless multimedia sensor networks: A survey","volume":"6","author":"ZainEldin","year":"2015","journal-title":"Ain Shams Eng. J."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/j.aasri.2013.10.057","article-title":"Video Coding and Routing in Wireless Video Sensor Networks","volume":"5","year":"2013","journal-title":"AASRI Procedia"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1007\/s00530-012-0258-0","article-title":"A comparative analysis of video codecs for multihop wireless video sensor networks","volume":"18","author":"Imran","year":"2012","journal-title":"Multimed. Syst."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Li, L., Xin, G., Sun, L., and Liu, Y. (2009, January 22\u201326). QVS: Quality-Aware Voice Streaming for Wireless Sensor Networks. Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS \u201909), Montreal, QC, Canada.","DOI":"10.1109\/ICDCS.2009.40"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Fu, Y., Guo, Q., and Chen, C. (2014). A-LNT: A Wireless Sensor Network Platform for Low-Power Real-Time Voice Communications. J. Electr. Comput. Eng., 2014.","DOI":"10.1155\/2014\/394376"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Massoudi, A., Lefebvre, F., Vleeschouwer, C.D., Macq, B., and Quisquater, J.J. (2008). Overview on Selective Encryption of Image and Video: Challenges and Perspectives. EURASIP J. Inf. Secur., 2008.","DOI":"10.1155\/2008\/179290"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Ren, K., Liu, X., Liang, W., Xu, M., Jia, X., and Xing, K. (2013). Wireless Algorithms, Systems, and Applications, Proceedings of the 8th International Conference, WASA 2013, Zhangjiajie, China, 7\u201310 August 2013, Springer.","DOI":"10.1007\/978-3-642-39701-1"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"7170","DOI":"10.3390\/s100807170","article-title":"Adaptive Compression of Slowly Varying Images Transmitted over Wireless Sensor Networks","volume":"10","author":"Nikolakopoulos","year":"2010","journal-title":"Sensors"},{"key":"ref_50","unstructured":"Liu, J., and Wang, G. (2011, January 24\u201326). A refined quadtree-based automatic classification method for remote sensing image. Proceedings of the International Conference on Computer Science and Network Technology, Harbin, China."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Wang, Y., Rane, S., Boufounos, P., and Vetro, A. (2011, January 11\u201314). Distributed compression of zerotrees of wavelet coefficients. Proceedings of the 18th IEEE International Conference on Image Processing, Brussels, Belgium.","DOI":"10.1109\/ICIP.2011.6115819"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"3","DOI":"10.3390\/jsan1010003","article-title":"A discrete wavelet transform (DWT)-based energy-efficient selective retransmission mechanism for wireless image sensor networks","volume":"1","author":"Costa","year":"2012","journal-title":"J. Sens Actuator Netw."},{"key":"ref_53","unstructured":"Elsabi, E., and Ozdemir, S. (2012, January 17\u201319). Secure data aggregation in wireless multimedia sensor networks via watermarking. Proceedings of the International Conference on Application of Information and Communication Technologies, Georgia, Tbilisi."},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Harjito, B., Han, S., Potdar, V., Chang, E., and Xie, M. (2010, January 13\u201316). Secure communication in wireless multimedia sensor networks using watermarking. Proceedings of the IEEE International Conference on Digital Ecosystems and Technologies, Dubai, UAE.","DOI":"10.1109\/DEST.2010.5610580"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"883","DOI":"10.1007\/s11227-010-0500-5","article-title":"Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks","volume":"64","author":"Wang","year":"2013","journal-title":"J. Supercomput."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/s11235-013-9849-0","article-title":"A selective encryption and energy efficient clustering scheme for video streaming in wireless sensor networks","volume":"56","author":"Varalakshmi","year":"2014","journal-title":"Telecommun. Syst."},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Imran, N., Seet, B.C., and Fong, A.C.M. (2015). Distributed video coding for wireless video sensor networks: A review of the state-of-the-art architectures. SpringerPlus, 4.","DOI":"10.1186\/s40064-015-1300-4"},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"2822","DOI":"10.3390\/s140202822","article-title":"Energy-Efficient Sensing in Wireless Sensor Networks Using Compressed Sensing","volume":"14","author":"Razzaque","year":"2014","journal-title":"Sensors"},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Tong, Y., Zhao, M., Wei, Z., and Liu, L. (2014). Compressive sensing image-fusion algorithm in wireless sensor networks based on blended basis functions. EURASIP J. Wirel. Commun. Netw., 2014.","DOI":"10.1186\/1687-1499-2014-150"},{"key":"ref_60","first-page":"274","article-title":"Power Efficient Video Multipath Transmission over Wireless Multimedia Sensor Networks","volume":"13","author":"Politis","year":"2008","journal-title":"Mob. Netw. Appl."},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Zaidi, S.M.A., Jung, J., Song, B., Lee, H., and Youn, H.Y. (2013, January 11\u201314). Multi-Channel Multi-Path video transmission over wireless sensor networks. Proceedings of the IEEE 10th Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, USA.","DOI":"10.1109\/CCNC.2013.6488458"},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1109\/TMM.2010.2041102","article-title":"Index-based selective audio encryption for wireless multimedia sensor networks","volume":"12","author":"Wang","year":"2010","journal-title":"IEEE Trans. Multimed."},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"James, S.P., George, S.N., and Deepthi, P.P. (2013, January 4\u20136). Secure selective encryption of compressed audio. Proceedings of the 2013 Annual International Conference on Emerging Research Areas and 2013 International Conference on Microelectronics, Communications and Renewable Energy, Kanjirapally, India.","DOI":"10.1109\/AICERA-ICMiCR.2013.6575954"},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"434","DOI":"10.1109\/TASL.2009.2025099","article-title":"Audio Signal Representations for Indexing in the Transform Domain","volume":"18","author":"Ravelli","year":"2010","journal-title":"IEEE Trans. Audio Speech Lang. Process."},{"key":"ref_65","unstructured":"Zeng, G., and Qiu, Z. (2008, January 26\u201329). Audio watermarking in DCT: Embedding strategy and algorithm. Proceedings of the 9th International Conference on Signal Processing, Beijing, China."},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/s11042-011-0928-5","article-title":"Quality-driven secure audio transmissions in wireless multimedia sensor networks","volume":"67","author":"Wang","year":"2013","journal-title":"Multimed. Tools Appl."},{"key":"ref_67","unstructured":"Wu, Y., and Shimamoto, S. (2006, January 5\u20137). A Study on DWT-Based Digital Audio Watermarking for Mobile Ad Hoc Network. Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC \u201906), Taichung, Taiwan."},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Shete, R., and Agrawal, S. (2016, January 6\u20138). IoT based urban climate monitoring using Raspberry Pi. Proceedings of the International Conference on Communication and Signal Processing (ICCSP), Madras, India.","DOI":"10.1109\/ICCSP.2016.7754526"},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"757","DOI":"10.1109\/TWC.2009.070769","article-title":"Image transmissions with security enhancement based on region and path diversity in wireless sensor networks","volume":"8","author":"Wang","year":"2009","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1109\/TMM.2010.2050653","article-title":"On Energy Efficient Encryption for Video Streaming in Wireless Sensor Networks","volume":"12","author":"Wang","year":"2010","journal-title":"IEEE Trans. Multimed."},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Tsitsipis, D., Nikolakopoulos, G., Tzes, A., and Koubias, S. (2011, January 20\u201323). A dual scheme for secured Multimedia Wireless Sensor Network. Proceedings of the 19th Mediterranean Conference on Control Automation (MED), Corfu, Greece.","DOI":"10.1109\/MED.2011.5983142"},{"key":"ref_72","doi-asserted-by":"crossref","unstructured":"Kong, J.H., Seng, K.P., Yeong, L.S., and Ang, L.M. (2012, January 8\u201310). Image compression with short-term visual encryption using the burrow wheeler transform and keyed transpose. Proceedings of the IET International Conference on Wireless Communications and Applications (ICWCA), Kuala Lumpur, Malaysia.","DOI":"10.1049\/cp.2012.2112"},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Rachedi, A., Kaddar, L., and Mehaoua, A. (2012, January 10\u201315). EDES- Efficient dynamic selective encryption framework to secure multimedia traffic in wireless sensor networks. Proceedings of the IEEE Communication and Information Systems Security Symposium, Ottawa, ON, Canada.","DOI":"10.1109\/ICC.2012.6364221"},{"key":"ref_74","first-page":"235","article-title":"A Secure Energy Efficient Schema for Wireless Multimedia Sensor Networks","volume":"5","author":"Mahmoud","year":"2013","journal-title":"CiiT Int. J. Wirel. Commun."},{"key":"ref_75","doi-asserted-by":"crossref","unstructured":"Mostefaoui, A., Noura, H., and Fawaz, Z. (2014, January 9\u201311). Efficient and Secure Visual Data Transmission Approach for Wireless Multimedia Sensor Networks. Proceedings of the IEEE 22nd International Symposium on Modelling, Analysis Simulation of Computer and Telecommunication Systems, Paris, France.","DOI":"10.1109\/MASCOTS.2014.63"},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"718","DOI":"10.1109\/ACCESS.2015.2439034","article-title":"A Hybrid Security and Compressive Sensing-Based Sensor Data Gathering Scheme","volume":"3","author":"Qi","year":"2015","journal-title":"IEEE Access"},{"key":"ref_77","doi-asserted-by":"crossref","unstructured":"Fawaz, Z., Mostefaoui, A., and Noura, H. (2015, January 2\u20136). Secure and Error Resilient Approach for Multimedia Data Transmission in Constrained Networks. Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet \u201915), Cancun, Mexico.","DOI":"10.1145\/2815317.2815332"},{"key":"ref_78","doi-asserted-by":"crossref","unstructured":"Kim, J.M., Lee, H.S., Yi, J., and Park, M. (2016). Power Adaptive Data Encryption for Energy-Efficient and Secure Communication in Solar-Powered Wireless Sensor Networks. J. Sens., 2016.","DOI":"10.1155\/2016\/2678269"},{"key":"ref_79","doi-asserted-by":"crossref","unstructured":"Escamilla-Ambrosio, P.J., Salinas-Rosales, M., Aguirre-Anaya, E., and Acosta-Bermejo, R. (2016, January 24\u201326). Image compressive sensing cryptographic analysis. Proceedings of the International Conference on Electronics, Communications and Computers (CONIELECOMP), Cholula, Mexico.","DOI":"10.1109\/CONIELECOMP.2016.7438556"},{"key":"ref_80","unstructured":"De Oliveira Gon\u00e7alves, D., and Costa, D.G. (June, January 30). Energy-efficient Adaptive Encryption for Wireless Visual Sensor Networks. Proceedings of the Brazilian Symposium on Computer Networks and Distributed Systems, Salvador, Brazil."},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1504\/IJAHUC.2013.054171","article-title":"Selective secure error correction on SPIHT coefficients for pervasive wireless visual network","volume":"13","author":"Ong","year":"2013","journal-title":"Int. J. Ad Hoc Ubiquitous Comput."},{"key":"ref_82","doi-asserted-by":"crossref","unstructured":"Naveenkumar, S.K., Panduranga, H.T. (2013, January 25\u201327). Partial image encryption for smart camera. Proceedings of the International Conference on Recent Trends in Information Technology, Chennai, India.","DOI":"10.1109\/ICRTIT.2013.6844192"},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"2943","DOI":"10.1016\/j.cnsns.2011.11.030","article-title":"A novel image encryption algorithm based on a 3D chaotic map","volume":"17","author":"Kanso","year":"2012","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"ref_84","doi-asserted-by":"crossref","first-page":"1202","DOI":"10.1016\/j.sigpro.2011.11.004","article-title":"A Fast Color Image Encryption Algorithm Based on Coupled Two-dimensional Piecewise Chaotic Map","volume":"92","author":"Mirzakuchaki","year":"2012","journal-title":"Signal Process."},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1007\/s11071-013-1068-4","article-title":"Chaos-based image encryption with total shuffling and bidirectional diffusion","volume":"75","author":"Zhang","year":"2014","journal-title":"Nonlinear Dyn."},{"key":"ref_86","doi-asserted-by":"crossref","unstructured":"Shin, J., and Ruland, C. (2013, January 7\u20139). A survey of image hashing technique for data authentication in WMSNs. Proceedings of the IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Lyon, France.","DOI":"10.1109\/WiMOB.2013.6673369"},{"key":"ref_87","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1109\/MNET.2011.5772059","article-title":"Multimedia traffic security architecture for the internet of things","volume":"25","author":"Zhou","year":"2011","journal-title":"IEEE Net."},{"key":"ref_88","doi-asserted-by":"crossref","unstructured":"Abazeed, M., Saleem, K., Derhab, A., Orgun, M.A., Fisal, N., Al-Muhtadi, J., and Zubair, S. (2015). A Review of Secure Routing Approaches for Current and Next-Generation Wireless Multimedia Sensor Networks. Int. J. Distrib. Sens. Netw., 2015.","DOI":"10.1155\/2015\/524038"},{"key":"ref_89","doi-asserted-by":"crossref","unstructured":"Gao, R., Wen, Y., Zhao, H., and Meng, Y. (2014). Secure Data Aggregation in Wireless Multimedia Sensor Networks Based on Similarity Matching. Int. J. Distrib. Sens. Netw., 2014.","DOI":"10.1155\/2014\/494853"},{"key":"ref_90","doi-asserted-by":"crossref","first-page":"2022","DOI":"10.1016\/j.comnet.2009.02.023","article-title":"Secure data aggregation in wireless sensor networks: A comprehensive overview","volume":"53","author":"Ozdemir","year":"2009","journal-title":"Comput. Netw."}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/1\/1\/4\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T18:25:32Z","timestamp":1760207132000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/1\/1\/4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,5]]},"references-count":90,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2017,6]]}},"alternative-id":["cryptography1010004"],"URL":"https:\/\/doi.org\/10.3390\/cryptography1010004","relation":{},"ISSN":["2410-387X"],"issn-type":[{"value":"2410-387X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,1,5]]}}}