{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T12:55:24Z","timestamp":1771332924006,"version":"3.50.1"},"reference-count":91,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2015,6,3]],"date-time":"2015-06-03T00:00:00Z","timestamp":1433289600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Imaging"],"abstract":"<jats:p>Wireless sensor networks are increasingly gaining attention. In recent years, a great deal of monitoring, control and tracking applications have been designed for different scenarios. For such networks, camera-enabled sensors can retrieve visual data from a monitored field, providing valuable information for many applications. In general, those networks have resource constraints of processing, memory, energy and transmission bandwidth, imposing many design challenges. Nevertheless, a group of applications may also have security requirements, which bring additional complexity to be handled. Most traditional security mechanisms for popular networks, like the Internet, are not suitable for wireless sensor networks, demanding proper investigation in this area. In this paper, we survey recent developments in encryption and privacy in wireless sensor networks deployed for transmissions of image snapshots, reviewing innovative approaches to provide different levels of security. Promising research directions are also discussed.<\/jats:p>","DOI":"10.3390\/jimaging1010004","type":"journal-article","created":{"date-parts":[[2015,6,3]],"date-time":"2015-06-03T11:29:39Z","timestamp":1433330979000},"page":"4-30","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["A Survey of Image Security in Wireless Sensor Networks"],"prefix":"10.3390","volume":"1","author":[{"given":"Danilo","family":"Gon\u00e7alves","sequence":"first","affiliation":[{"name":"PGCA-UEFS, State University of Feira de Santana, Feira de Santana 44036-900, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3988-8476","authenticated-orcid":false,"given":"Daniel","family":"Costa","sequence":"additional","affiliation":[{"name":"PGCA-UEFS, State University of Feira de Santana, Feira de Santana 44036-900, Brazil"}]}],"member":"1968","published-online":{"date-parts":[[2015,6,3]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1655","DOI":"10.1016\/j.comcom.2006.12.020","article-title":"Wireless sensor networks: A survey on the state of the art and the 802.15. 4 and ZigBee standards","volume":"30","author":"Baronti","year":"2007","journal-title":"Comput. Commun."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"2292","DOI":"10.1016\/j.comnet.2008.04.002","article-title":"Wireless sensor network survey","volume":"52","author":"Yick","year":"2008","journal-title":"Comput. Netw."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"8215","DOI":"10.3390\/s100908215","article-title":"The coverage problem in video-based wireless sensor networks: A survey","volume":"10","author":"Costa","year":"2010","journal-title":"Sensors"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"6662","DOI":"10.3390\/s100706662","article-title":"Wireless multimedia sensor networks: Current trends and future directions","volume":"10","author":"Almalkawi","year":"2010","journal-title":"Sensors"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1084","DOI":"10.1109\/LCOMM.2013.050313.121933","article-title":"Energy efficient image transmission in wireless multimedia sensor networks","volume":"17","author":"Aziz","year":"2013","journal-title":"IEEE Commun. Lett."},{"key":"ref_6","first-page":"55","article-title":"A Survey on Wireless Sensor Network Security","volume":"1","author":"Sen","year":"2009","journal-title":"Int. J. Commun. Netw. Inf. Secur."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/s11235-009-9235-0","article-title":"The future of security in wireless multimedia sensor networks","volume":"45","author":"Zilan","year":"2010","journal-title":"Telecommun. Syst."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Modares, H., Salleh, R., and Moravejosharieh, A. (2011, January 20\u201322). Overview of security issues in wireless sensor networks. Proceedings of International Conference on Computational Intelligence, Modelling & Simulation, Langkawi, Malaysia.","DOI":"10.1109\/CIMSim.2011.62"},{"key":"ref_9","first-page":"62","article-title":"Wireless sensor networks: Security issues and challenges","volume":"2","author":"Pathan","year":"2011","journal-title":"Int. J. Comput. Inf. Technol."},{"key":"ref_10","first-page":"859","article-title":"Wireless Sensor Networks: Security Issues, Challenges and Solutions","volume":"4","author":"Kumar","year":"2014","journal-title":"Int. J. Inf. Comput. Technol."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"2795","DOI":"10.3390\/s140202795","article-title":"Availability Issues in Wireless Visual Sensor Networks","volume":"14","author":"Costa","year":"2014","journal-title":"Sensors"},{"key":"ref_12","first-page":"97","article-title":"Security issues in wireless sensor networks: A survey","volume":"6","author":"Wang","year":"2013","journal-title":"Int. J. Future Gen. Commun. Netw."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1145\/2545883","article-title":"Security and privacy protection in visual sensor networks: A survey","volume":"47","author":"Winkler","year":"2014","journal-title":"ACM Comput. Surv."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/SURV.2009.090205","article-title":"Sensor network security: A survey","volume":"11","author":"Chen","year":"2009","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Zhong, C., Mo, Y., Zhao, J., Lin, C., and Lu, X. (2014, January 13\u201315). Secure clustering and reliable multi-path route discovering in wireless sensor networks. Proceedings of the International Symposium on Parallel Architectures, Algorithms and Programming, Beijing, China.","DOI":"10.1109\/PAAP.2014.41"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"750","DOI":"10.1109\/TPDS.2013.43","article-title":"Secure and efficient data transmission for cluster-based wireless sensor networks","volume":"25","author":"Lu","year":"2014","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1007\/s10916-010-9449-4","article-title":"Security and privacy issues in wireless sensor networks for healthcare applications","volume":"36","author":"Ameen","year":"2012","journal-title":"J. Med. Syst."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Harjito, B., and Han, S. (2010, January 4\u20136). Wireless multimedia sensor networks applications and security challenges. Proceedings of International Conference on Broadband, Wireless Computing, Communication and Applications, Fukuoka, Japan.","DOI":"10.1109\/BWCCA.2010.182"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1760","DOI":"10.3390\/s150101760","article-title":"Research trends in wireless visual sensor networks when exploiting prioritization","volume":"1","author":"Costa","year":"2015","journal-title":"Sensors"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Naveenkumar, S.K., Panduranga, H.T. (2013, January 25\u201327). Partial image encryption for smart camera. Proceedings of the International Conference on Recent Trends in Information Technology, Chennai, India.","DOI":"10.1109\/ICRTIT.2013.6844192"},{"key":"ref_21","unstructured":"Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D., and Pister, K. (2010, January 13\u201315). System architecture directions for networked sensors. Proceedings of International Conference an Architectural Support for Programming Languages and Operation Systems, Cambridge, USA."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Ganeriwal, S., Balzano, L.K., and Srivastava, M.B. (2008). Reputation-based framework for high integrity sensor networks. ACM Trans. Sens. Netw., 4, Article No. 15.","DOI":"10.1145\/1362542.1362546"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1228","DOI":"10.1109\/TPDS.2014.2320505","article-title":"An efficient distributed trust model for wireless sensor networks","volume":"26","author":"Jiang","year":"2014","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1109\/SURV.2013.050113.00191","article-title":"A survey of intrusion detection systems in wireless sensor networks","volume":"16","author":"Butun","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/COMST.2008.4625802","article-title":"Securing wireless sensor networks: A survey","volume":"10","author":"Zhou","year":"2008","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Czarlinska, A., Huh, W., and Kundur, D. (2008, January 12\u201315). On privacy and security in distributed visual sensor networks. Proceedings of International Conference on Image Processing, San Diego, CA, USA.","DOI":"10.1109\/ICIP.2008.4712099"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Wang, Q.X., Xu, T., and Wu, P. (2011, January 10\u201312). Application research of the AES encryption algorithm on the engine anti-theft system. Proceedings of IEEE International Conference on Vehicular Electronics and Safety, Beijing, China.","DOI":"10.1109\/ICVES.2011.5983781"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Raza, S., Slabbert, A., Voigt, T., and Landernas, K. (2009, January 22\u201325). Security considerations for the WirelessHART protocol. Proceedings of IEEE Emerging Technologies and Factory Automation, Mallorca, Spain.","DOI":"10.1109\/ETFA.2009.5347043"},{"key":"ref_29","first-page":"235","article-title":"A Secure Energy Efficient Schema for Wireless Multimedia Sensor Networks","volume":"5","author":"Mahmoud","year":"2013","journal-title":"CiiT Int. J. Wirel. Commun."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Mandal, A.K., Parakash, C., and Tiwari, A. (2012, January 1\u20132). Performance evaluation of cryptographic algorithms: DES and AES. Proceedings of IEEE Students\u2019 Conference on Electrical, Electronics and Computer Science, Bhopal, India.","DOI":"10.1109\/SCEECS.2012.6184991"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Modugu, R., Yong-Bin, K., and Minsu, C. (2010, January 3\u20136). Design and performance measurement of efficient IDEA (International Data Encryption Algorithm) crypto-hardware using novel modular arithmetic components. Proceedings of IEEE Instrumentation and Measurement Technology Conference, Austin, TX, USA.","DOI":"10.1109\/IMTC.2010.5488049"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Gaubatz, G., Kaps, J.P., Ozturk, E., and Sunar, B. (2005, January 8\u201312). State of the art in ultra-low power public key cryptography for wireless sensor networks. Proceedings of IEEE International Conference on Pervasive Computing and Communications Workshops, Kauai Island, HI, USA.","DOI":"10.1109\/PERCOMW.2005.76"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/s00145-001-0009-4","article-title":"Selecting cryptographic key sizes","volume":"14","author":"Lenstra","year":"2001","journal-title":"J. Cryptol."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Al-Hamami, A.H., and Aldariseh, I.A. (2012, January 26\u201328). Enhanced method for RSA cryptosystem algorithm. Proceedings of International Conference on Advanced Computer Science Applications and Technologies, Kuala Lumpur, Malaysia.","DOI":"10.1109\/ACSAT.2012.102"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"639","DOI":"10.1016\/j.procs.2014.07.091","article-title":"A tiny RSA cryptosystem based on Arduino microcontroller useful for small scale networks","volume":"34","author":"Tarayrah","year":"2014","journal-title":"Procedia Comput. Sci."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Amara, M., and Siad, A. (2011, January 9\u201311). Elliptic Curve Cryptography and its applications. Proceedings of International Workshop on Systems, Signal Processing and their Applications, Tipaza, Algeria.","DOI":"10.1109\/WOSSPA.2011.5931464"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2013\/675161","article-title":"Reconfigurable architecture for Elliptic Curve Cryptography using FPGA","volume":"2013","author":"Rahuman","year":"2013","journal-title":"Math. Probl. Eng."},{"key":"ref_38","unstructured":"Raju, G.V.S., and Akbani, R. (2003, January 5\u20138). Elliptic curve cryptosystem and its applications. Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Washington, WA, USA."},{"key":"ref_39","unstructured":"Wander, A.S., Gura, N., Eberle, H., Gupta, V., and Shantz, S.C. (2005, January 8\u201312). Energy analysis of public-key cryptography for wireless sensor networks. Proceedings of the IEEE International Conference on Pervasive Computing and Communications, Kauai, HI, USA."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.scico.2013.01.005","article-title":"A semantic analysis of key management protocols for wireless sensor networks","volume":"81","author":"Macedonio","year":"2014","journal-title":"Sci. Comput. Program."},{"key":"ref_41","unstructured":"Di Pietro, R., Mancini, L.V., Law, Y.W., Etalle, S., and Havinga, P. (2003, January 6\u20139). LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks. Proceedings of the International Conference on Parallel Processing Workshops, Kaohsiung, Taiwan."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Zhu, S., Setia, S., and Jajodia, S. (2003, January 27\u201330). LEAP: Efficient security mechanisms for large-scale distributed sensor networks. Proceedings of the ACM Conference on Computer and Communications Security, Washington, WA, USA.","DOI":"10.1145\/948109.948120"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/COMST.2006.315852","article-title":"A survey of security issues in wireless sensor networks","volume":"8","author":"Wang","year":"2006","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., and Gligor, V.D. (2002, January 18\u201322). A key-management scheme for distributed sensor networks. Proceedings of the ACM Conference on Computer and Communications Security, Washington, USA.","DOI":"10.1145\/586110.586117"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1109\/TMM.2010.2041102","article-title":"Index-based selective audio encryption for wireless multimedia sensor networks","volume":"12","author":"Wang","year":"2010","journal-title":"IEEE Trans. Multimed."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"846","DOI":"10.1109\/TCE.2003.1261164","article-title":"A proposal for supporting selective encryption in JPSEC","volume":"49","author":"Sadourny","year":"2003","journal-title":"IEEE Trans. Consum. Electron."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1007\/11552055_10","article-title":"Selective image encryption using JBIG","volume":"3677","author":"Pfarrhofer","year":"2005","journal-title":"Commun. Multimed. Secur."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"1509","DOI":"10.1016\/j.patcog.2006.02.013","article-title":"Efficient selective encryption for JPEG 2000 images using private initial table","volume":"39","author":"Liu","year":"2006","journal-title":"Pattern Recognit."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"905","DOI":"10.1109\/TMM.2006.879919","article-title":"Fast encryption of JPEG 2000 images in wireless multimedia sensor networks","volume":"8","author":"Grangetto","year":"2006","journal-title":"IEEE Trans. Multimed."},{"key":"ref_50","unstructured":"Podesser, M., Schmidt, H.P., and Uhl, A. (2002, January 4\u20137). Selective bitplane encryption for secure transmission of image data in mobile environments. Proceedings of the 5th IEEE Nordic Signal Processing Symposium, TromsoTrondheim, Norway."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1631\/jzus.C1300262","article-title":"Performance study of selective encryption in comparison to full encryption for still visual images","volume":"15","author":"Khashan","year":"2014","journal-title":"J. Zhejiang Univ."},{"key":"ref_52","unstructured":"Jinmei, L., and Guoyu, W. (2011, January 24\u201326). A refined quadtree-based automatic classification method for remote sensing image. Proceedings of the International Conference on Computer Science and Network Technology, Harbin, China."},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Nikolakopoulos, G., and Fanakis, N. (2009, January 17\u201319). A reconfigurable transmission scheme for lossy image transmission over congested wireless sensor networks. Proceedings of the International Congress on Image and Signal Processing, Tianjin, China.","DOI":"10.1109\/CISP.2009.5301098"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"7170","DOI":"10.3390\/s100807170","article-title":"Adaptive compression of slowly varying images transmitted over wireless sensor networks","volume":"10","author":"Nikolakopoulos","year":"2010","journal-title":"Sensors"},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Massoudi, A., Lefebvre, F., Vleeschouwer, C.D., Macq, B., and Quisquater, J.J. (2008). Overview on selective encryption of image and video: Challenges and perspectives. EURASIP J. Inf. Secur., 10.","DOI":"10.1155\/2008\/179290"},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Wang, Y., Rane, S., Boufounos, P., and Vetro, A. (2011, January 11\u201314). Distributed compression of zerotrees of wavelet coefficients. Proceedings of the IEEE International Conference on Image Processing, Brussels, Belgium.","DOI":"10.1109\/ICIP.2011.6115819"},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"3","DOI":"10.3390\/jsan1010003","article-title":"A Discrete Wavelet Transform (DWT)-based energy-efficient selective retransmission mechanism for wireless image sensor networks","volume":"1","author":"Costa","year":"2012","journal-title":"J. Sens. Actuator Netw."},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Rachedi, A., Kaddar, L., and Mehaoua, A. (2012, January 10\u201315). EDES- Efficient dynamic selective encryption framework to secure multimedia traffic in wireless sensor networks. Proceedings of the IEEE Communication and Information Systems Security Symposium, Ottawa, ON, Canada.","DOI":"10.1109\/ICC.2012.6364221"},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1109\/TMM.2010.2050653","article-title":"On energy efficient encryption for video streaming in wireless sensor networks","volume":"12","author":"Wang","year":"2010","journal-title":"IEEE Trans. Multimed."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2007\/25187","article-title":"Energy-constrained quality optimization for secure image transmission in wireless sensor networks","volume":"2007","author":"Wang","year":"2007","journal-title":"Adv. Multimed."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1007\/978-3-642-39701-1_17","article-title":"Fast encryption of JPEG 2000 images in wireless multimedia sensor networks","volume":"7992","author":"Xiang","year":"2013","journal-title":"Lecture Notes Comput. Sci."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Harjito, B., Potdar, V., and Singh, J. (2012, January 3\u20135). Watermarking technique for wireless multimedia sensor networks: A state of the art. Proceedings of the CUBE International Information Technology Conference, Pune, India.","DOI":"10.1145\/2381716.2381873"},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Harjito, B., Potdar, V., and Singh, J. (2012, January 22\u201324). Watermarking technique for wireless sensor networks: A state of the art. Proceedings of 8th International Conference on Semantics, Knowledge and Grids, Beijing, China.","DOI":"10.1109\/SKG.2012.56"},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1016\/j.ins.2013.03.031","article-title":"A reversible watermarking authentication scheme for wireless sensor networks","volume":"240","author":"Shi","year":"2013","journal-title":"Inf. Sci."},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Xiao, R., Sun, X., and Yang, Y. (2008, January 15\u201317). Copyright protection in wireless sensor networks by watermarking. Proceedings of International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China.","DOI":"10.1109\/IIH-MSP.2008.139"},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Harjito, B., Han, S., Potdar, V., Chang, E., and Xie, M. (2010, January 13\u201316). Secure communication in wireless multimedia sensor networks using watermarking. Proceedings of the IEEE International Conference on Digital Ecosystems and Technologies, Dubai.","DOI":"10.1109\/DEST.2010.5610580"},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Yu, P., Yao, S., Xu, J., Zhang, Y., and Chang, Y. (2009, January 24\u201326). Copyright protection for digital image in wireless sensor network. Proceedings of International Conference on Wireless Communications, Networking and Mobile Computing, Beijing, China.","DOI":"10.1109\/WICOM.2009.5305347"},{"key":"ref_68","unstructured":"Elsabi, E., and Ozdemir, S. (2012, January 17\u201319). Secure data aggregation in wireless multimedia sensor networks via watermarking. Proceedings of the International Conference on Application of Information and Communication Technologies, Tbilisi."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"883","DOI":"10.1007\/s11227-010-0500-5","article-title":"Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks","volume":"64","author":"Wang","year":"2013","journal-title":"J. Supercomput."},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Grieco, L.A., Boggia, G., Sicari, S., and Colombo, P. (2009, January 11\u201316). Secure wireless multimedia sensor networks: A survey. Proceedings of the International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, Sliema, Malta.","DOI":"10.1109\/UBICOMM.2009.27"},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/SURV.2008.080404","article-title":"A survey of multimedia streaming in wireless sensor networks","volume":"10","author":"Misra","year":"2008","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_72","unstructured":"Chew, L.W., Ang, L.M., and Seng, K.P. (2008, January 26\u201328). Survey of image compression algorithms in wireless sensor networks. Proceedings of International Symposium on Information Technology, Kuala Lumpur, Malaysia."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"2022","DOI":"10.1016\/j.comnet.2009.02.023","article-title":"Secure data aggregation in wireless sensor networks: A comprehensive overview","volume":"53","author":"Ozdemir","year":"2009","journal-title":"Comput. Netw."},{"key":"ref_74","first-page":"494853:1","article-title":"Secure Data Aggregation in Wireless Multimedia Sensor Networks Based on Similarity Matching","volume":"2014","author":"Gao","year":"2014","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"2822","DOI":"10.3390\/s140202822","article-title":"Energy-Efficient Sensing in Wireless Sensor Networks Using Compressed Sensing","volume":"14","author":"Razzaque","year":"2014","journal-title":"Sensors"},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"150:1","DOI":"10.1186\/1687-1499-2014-150","article-title":"Compressive sensing image-fusion algorithm in wireless sensor networks based on blended basis functions","volume":"2014","author":"Tong","year":"2014","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"75427:1","DOI":"10.1155\/2007\/75427","article-title":"Tools for Protecting the Privacy of Specific Individuals in Video","volume":"2007","author":"Chen","year":"2007","journal-title":"EURASIP J. Adv. Signal Process."},{"key":"ref_78","doi-asserted-by":"crossref","unstructured":"Toure, M., and Beiji, Z. (2010, January 5\u20137). Intelligent sensor for image control point of eigenface for face recognition. Proceedings of International Conference on Signal Processing Systems, Dalian, China.","DOI":"10.1109\/ICSPS.2010.5555793"},{"key":"ref_79","unstructured":"Utsumi, Y., and Iwai, Y. (September, January 30). Face tracking and recognition by using omnidirectional sensor network. Proceedings of ACM\/IEEE International Conference on Distributed Smart Cameras, Como."},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"2949","DOI":"10.1016\/j.comnet.2013.07.001","article-title":"Object extraction scheme and protocol for energy efficient image communication over wireless sensor networks","volume":"57","author":"Pham","year":"2013","journal-title":"Comput. Netw."},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"1325","DOI":"10.1016\/j.compeleceng.2012.05.009","article-title":"Efficient parallel architecture for multi-level forward discrete wavelet transform processors","volume":"38","author":"Aziz","year":"2012","journal-title":"Comput. Electr. Eng."},{"key":"ref_82","doi-asserted-by":"crossref","unstructured":"Ali, N.A., Drieberg, M., and Sebastian, P. (2011, January 4\u20137). Deployment of MICAz mote for Wireless Sensor Network applications. Proceedings of the IEEE International Conference on Computer Applications and Industrial Electronics, Penang, Malaysia.","DOI":"10.1109\/ICCAIE.2011.6162150"},{"key":"ref_83","unstructured":"Pham, D.M., and Aziz, S. (2013, January 2\u20135). An energy efficient image compression scheme for Wireless Sensor Networks. Proceedings of IEEE International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Melbourne, Victoria."},{"key":"ref_84","doi-asserted-by":"crossref","first-page":"1415","DOI":"10.1007\/s11277-013-1588-8","article-title":"Efficient Hardware-Based Image Compression Schemes for Wireless Sensor Networks: A Survey","volume":"77","author":"Hasan","year":"2014","journal-title":"Wirel. Pers. Commun. Int. J."},{"key":"ref_85","doi-asserted-by":"crossref","unstructured":"Pham, D.M., and Aziz, S.M. (2011, January 24\u201326). FPGA-Based Image Processor Architecture for Wireless Multimedia Sensor Network. Proceedings of the International Conference on Embedded and Ubiquitous Computing, Melbourne, Victoria.","DOI":"10.1109\/EUC.2011.38"},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1504\/IJAHUC.2013.054171","article-title":"Selective secure error correction on SPIHT coefficients for pervasive wireless visual network","volume":"13","author":"Ong","year":"2013","journal-title":"Int. J. Ad Hoc Ubiquitous Comput."},{"key":"ref_87","doi-asserted-by":"crossref","unstructured":"Lee, D.U., Kim, H., Tu, S., Rahimi, M., Estrin, D., and Villasenor, J. (2007, January 25\u201327). Energy-optimized image communication on resource-constrained sensor platforms. Proceedings of the 6th International Symposium on Information Processing in Sensor Networks, Cambridge, MA, USA.","DOI":"10.1109\/IPSN.2007.4379681"},{"key":"ref_88","doi-asserted-by":"crossref","unstructured":"Lee, S., Jeong, S., Chung, Y., and Cho, H. (2011, January 26\u201328). Secure and energy-efficient image transmission for wireless sensor networks. Proceedings of IEEE International Symposium on Parallel and Distributed Processing with Applications Workshop, Busan, Korea.","DOI":"10.1109\/ISPAW.2011.34"},{"key":"ref_89","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1007\/s11042-011-0961-4","article-title":"Exploiting the sensing relevancies of source nodes for optimizations in visual sensor networks","volume":"64","author":"Costa","year":"2013","journal-title":"Multimed. Tools Appl."},{"key":"ref_90","first-page":"836721:1","article-title":"Adaptive monitoring relevance in camera networks for critical surveillance applications","volume":"2013","author":"Costa","year":"2013","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_91","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1016\/j.adhoc.2014.08.001","article-title":"Security in the integration of low-power wireless sensor networks with the internet: A survey","volume":"24","author":"Granjal","year":"2015","journal-title":"Ad Hoc Netw."}],"container-title":["Journal of Imaging"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2313-433X\/1\/1\/4\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T20:47:25Z","timestamp":1760215645000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2313-433X\/1\/1\/4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,3]]},"references-count":91,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2015,12]]}},"alternative-id":["jimaging1010004"],"URL":"https:\/\/doi.org\/10.3390\/jimaging1010004","relation":{},"ISSN":["2313-433X"],"issn-type":[{"value":"2313-433X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,6,3]]}}}