Compression-enhanced Three-Pass Protocol for secure and bandwidth-efficient image transmission

Key-based cryptography faces persistent challenges in secure key distribution and newly rising vulnerabilities. Three-Pass Protocols (3PPs) tackle these issues through commutative encryption but typically triple bandwidth requirements. This paper addresses these bandwidth limitations by integrating...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Journal of information security and applications Ročník 94; s. 104204
Hlavní autori: Abdelfattah, Mohamed G., Elnakib, Ahmed, Hegazy, Salem F.
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: Elsevier Ltd 01.11.2025
Predmet:
ISSN:2214-2126
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract Key-based cryptography faces persistent challenges in secure key distribution and newly rising vulnerabilities. Three-Pass Protocols (3PPs) tackle these issues through commutative encryption but typically triple bandwidth requirements. This paper addresses these bandwidth limitations by integrating an entropy-regularized Vector Quantized Variational Autoencoder (VQ-VAE) into a Fresnel-transform-based 3PP. Our VQ-VAE, trained on the Flickr8k dataset, achieves high-quality compression (average PSNR ≈ 31 dB, average MS-SSIM ≈ 0.96) at an average low bitrate (< 0.35 bpp), reducing 3PP bandwidth requirements by over 97%. Comparative analysis at about 0.3 bpp demonstrates its competitive performance with recent state-of-the-art image compression techniques, and ablation studies validate the contribution of each key component to its overall efficacy. Compressed latent representations are then encrypted via commutative Fresnel transforms, enabling secure, keyless decryption. Security analysis reveals minimal correlation coefficient (CC<0.04) between original and encrypted latents, while decrypted latents fully recover the originals (CC =1.0). The final reconstructed images maintain high fidelity (CC >0.98). Furthermore, encrypted latents exhibit negligible adjacent-pixel correlation (< 0.05), highlighting strong immunity to statistical attacks. Histogram analysis shows a high Kullback–Leibler (KL) divergence (> 3.29) and a low histogram intersection (0.597) between ciphers and original latents, underscoring robust resistance to frequency-based methods. Sensitivity analysis reveals that a minute deviation in the diffraction distance (10−5 m) severely degrades decryption quality (CC < 0.05), demonstrating resistance against brute-force attacks. A lightweight verification step thwarts replay attacks, a known 3PP weakness. This framework enables secure and bandwidth-efficient image transmission, making it suitable for resource-constrained and security-critical applications such as telemedicine and remote-sensing downlinks.
AbstractList Key-based cryptography faces persistent challenges in secure key distribution and newly rising vulnerabilities. Three-Pass Protocols (3PPs) tackle these issues through commutative encryption but typically triple bandwidth requirements. This paper addresses these bandwidth limitations by integrating an entropy-regularized Vector Quantized Variational Autoencoder (VQ-VAE) into a Fresnel-transform-based 3PP. Our VQ-VAE, trained on the Flickr8k dataset, achieves high-quality compression (average PSNR ≈ 31 dB, average MS-SSIM ≈ 0.96) at an average low bitrate (< 0.35 bpp), reducing 3PP bandwidth requirements by over 97%. Comparative analysis at about 0.3 bpp demonstrates its competitive performance with recent state-of-the-art image compression techniques, and ablation studies validate the contribution of each key component to its overall efficacy. Compressed latent representations are then encrypted via commutative Fresnel transforms, enabling secure, keyless decryption. Security analysis reveals minimal correlation coefficient (CC<0.04) between original and encrypted latents, while decrypted latents fully recover the originals (CC =1.0). The final reconstructed images maintain high fidelity (CC >0.98). Furthermore, encrypted latents exhibit negligible adjacent-pixel correlation (< 0.05), highlighting strong immunity to statistical attacks. Histogram analysis shows a high Kullback–Leibler (KL) divergence (> 3.29) and a low histogram intersection (0.597) between ciphers and original latents, underscoring robust resistance to frequency-based methods. Sensitivity analysis reveals that a minute deviation in the diffraction distance (10−5 m) severely degrades decryption quality (CC < 0.05), demonstrating resistance against brute-force attacks. A lightweight verification step thwarts replay attacks, a known 3PP weakness. This framework enables secure and bandwidth-efficient image transmission, making it suitable for resource-constrained and security-critical applications such as telemedicine and remote-sensing downlinks.
ArticleNumber 104204
Author Abdelfattah, Mohamed G.
Hegazy, Salem F.
Elnakib, Ahmed
Author_xml – sequence: 1
  givenname: Mohamed G.
  orcidid: 0000-0002-9889-3569
  surname: Abdelfattah
  fullname: Abdelfattah, Mohamed G.
  email: eng.mo.gamal@mans.edu.eg
  organization: Department of Electronics and Communications Engineering, Faculty of Engineering, Mansoura University, Mansoura, 35516, Egypt
– sequence: 2
  givenname: Ahmed
  surname: Elnakib
  fullname: Elnakib, Ahmed
  organization: Department of Electronics and Communications Engineering, Faculty of Engineering, Mansoura University, Mansoura, 35516, Egypt
– sequence: 3
  givenname: Salem F.
  orcidid: 0000-0002-6260-1181
  surname: Hegazy
  fullname: Hegazy, Salem F.
  email: salem@niles.edu.eg
  organization: National Institute of Laser Enhanced Sciences, Cairo University, Giza, 12613, Egypt
BookMark eNp9kE1LAzEQhnOoYNX-AU_5A6nJZJN2wYsUv6BgD_VqyGYnNkublGRV_PfuWs9eZmDgeXnnuSCTmCISci34XHChb7p5F4qdAwc1HCrg1YRMAUTFQIA-J7NSOs65AFErkFPytkqHY8ZSQooM485Ghy3d7jIi29hS6CanPrm0pz5lWtB9ZKQ2trQZxldo-x1D74MLGHsaDvYdaZ9tLIfwG3lFzrzdF5z97Uvy-nC_XT2x9cvj8-puzRwo2TO0Ve2dE0qB1lIqVbWNXDi9QK-9VkspvRDKLWtXQ8td1XA-1GyWoLS2WCt5SeCU63IqJaM3xzy0yd9GcDOKMZ0ZxZhRjDmJGaDbE4RDs8-A2ZTxjyE5ZHS9aVP4D_8BHP5xLQ
Cites_doi 10.1109/TPAMI.2023.3322904
10.1007/s11416-023-00467-0
10.1109/MSP.2018.2880837
10.1109/ICASSP.2019.8683277
10.1016/j.ymssp.2024.111168
10.1038/s41598-025-90482-6
10.1109/5.4440
10.1061/(ASCE)CP.1943-5487.0000855
10.1061/(ASCE)0887-3801(2006)20:6(390)
10.1002/stc.1681
10.1016/j.ymssp.2022.109937
10.1111/mice.12528
10.1214/aoms/1177729694
10.1016/j.ymssp.2024.112136
10.1109/CVPR42600.2020.00796
10.1613/jair.3994
10.1016/j.image.2023.117016
10.1007/BF00130487
10.1177/1475921719844039
10.1109/CVPR52688.2022.01697
10.1109/TIT.2006.871582
10.1109/18.61115
10.1002/stc.1737
10.1061/(ASCE)ST.1943-541X.0000946
10.1007/s11082-025-08061-y
10.1109/CVPR52688.2022.00372
10.1109/WACV56688.2023.00028
10.1038/s41377-024-01721-w
ContentType Journal Article
Copyright 2025 Elsevier Ltd
Copyright_xml – notice: 2025 Elsevier Ltd
DBID AAYXX
CITATION
DOI 10.1016/j.jisa.2025.104204
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
ExternalDocumentID 10_1016_j_jisa_2025_104204
S2214212625002418
GroupedDBID --M
.~1
1~.
4.4
457
4G.
5VS
7-5
8P~
AAEDT
AAEDW
AAFJI
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AATTM
AAXKI
AAXUO
AAYFN
AAYWO
ABBOA
ABMAC
ABXDB
ACDAQ
ACGFS
ACLOT
ACRLP
ACVFH
ACZNC
ADBBV
ADCNI
ADEZE
AEBSH
AEIPS
AEKER
AEUPX
AFJKZ
AFPUW
AFTJW
AGHFR
AGUBO
AIALX
AIEXJ
AIGII
AIIUN
AIKHN
AITUG
AKBMS
AKRWK
AKYEP
ALMA_UNASSIGNED_HOLDINGS
AMRAJ
ANKPU
AOMHK
AOUOD
APXCP
AVARZ
AXJTR
BKOJK
BLXMC
EBS
EFJIC
EFKBS
EFLBG
EJD
FDB
FIRID
FNPLU
FYGXN
GBLVA
GBOLZ
KOM
M41
MO0
OAUVE
P-8
P-9
PC.
PRBVW
ROL
SPC
SPCBC
SSB
SSO
SSV
SSZ
T5K
~G-
AAYXX
CITATION
ID FETCH-LOGICAL-c253t-ea49fcc15526633554db37c67ef6f65833f115c89c92d0c4b00cedb82566ae953
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001561531200003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2214-2126
IngestDate Wed Oct 29 21:19:07 EDT 2025
Sat Nov 22 16:51:04 EST 2025
IsPeerReviewed true
IsScholarly true
Keywords Three-Pass Protocol
Fresnel transform
Image compression
Bandwidth efficiency
Vector Quantized Variational Autoencoder
Secure image transmission
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c253t-ea49fcc15526633554db37c67ef6f65833f115c89c92d0c4b00cedb82566ae953
ORCID 0000-0002-6260-1181
0000-0002-9889-3569
ParticipantIDs crossref_primary_10_1016_j_jisa_2025_104204
elsevier_sciencedirect_doi_10_1016_j_jisa_2025_104204
PublicationCentury 2000
PublicationDate November 2025
2025-11-00
PublicationDateYYYYMMDD 2025-11-01
PublicationDate_xml – month: 11
  year: 2025
  text: November 2025
PublicationDecade 2020
PublicationTitle Journal of information security and applications
PublicationYear 2025
Publisher Elsevier Ltd
Publisher_xml – name: Elsevier Ltd
References Lu, Chen, Pu, Ma (b46) 2022
Loshchilov I, Hutter F. Decoupled weight decay regularization. In: International conference on learning representations. ICLR, 2019.
Singh, Baranwal, Singh, Singh, Zhou (b1) 2023; 79
Almasri, Sadhu, Chaudhuri (b25) 2020; 34
Yang, Nagarajaiah (b33) 2014; 140
Khasanah (b14) 2020; 11
Oktaviana R, et al. Three-pass protocol implementation using modular exponentiation. In: Proc. IEEE int. conf. ICT. 2016, p. 1–4.
An, Xue, Ou (b31) 2024; 211
Lin (b51) 1991; 37
Bao, Tang, Li (b26) 2020; 19
Kuo, Shyu, Lin, Lee, Chiang (b49) 2008; 16
Lang (b18) 2010; 90
Friedman (b16) 1922
Gârbacea C, van den Oord A, Li Y, Lim FSC, Luebs A, Vinyals O, Walters TC. Low Bit-rate Speech Coding with VQ-VAE and a WaveNet Decoder. In: ICASSP 2019 - IEEE int. conf. acoust. speech signal process. 2019, p. 735–9.
Xue, An, Ou (b21) 2025; 224
van den Oord, Vinyals, Kavukcuoglu (b34) 2017; 30
Rachmawati D, et al. H-rabin cryptosystem for three-pass protocol. In: Proc. IEEE ICITACEE. 2017, p. 1–6.
Zou Renjie, Song Chunfeng, Zhang Zhaoxiang. The devil is in the details: Window-based attention for image compression. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition. 2022, p. 17492–501.
Al-Selwi, Ning, Gao, Chao, Li, Li (b41) 2025; 15
Zhang, Li (b22) 2006; 20
Dong, Wan, Luo, Todd (b29) 2023; 188
Yazicigil, Haque, Kinget, Wright (b30) 2019; 36
Kullback, Leibler (b52) 1951; 22
Li, Wang, He, Gao, Zhang, Wang (b39) 2025; 74
Massey, Omura (b10) 1986
Wang, Chen, Qian, Feng, Chen, Zuo (b40) 2025; 14
Yang (b19) 2002; 89
Bao, Yu, Li, Mao, Jiao, Zou, Ou (b27) 2015; 22
Massey (b7) 1988; 76
Kingma DP, Welling M, et al. Auto-encoding variational Bayes. Banff, Canada; 2013.
Cheng Zhengxue, Sun Heming, Takeuchi Masaru, Katto Jiro. Learned image compression with discretized gaussian mixture likelihoods and attention modules. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition. 2020, p. 7939–48.
Swain, Ballard (b50) 1991; 7
Yang, Nagarajaiah, Ni (b32) 2015; 22
Abdelfattah, Hegazy, Obayya (b2) 2025; 57
Hodosh, Young, Hockenmaier (b43) 2013; 47
Wang, Yan, Wu, He, Chen, Yuan, Li (b3) 2023; 118
Wang, Yin, Li, Li, Liu (b5) 2025; 143
Donoho (b24) 2006; 52
Duan, Lu, Ma, Huang, Ma, Zhu (b45) 2023; 46
Duan, Lu, Ma, Huang, Ma, Zhu (b35) 2024; 46
Carlsen (b53) 1994
Menezes, van Oorschot, Vanstone (b6) 1997
Kang N, Qiu S, Zhang S, Li Z, Xia ST. PILC: Practical image lossless compression with an end-to-end GPU-oriented neural framework. In: Proc. IEEE/CVF conference on computer vision and pattern recognition. 2022, p. 3739–48.
Kasiski (b15) 1863
Schneier (b8) 2015
Lang (b17) 2008; 46
Dupont (b20) 2024; 20
Zhou, Qian, Gamba (b4) 2024; 62
Subandi B, et al. Vigenère cipher in three-pass protocol for text encryption. In: Proc. IEEE iCSITech. 2017, p. 231–6.
Duan Z, Lu M, Ma Z, Zhu F. Lossy image compression with quantized hierarchical VAEs. In: Proc. IEEE/CVF winter conference on applications of computer vision. 2023, p. 198–207.
Rachmawati (b12) 2018; 6
Ni, Zhang, Noori (b23) 2020; 35
Chen, Ni, Zhou (b28) 2022; 29
Al-Selwi (10.1016/j.jisa.2025.104204_b41) 2025; 15
10.1016/j.jisa.2025.104204_b48
Yang (10.1016/j.jisa.2025.104204_b33) 2014; 140
10.1016/j.jisa.2025.104204_b47
Massey (10.1016/j.jisa.2025.104204_b10) 1986
10.1016/j.jisa.2025.104204_b44
Zhou (10.1016/j.jisa.2025.104204_b4) 2024; 62
Lang (10.1016/j.jisa.2025.104204_b18) 2010; 90
Donoho (10.1016/j.jisa.2025.104204_b24) 2006; 52
Chen (10.1016/j.jisa.2025.104204_b28) 2022; 29
An (10.1016/j.jisa.2025.104204_b31) 2024; 211
Kullback (10.1016/j.jisa.2025.104204_b52) 1951; 22
Swain (10.1016/j.jisa.2025.104204_b50) 1991; 7
10.1016/j.jisa.2025.104204_b42
Wang (10.1016/j.jisa.2025.104204_b5) 2025; 143
Ni (10.1016/j.jisa.2025.104204_b23) 2020; 35
Dong (10.1016/j.jisa.2025.104204_b29) 2023; 188
10.1016/j.jisa.2025.104204_b13
10.1016/j.jisa.2025.104204_b11
Wang (10.1016/j.jisa.2025.104204_b3) 2023; 118
Kasiski (10.1016/j.jisa.2025.104204_b15) 1863
Wang (10.1016/j.jisa.2025.104204_b40) 2025; 14
Friedman (10.1016/j.jisa.2025.104204_b16) 1922
Kuo (10.1016/j.jisa.2025.104204_b49) 2008; 16
Massey (10.1016/j.jisa.2025.104204_b7) 1988; 76
Almasri (10.1016/j.jisa.2025.104204_b25) 2020; 34
Zhang (10.1016/j.jisa.2025.104204_b22) 2006; 20
Singh (10.1016/j.jisa.2025.104204_b1) 2023; 79
Abdelfattah (10.1016/j.jisa.2025.104204_b2) 2025; 57
Bao (10.1016/j.jisa.2025.104204_b26) 2020; 19
Yang (10.1016/j.jisa.2025.104204_b19) 2002; 89
Yazicigil (10.1016/j.jisa.2025.104204_b30) 2019; 36
Lang (10.1016/j.jisa.2025.104204_b17) 2008; 46
Lu (10.1016/j.jisa.2025.104204_b46) 2022
Lin (10.1016/j.jisa.2025.104204_b51) 1991; 37
Menezes (10.1016/j.jisa.2025.104204_b6) 1997
Khasanah (10.1016/j.jisa.2025.104204_b14) 2020; 11
Li (10.1016/j.jisa.2025.104204_b39) 2025; 74
10.1016/j.jisa.2025.104204_b37
Schneier (10.1016/j.jisa.2025.104204_b8) 2015
10.1016/j.jisa.2025.104204_b38
10.1016/j.jisa.2025.104204_b36
Duan (10.1016/j.jisa.2025.104204_b45) 2023; 46
Yang (10.1016/j.jisa.2025.104204_b32) 2015; 22
Xue (10.1016/j.jisa.2025.104204_b21) 2025; 224
Carlsen (10.1016/j.jisa.2025.104204_b53) 1994
Bao (10.1016/j.jisa.2025.104204_b27) 2015; 22
Hodosh (10.1016/j.jisa.2025.104204_b43) 2013; 47
Duan (10.1016/j.jisa.2025.104204_b35) 2024; 46
Rachmawati (10.1016/j.jisa.2025.104204_b12) 2018; 6
Dupont (10.1016/j.jisa.2025.104204_b20) 2024; 20
10.1016/j.jisa.2025.104204_b9
van den Oord (10.1016/j.jisa.2025.104204_b34) 2017; 30
References_xml – volume: 140
  year: 2014
  ident: b33
  article-title: Data compression of structural seismic responses via principled independent component analysis
  publication-title: J Struct Eng
– volume: 30
  start-page: 6306
  year: 2017
  end-page: 6315
  ident: b34
  article-title: Neural discrete representation learning
  publication-title: Adv Neural Inf Process Syst
– volume: 79
  year: 2023
  ident: b1
  article-title: Deep learning-based biometric image feature extraction for securing medical images through data hiding and joint encryption–compression
  publication-title: J Inf Secur Appl
– volume: 11
  start-page: 1
  year: 2020
  end-page: 8
  ident: b14
  article-title: Three-pass protocol using hybrid Vigenère-RSA algorithm
  publication-title: Int J Adv Comput Sci Appl
– start-page: 192
  year: 1994
  end-page: 200
  ident: b53
  article-title: Cryptographic protocol flaws: Know your enemy
  publication-title: Proc. the computer security foundations workshop VII
– volume: 143
  start-page: 1595
  year: 2025
  end-page: 1616
  ident: b5
  article-title: A low light image enhancement method based on dehazing physical model
  publication-title: Comput Model Eng Sci
– volume: 35
  start-page: 685
  year: 2020
  end-page: 700
  ident: b23
  article-title: Deep learning for data anomaly detection and data compression of a long-span suspension bridge
  publication-title: Comput Aided Civ Inf Eng
– reference: Loshchilov I, Hutter F. Decoupled weight decay regularization. In: International conference on learning representations. ICLR, 2019.
– reference: Gârbacea C, van den Oord A, Li Y, Lim FSC, Luebs A, Vinyals O, Walters TC. Low Bit-rate Speech Coding with VQ-VAE and a WaveNet Decoder. In: ICASSP 2019 - IEEE int. conf. acoust. speech signal process. 2019, p. 735–9.
– volume: 52
  start-page: 1289
  year: 2006
  end-page: 1306
  ident: b24
  article-title: Compressed sensing
  publication-title: IEEE Trans Inform Theory
– volume: 19
  start-page: 293
  year: 2020
  end-page: 304
  ident: b26
  article-title: Compressive-sensing data reconstruction for structural health monitoring: A machine-learning approach
  publication-title: Struct Heal Monit
– volume: 36
  start-page: 81
  year: 2019
  end-page: 100
  ident: b30
  article-title: Taking compressive sensing to the hardware level: Breaking fundamental radio-frequency hardware performance tradeoffs
  publication-title: IEEE Signal Process Mag
– volume: 34
  year: 2020
  ident: b25
  article-title: Toward compressed sensing of structural monitoring data using discrete cosine transform
  publication-title: J Comput Civ Eng
– reference: Duan Z, Lu M, Ma Z, Zhu F. Lossy image compression with quantized hierarchical VAEs. In: Proc. IEEE/CVF winter conference on applications of computer vision. 2023, p. 198–207.
– volume: 22
  start-page: 1119
  year: 2015
  end-page: 1131
  ident: b32
  article-title: Data compression of very large-scale structural seismic and typhoon responses by low-rank representation with matrix reshape
  publication-title: Struct Control Heal Monit
– reference: Cheng Zhengxue, Sun Heming, Takeuchi Masaru, Katto Jiro. Learned image compression with discretized gaussian mixture likelihoods and attention modules. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition. 2020, p. 7939–48.
– year: 2015
  ident: b8
  article-title: Applied cryptography: Protocols, algorithms, and source code in C
– volume: 47
  start-page: 853
  year: 2013
  end-page: 899
  ident: b43
  article-title: Framing image description as a ranking task: Data, models and evaluation metrics
  publication-title: J Artif Intell Res
– volume: 37
  start-page: 145
  year: 1991
  end-page: 151
  ident: b51
  article-title: Divergence measures based on the Shannon entropy
  publication-title: IEEE Trans Inform Theory
– reference: Subandi B, et al. Vigenère cipher in three-pass protocol for text encryption. In: Proc. IEEE iCSITech. 2017, p. 231–6.
– volume: 62
  start-page: 1
  year: 2024
  end-page: 21
  ident: b4
  article-title: A novel iterative self-organizing pixel matrix entanglement classifier for remote sensing imagery
  publication-title: IEEE Trans Geosci Remote Sens
– volume: 74
  start-page: 1
  year: 2025
  end-page: 8
  ident: b39
  article-title: Active thermography nondestructive testing going beyond camera’s resolution limitation: A heterogenous dual-band single-pixel approach
  publication-title: IEEE Trans Instrum Meas
– volume: 46
  start-page: 436
  year: 2023
  end-page: 450
  ident: b45
  article-title: QARV: Quantization-aware resnet vae for lossy image compression
  publication-title: IEEE Trans Pattern Anal Mach Intell
– volume: 7
  start-page: 11
  year: 1991
  end-page: 32
  ident: b50
  article-title: Color indexing
  publication-title: Int J Comput Vis
– volume: 224
  year: 2025
  ident: b21
  article-title: Frequency enhanced vector quantized variational autoencoder for structural vibration response compression
  publication-title: Mech Syst Signal Process
– reference: Kingma DP, Welling M, et al. Auto-encoding variational Bayes. Banff, Canada; 2013.
– volume: 29
  year: 2022
  ident: b28
  article-title: A deep learning framework for adaptive compressive sensing of high-speed train vibration responses
  publication-title: Struct Control Heal Monit
– volume: 22
  start-page: 79
  year: 1951
  end-page: 86
  ident: b52
  article-title: On information and sufficiency
  publication-title: Ann Math Stat
– volume: 22
  start-page: 433
  year: 2015
  end-page: 448
  ident: b27
  article-title: Compressive sensing-based lost data recovery of fast-moving wireless sensing for structural health monitoring
  publication-title: Struct Control Heal Monit
– volume: 20
  start-page: 390
  year: 2006
  end-page: 399
  ident: b22
  article-title: Wavelet-based vibration sensor data compression technique for civil infrastructure condition monitoring
  publication-title: J Comput Civ Eng
– reference: Oktaviana R, et al. Three-pass protocol implementation using modular exponentiation. In: Proc. IEEE int. conf. ICT. 2016, p. 1–4.
– year: 1986
  ident: b10
  article-title: Method and apparatus for maintaining the privacy of digital messages conveyed by public transmission
– reference: Rachmawati D, et al. H-rabin cryptosystem for three-pass protocol. In: Proc. IEEE ICITACEE. 2017, p. 1–6.
– volume: 14
  start-page: 70
  year: 2025
  ident: b40
  article-title: Single-shot super-resolved fringe projection profilometry (SSSR-FPP): 100,000 frames-per-second 3D imaging with deep learning
  publication-title: Light Sci Appl
– volume: 46
  start-page: 575
  year: 2008
  end-page: 581
  ident: b17
  article-title: Multiple-image encryption via fractional Fourier transform
  publication-title: Opt Lasers Eng
– year: 1863
  ident: b15
  article-title: Die geheimschriften und die dechiffrir-kunst
– reference: Kang N, Qiu S, Zhang S, Li Z, Xia ST. PILC: Practical image lossless compression with an end-to-end GPU-oriented neural framework. In: Proc. IEEE/CVF conference on computer vision and pattern recognition. 2022, p. 3739–48.
– volume: 211
  year: 2024
  ident: b31
  article-title: Deep learning-based sparsity-free compressive sensing method for high accuracy structural vibration response reconstruction
  publication-title: Mech Syst Sig Process
– volume: 46
  start-page: 436
  year: 2024
  end-page: 450
  ident: b35
  article-title: QARV: Quantization-aware ResNet VAE for lossy image compression
  publication-title: IEEE Trans Pattern Anal Mach Intell
– year: 1922
  ident: b16
  article-title: The index of coincidence and its applications in cryptography
– volume: 6
  start-page: 40289
  year: 2018
  end-page: 40298
  ident: b12
  article-title: Enhanced H-Rabin cryptosystem with three large primes
  publication-title: IEEE Access
– volume: 89
  year: 2002
  ident: b19
  article-title: Quantum cryptography for secure communication
  publication-title: Phys Rev Lett
– volume: 90
  start-page: 923
  year: 2010
  end-page: 931
  ident: b18
  article-title: Discrete fractional Fourier transform for image encryption
  publication-title: Signal Process
– year: 1997
  ident: b6
  article-title: Handbook of applied cryptography
– volume: 188
  year: 2023
  ident: b29
  article-title: A fast sparsity-free compressive sensing approach for vibration data reconstruction using deep convolutional GAN
  publication-title: Mech Syst Sig Process
– volume: 57
  year: 2025
  ident: b2
  article-title: Asymmetric optical cryptosystem with secret-key sharing based on coherent superposition and normalized decomposition
  publication-title: Opt Quantum Electron
– volume: 16
  start-page: 3989
  year: 2008
  end-page: 3998
  ident: b49
  article-title: Digital holographic microscopy with automatic focus tracking and common-path interferometry
  publication-title: Opt Express
– volume: 76
  start-page: 533
  year: 1988
  end-page: 549
  ident: b7
  article-title: An introduction to contemporary cryptology
  publication-title: Proc IEEE
– reference: Zou Renjie, Song Chunfeng, Zhang Zhaoxiang. The devil is in the details: Window-based attention for image compression. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition. 2022, p. 17492–501.
– volume: 118
  year: 2023
  ident: b3
  article-title: Low-light image enhancement based on virtual exposure
  publication-title: Signal Process, Image Commun
– volume: 15
  start-page: 8745
  year: 2025
  ident: b41
  article-title: Enhancing object pose estimation for RGB images in cluttered scenes
  publication-title: Sci Rep
– year: 2022
  ident: b46
  article-title: High-efficiency lossy image coding through adaptive neighborhood information aggregation
– volume: 20
  start-page: 237
  year: 2024
  end-page: 248
  ident: b20
  article-title: A new Shamir’s three pass random matrix ciphering mechanism
  publication-title: J Comput Virol Hacking Tech
– volume: 11
  start-page: 1
  issue: 4
  year: 2020
  ident: 10.1016/j.jisa.2025.104204_b14
  article-title: Three-pass protocol using hybrid Vigenère-RSA algorithm
  publication-title: Int J Adv Comput Sci Appl
– volume: 46
  start-page: 436
  issue: 1
  year: 2023
  ident: 10.1016/j.jisa.2025.104204_b45
  article-title: QARV: Quantization-aware resnet vae for lossy image compression
  publication-title: IEEE Trans Pattern Anal Mach Intell
  doi: 10.1109/TPAMI.2023.3322904
– year: 2022
  ident: 10.1016/j.jisa.2025.104204_b46
– volume: 6
  start-page: 40289
  year: 2018
  ident: 10.1016/j.jisa.2025.104204_b12
  article-title: Enhanced H-Rabin cryptosystem with three large primes
  publication-title: IEEE Access
– volume: 20
  start-page: 237
  issue: 2
  year: 2024
  ident: 10.1016/j.jisa.2025.104204_b20
  article-title: A new Shamir’s three pass random matrix ciphering mechanism
  publication-title: J Comput Virol Hacking Tech
  doi: 10.1007/s11416-023-00467-0
– volume: 36
  start-page: 81
  year: 2019
  ident: 10.1016/j.jisa.2025.104204_b30
  article-title: Taking compressive sensing to the hardware level: Breaking fundamental radio-frequency hardware performance tradeoffs
  publication-title: IEEE Signal Process Mag
  doi: 10.1109/MSP.2018.2880837
– ident: 10.1016/j.jisa.2025.104204_b38
  doi: 10.1109/ICASSP.2019.8683277
– volume: 74
  start-page: 1
  year: 2025
  ident: 10.1016/j.jisa.2025.104204_b39
  article-title: Active thermography nondestructive testing going beyond camera’s resolution limitation: A heterogenous dual-band single-pixel approach
  publication-title: IEEE Trans Instrum Meas
– volume: 211
  year: 2024
  ident: 10.1016/j.jisa.2025.104204_b31
  article-title: Deep learning-based sparsity-free compressive sensing method for high accuracy structural vibration response reconstruction
  publication-title: Mech Syst Sig Process
  doi: 10.1016/j.ymssp.2024.111168
– volume: 46
  start-page: 575
  issue: 8
  year: 2008
  ident: 10.1016/j.jisa.2025.104204_b17
  article-title: Multiple-image encryption via fractional Fourier transform
  publication-title: Opt Lasers Eng
– ident: 10.1016/j.jisa.2025.104204_b44
– year: 2015
  ident: 10.1016/j.jisa.2025.104204_b8
– volume: 15
  start-page: 8745
  issue: 1
  year: 2025
  ident: 10.1016/j.jisa.2025.104204_b41
  article-title: Enhancing object pose estimation for RGB images in cluttered scenes
  publication-title: Sci Rep
  doi: 10.1038/s41598-025-90482-6
– ident: 10.1016/j.jisa.2025.104204_b11
– volume: 89
  issue: 25
  year: 2002
  ident: 10.1016/j.jisa.2025.104204_b19
  article-title: Quantum cryptography for secure communication
  publication-title: Phys Rev Lett
– volume: 76
  start-page: 533
  issue: 5
  year: 1988
  ident: 10.1016/j.jisa.2025.104204_b7
  article-title: An introduction to contemporary cryptology
  publication-title: Proc IEEE
  doi: 10.1109/5.4440
– volume: 34
  year: 2020
  ident: 10.1016/j.jisa.2025.104204_b25
  article-title: Toward compressed sensing of structural monitoring data using discrete cosine transform
  publication-title: J Comput Civ Eng
  doi: 10.1061/(ASCE)CP.1943-5487.0000855
– volume: 20
  start-page: 390
  year: 2006
  ident: 10.1016/j.jisa.2025.104204_b22
  article-title: Wavelet-based vibration sensor data compression technique for civil infrastructure condition monitoring
  publication-title: J Comput Civ Eng
  doi: 10.1061/(ASCE)0887-3801(2006)20:6(390)
– volume: 16
  start-page: 3989
  issue: 6
  year: 2008
  ident: 10.1016/j.jisa.2025.104204_b49
  article-title: Digital holographic microscopy with automatic focus tracking and common-path interferometry
  publication-title: Opt Express
– volume: 22
  start-page: 433
  year: 2015
  ident: 10.1016/j.jisa.2025.104204_b27
  article-title: Compressive sensing-based lost data recovery of fast-moving wireless sensing for structural health monitoring
  publication-title: Struct Control Heal Monit
  doi: 10.1002/stc.1681
– volume: 46
  start-page: 436
  year: 2024
  ident: 10.1016/j.jisa.2025.104204_b35
  article-title: QARV: Quantization-aware ResNet VAE for lossy image compression
  publication-title: IEEE Trans Pattern Anal Mach Intell
  doi: 10.1109/TPAMI.2023.3322904
– year: 1986
  ident: 10.1016/j.jisa.2025.104204_b10
– volume: 188
  year: 2023
  ident: 10.1016/j.jisa.2025.104204_b29
  article-title: A fast sparsity-free compressive sensing approach for vibration data reconstruction using deep convolutional GAN
  publication-title: Mech Syst Sig Process
  doi: 10.1016/j.ymssp.2022.109937
– volume: 35
  start-page: 685
  year: 2020
  ident: 10.1016/j.jisa.2025.104204_b23
  article-title: Deep learning for data anomaly detection and data compression of a long-span suspension bridge
  publication-title: Comput Aided Civ Inf Eng
  doi: 10.1111/mice.12528
– volume: 22
  start-page: 79
  issue: 1
  year: 1951
  ident: 10.1016/j.jisa.2025.104204_b52
  article-title: On information and sufficiency
  publication-title: Ann Math Stat
  doi: 10.1214/aoms/1177729694
– year: 1863
  ident: 10.1016/j.jisa.2025.104204_b15
– volume: 224
  year: 2025
  ident: 10.1016/j.jisa.2025.104204_b21
  article-title: Frequency enhanced vector quantized variational autoencoder for structural vibration response compression
  publication-title: Mech Syst Signal Process
  doi: 10.1016/j.ymssp.2024.112136
– ident: 10.1016/j.jisa.2025.104204_b47
  doi: 10.1109/CVPR42600.2020.00796
– volume: 47
  start-page: 853
  year: 2013
  ident: 10.1016/j.jisa.2025.104204_b43
  article-title: Framing image description as a ranking task: Data, models and evaluation metrics
  publication-title: J Artif Intell Res
  doi: 10.1613/jair.3994
– volume: 118
  year: 2023
  ident: 10.1016/j.jisa.2025.104204_b3
  article-title: Low-light image enhancement based on virtual exposure
  publication-title: Signal Process, Image Commun
  doi: 10.1016/j.image.2023.117016
– volume: 29
  year: 2022
  ident: 10.1016/j.jisa.2025.104204_b28
  article-title: A deep learning framework for adaptive compressive sensing of high-speed train vibration responses
  publication-title: Struct Control Heal Monit
– volume: 7
  start-page: 11
  issue: 1
  year: 1991
  ident: 10.1016/j.jisa.2025.104204_b50
  article-title: Color indexing
  publication-title: Int J Comput Vis
  doi: 10.1007/BF00130487
– year: 1997
  ident: 10.1016/j.jisa.2025.104204_b6
– volume: 143
  start-page: 1595
  issue: 2
  year: 2025
  ident: 10.1016/j.jisa.2025.104204_b5
  article-title: A low light image enhancement method based on dehazing physical model
  publication-title: Comput Model Eng Sci
– year: 1922
  ident: 10.1016/j.jisa.2025.104204_b16
– volume: 30
  start-page: 6306
  year: 2017
  ident: 10.1016/j.jisa.2025.104204_b34
  article-title: Neural discrete representation learning
  publication-title: Adv Neural Inf Process Syst
– volume: 19
  start-page: 293
  year: 2020
  ident: 10.1016/j.jisa.2025.104204_b26
  article-title: Compressive-sensing data reconstruction for structural health monitoring: A machine-learning approach
  publication-title: Struct Heal Monit
  doi: 10.1177/1475921719844039
– ident: 10.1016/j.jisa.2025.104204_b9
– ident: 10.1016/j.jisa.2025.104204_b48
  doi: 10.1109/CVPR52688.2022.01697
– volume: 62
  start-page: 1
  year: 2024
  ident: 10.1016/j.jisa.2025.104204_b4
  article-title: A novel iterative self-organizing pixel matrix entanglement classifier for remote sensing imagery
  publication-title: IEEE Trans Geosci Remote Sens
– volume: 52
  start-page: 1289
  year: 2006
  ident: 10.1016/j.jisa.2025.104204_b24
  article-title: Compressed sensing
  publication-title: IEEE Trans Inform Theory
  doi: 10.1109/TIT.2006.871582
– volume: 37
  start-page: 145
  issue: 1
  year: 1991
  ident: 10.1016/j.jisa.2025.104204_b51
  article-title: Divergence measures based on the Shannon entropy
  publication-title: IEEE Trans Inform Theory
  doi: 10.1109/18.61115
– volume: 79
  year: 2023
  ident: 10.1016/j.jisa.2025.104204_b1
  article-title: Deep learning-based biometric image feature extraction for securing medical images through data hiding and joint encryption–compression
  publication-title: J Inf Secur Appl
– ident: 10.1016/j.jisa.2025.104204_b42
– volume: 90
  start-page: 923
  issue: 3
  year: 2010
  ident: 10.1016/j.jisa.2025.104204_b18
  article-title: Discrete fractional Fourier transform for image encryption
  publication-title: Signal Process
– volume: 22
  start-page: 1119
  year: 2015
  ident: 10.1016/j.jisa.2025.104204_b32
  article-title: Data compression of very large-scale structural seismic and typhoon responses by low-rank representation with matrix reshape
  publication-title: Struct Control Heal Monit
  doi: 10.1002/stc.1737
– start-page: 192
  year: 1994
  ident: 10.1016/j.jisa.2025.104204_b53
  article-title: Cryptographic protocol flaws: Know your enemy
– ident: 10.1016/j.jisa.2025.104204_b13
– volume: 140
  year: 2014
  ident: 10.1016/j.jisa.2025.104204_b33
  article-title: Data compression of structural seismic responses via principled independent component analysis
  publication-title: J Struct Eng
  doi: 10.1061/(ASCE)ST.1943-541X.0000946
– volume: 57
  issue: 2
  year: 2025
  ident: 10.1016/j.jisa.2025.104204_b2
  article-title: Asymmetric optical cryptosystem with secret-key sharing based on coherent superposition and normalized decomposition
  publication-title: Opt Quantum Electron
  doi: 10.1007/s11082-025-08061-y
– ident: 10.1016/j.jisa.2025.104204_b37
  doi: 10.1109/CVPR52688.2022.00372
– ident: 10.1016/j.jisa.2025.104204_b36
  doi: 10.1109/WACV56688.2023.00028
– volume: 14
  start-page: 70
  issue: 1
  year: 2025
  ident: 10.1016/j.jisa.2025.104204_b40
  article-title: Single-shot super-resolved fringe projection profilometry (SSSR-FPP): 100,000 frames-per-second 3D imaging with deep learning
  publication-title: Light Sci Appl
  doi: 10.1038/s41377-024-01721-w
SSID ssj0001219523
Score 2.3558729
Snippet Key-based cryptography faces persistent challenges in secure key distribution and newly rising vulnerabilities. Three-Pass Protocols (3PPs) tackle these issues...
SourceID crossref
elsevier
SourceType Index Database
Publisher
StartPage 104204
SubjectTerms Bandwidth efficiency
Fresnel transform
Image compression
Secure image transmission
Three-Pass Protocol
Vector Quantized Variational Autoencoder
Title Compression-enhanced Three-Pass Protocol for secure and bandwidth-efficient image transmission
URI https://dx.doi.org/10.1016/j.jisa.2025.104204
Volume 94
WOSCitedRecordID wos001561531200003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals 2021
  issn: 2214-2126
  databaseCode: AIEXJ
  dateStart: 20130701
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: false
  ssIdentifier: ssj0001219523
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1JT9tAFB6l0EMvFLoIumkOvUUTxbvnGFXQRSrikEo51ZrNTSLiIGIo4hfws_vezDg2kFZw6GUUWc7LyN-XN89vJeSj0iIIVKbYMNNDFsdlwEQYaBalqQbrQivDhR02kR0f55MJP-n1bppamMvTrKryqyt-9l-hhmsANpbOPgLutVC4AJ8BdFgBdlgfBDz-w11ya8VMNXUR_jFAZtgJWMpYGlAvAX6bYLhCd7uLIEhYfs90PWXGtpXAJIHZAlN6ajzPgA-rBsP7xqzvv2rJtPIj8Vwf2E6AvA01aXNairoW1qfzfTkVcCb3Pw_aRJIKDFsbKRpNF778yjpsf4lrl5wG59qifzToOi3CxFfvrXVbGAYxg1Mz7SpiHnc0Kbwmhm4w8T0l7_wN88Ecw_0ofdDefLuj9p2Tbp1_2KS2zQuUUaCMwsl4QrbDLOGg4rdHXw8n3zr-uoAndlrgeu--BsulC97dzGY7p2O7jHfJjseJjhxZ9kjPVC_I82agB_X6_SX5uYk7tOUObbhDAW3quEMBZbqBO9Ryh3a584r8ODocf_rC_AAOpsIkqpkRMS-Vwi59YJiiZapllKk0M2VaplivV8ILhcq54qEeqhhUOGxL5mBGp8LwJHpNtqplZfYJDRKM98o8lxl2KATVIWU0lOghKbkMzAHpN4-rOHN9Voq_o3RAkuaJFt5SdBZgARz5x_fePOpX3pJnLXffka36_MK8J0_VZT1bnX_wBPkDfaaNEA
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Compression-enhanced+Three-Pass+Protocol+for+secure+and+bandwidth-efficient+image+transmission&rft.jtitle=Journal+of+information+security+and+applications&rft.au=Abdelfattah%2C+Mohamed+G.&rft.au=Elnakib%2C+Ahmed&rft.au=Hegazy%2C+Salem+F.&rft.date=2025-11-01&rft.issn=2214-2126&rft.volume=94&rft.spage=104204&rft_id=info:doi/10.1016%2Fj.jisa.2025.104204&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_jisa_2025_104204
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2214-2126&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2214-2126&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2214-2126&client=summon