Compression-enhanced Three-Pass Protocol for secure and bandwidth-efficient image transmission
Key-based cryptography faces persistent challenges in secure key distribution and newly rising vulnerabilities. Three-Pass Protocols (3PPs) tackle these issues through commutative encryption but typically triple bandwidth requirements. This paper addresses these bandwidth limitations by integrating...
Uložené v:
| Vydané v: | Journal of information security and applications Ročník 94; s. 104204 |
|---|---|
| Hlavní autori: | , , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
Elsevier Ltd
01.11.2025
|
| Predmet: | |
| ISSN: | 2214-2126 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | Key-based cryptography faces persistent challenges in secure key distribution and newly rising vulnerabilities. Three-Pass Protocols (3PPs) tackle these issues through commutative encryption but typically triple bandwidth requirements. This paper addresses these bandwidth limitations by integrating an entropy-regularized Vector Quantized Variational Autoencoder (VQ-VAE) into a Fresnel-transform-based 3PP. Our VQ-VAE, trained on the Flickr8k dataset, achieves high-quality compression (average PSNR ≈ 31 dB, average MS-SSIM ≈ 0.96) at an average low bitrate (< 0.35 bpp), reducing 3PP bandwidth requirements by over 97%. Comparative analysis at about 0.3 bpp demonstrates its competitive performance with recent state-of-the-art image compression techniques, and ablation studies validate the contribution of each key component to its overall efficacy. Compressed latent representations are then encrypted via commutative Fresnel transforms, enabling secure, keyless decryption. Security analysis reveals minimal correlation coefficient (CC<0.04) between original and encrypted latents, while decrypted latents fully recover the originals (CC =1.0). The final reconstructed images maintain high fidelity (CC >0.98). Furthermore, encrypted latents exhibit negligible adjacent-pixel correlation (< 0.05), highlighting strong immunity to statistical attacks. Histogram analysis shows a high Kullback–Leibler (KL) divergence (> 3.29) and a low histogram intersection (0.597) between ciphers and original latents, underscoring robust resistance to frequency-based methods. Sensitivity analysis reveals that a minute deviation in the diffraction distance (10−5 m) severely degrades decryption quality (CC < 0.05), demonstrating resistance against brute-force attacks. A lightweight verification step thwarts replay attacks, a known 3PP weakness. This framework enables secure and bandwidth-efficient image transmission, making it suitable for resource-constrained and security-critical applications such as telemedicine and remote-sensing downlinks. |
|---|---|
| AbstractList | Key-based cryptography faces persistent challenges in secure key distribution and newly rising vulnerabilities. Three-Pass Protocols (3PPs) tackle these issues through commutative encryption but typically triple bandwidth requirements. This paper addresses these bandwidth limitations by integrating an entropy-regularized Vector Quantized Variational Autoencoder (VQ-VAE) into a Fresnel-transform-based 3PP. Our VQ-VAE, trained on the Flickr8k dataset, achieves high-quality compression (average PSNR ≈ 31 dB, average MS-SSIM ≈ 0.96) at an average low bitrate (< 0.35 bpp), reducing 3PP bandwidth requirements by over 97%. Comparative analysis at about 0.3 bpp demonstrates its competitive performance with recent state-of-the-art image compression techniques, and ablation studies validate the contribution of each key component to its overall efficacy. Compressed latent representations are then encrypted via commutative Fresnel transforms, enabling secure, keyless decryption. Security analysis reveals minimal correlation coefficient (CC<0.04) between original and encrypted latents, while decrypted latents fully recover the originals (CC =1.0). The final reconstructed images maintain high fidelity (CC >0.98). Furthermore, encrypted latents exhibit negligible adjacent-pixel correlation (< 0.05), highlighting strong immunity to statistical attacks. Histogram analysis shows a high Kullback–Leibler (KL) divergence (> 3.29) and a low histogram intersection (0.597) between ciphers and original latents, underscoring robust resistance to frequency-based methods. Sensitivity analysis reveals that a minute deviation in the diffraction distance (10−5 m) severely degrades decryption quality (CC < 0.05), demonstrating resistance against brute-force attacks. A lightweight verification step thwarts replay attacks, a known 3PP weakness. This framework enables secure and bandwidth-efficient image transmission, making it suitable for resource-constrained and security-critical applications such as telemedicine and remote-sensing downlinks. |
| ArticleNumber | 104204 |
| Author | Abdelfattah, Mohamed G. Hegazy, Salem F. Elnakib, Ahmed |
| Author_xml | – sequence: 1 givenname: Mohamed G. orcidid: 0000-0002-9889-3569 surname: Abdelfattah fullname: Abdelfattah, Mohamed G. email: eng.mo.gamal@mans.edu.eg organization: Department of Electronics and Communications Engineering, Faculty of Engineering, Mansoura University, Mansoura, 35516, Egypt – sequence: 2 givenname: Ahmed surname: Elnakib fullname: Elnakib, Ahmed organization: Department of Electronics and Communications Engineering, Faculty of Engineering, Mansoura University, Mansoura, 35516, Egypt – sequence: 3 givenname: Salem F. orcidid: 0000-0002-6260-1181 surname: Hegazy fullname: Hegazy, Salem F. email: salem@niles.edu.eg organization: National Institute of Laser Enhanced Sciences, Cairo University, Giza, 12613, Egypt |
| BookMark | eNp9kE1LAzEQhnOoYNX-AU_5A6nJZJN2wYsUv6BgD_VqyGYnNkublGRV_PfuWs9eZmDgeXnnuSCTmCISci34XHChb7p5F4qdAwc1HCrg1YRMAUTFQIA-J7NSOs65AFErkFPytkqHY8ZSQooM485Ghy3d7jIi29hS6CanPrm0pz5lWtB9ZKQ2trQZxldo-x1D74MLGHsaDvYdaZ9tLIfwG3lFzrzdF5z97Uvy-nC_XT2x9cvj8-puzRwo2TO0Ve2dE0qB1lIqVbWNXDi9QK-9VkspvRDKLWtXQ8td1XA-1GyWoLS2WCt5SeCU63IqJaM3xzy0yd9GcDOKMZ0ZxZhRjDmJGaDbE4RDs8-A2ZTxjyE5ZHS9aVP4D_8BHP5xLQ |
| Cites_doi | 10.1109/TPAMI.2023.3322904 10.1007/s11416-023-00467-0 10.1109/MSP.2018.2880837 10.1109/ICASSP.2019.8683277 10.1016/j.ymssp.2024.111168 10.1038/s41598-025-90482-6 10.1109/5.4440 10.1061/(ASCE)CP.1943-5487.0000855 10.1061/(ASCE)0887-3801(2006)20:6(390) 10.1002/stc.1681 10.1016/j.ymssp.2022.109937 10.1111/mice.12528 10.1214/aoms/1177729694 10.1016/j.ymssp.2024.112136 10.1109/CVPR42600.2020.00796 10.1613/jair.3994 10.1016/j.image.2023.117016 10.1007/BF00130487 10.1177/1475921719844039 10.1109/CVPR52688.2022.01697 10.1109/TIT.2006.871582 10.1109/18.61115 10.1002/stc.1737 10.1061/(ASCE)ST.1943-541X.0000946 10.1007/s11082-025-08061-y 10.1109/CVPR52688.2022.00372 10.1109/WACV56688.2023.00028 10.1038/s41377-024-01721-w |
| ContentType | Journal Article |
| Copyright | 2025 Elsevier Ltd |
| Copyright_xml | – notice: 2025 Elsevier Ltd |
| DBID | AAYXX CITATION |
| DOI | 10.1016/j.jisa.2025.104204 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| ExternalDocumentID | 10_1016_j_jisa_2025_104204 S2214212625002418 |
| GroupedDBID | --M .~1 1~. 4.4 457 4G. 5VS 7-5 8P~ AAEDT AAEDW AAFJI AAIKJ AAKOC AALRI AAOAW AAQFI AATTM AAXKI AAXUO AAYFN AAYWO ABBOA ABMAC ABXDB ACDAQ ACGFS ACLOT ACRLP ACVFH ACZNC ADBBV ADCNI ADEZE AEBSH AEIPS AEKER AEUPX AFJKZ AFPUW AFTJW AGHFR AGUBO AIALX AIEXJ AIGII AIIUN AIKHN AITUG AKBMS AKRWK AKYEP ALMA_UNASSIGNED_HOLDINGS AMRAJ ANKPU AOMHK AOUOD APXCP AVARZ AXJTR BKOJK BLXMC EBS EFJIC EFKBS EFLBG EJD FDB FIRID FNPLU FYGXN GBLVA GBOLZ KOM M41 MO0 OAUVE P-8 P-9 PC. PRBVW ROL SPC SPCBC SSB SSO SSV SSZ T5K ~G- AAYXX CITATION |
| ID | FETCH-LOGICAL-c253t-ea49fcc15526633554db37c67ef6f65833f115c89c92d0c4b00cedb82566ae953 |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001561531200003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2214-2126 |
| IngestDate | Wed Oct 29 21:19:07 EDT 2025 Sat Nov 22 16:51:04 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Three-Pass Protocol Fresnel transform Image compression Bandwidth efficiency Vector Quantized Variational Autoencoder Secure image transmission |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c253t-ea49fcc15526633554db37c67ef6f65833f115c89c92d0c4b00cedb82566ae953 |
| ORCID | 0000-0002-6260-1181 0000-0002-9889-3569 |
| ParticipantIDs | crossref_primary_10_1016_j_jisa_2025_104204 elsevier_sciencedirect_doi_10_1016_j_jisa_2025_104204 |
| PublicationCentury | 2000 |
| PublicationDate | November 2025 2025-11-00 |
| PublicationDateYYYYMMDD | 2025-11-01 |
| PublicationDate_xml | – month: 11 year: 2025 text: November 2025 |
| PublicationDecade | 2020 |
| PublicationTitle | Journal of information security and applications |
| PublicationYear | 2025 |
| Publisher | Elsevier Ltd |
| Publisher_xml | – name: Elsevier Ltd |
| References | Lu, Chen, Pu, Ma (b46) 2022 Loshchilov I, Hutter F. Decoupled weight decay regularization. In: International conference on learning representations. ICLR, 2019. Singh, Baranwal, Singh, Singh, Zhou (b1) 2023; 79 Almasri, Sadhu, Chaudhuri (b25) 2020; 34 Yang, Nagarajaiah (b33) 2014; 140 Khasanah (b14) 2020; 11 Oktaviana R, et al. Three-pass protocol implementation using modular exponentiation. In: Proc. IEEE int. conf. ICT. 2016, p. 1–4. An, Xue, Ou (b31) 2024; 211 Lin (b51) 1991; 37 Bao, Tang, Li (b26) 2020; 19 Kuo, Shyu, Lin, Lee, Chiang (b49) 2008; 16 Lang (b18) 2010; 90 Friedman (b16) 1922 Gârbacea C, van den Oord A, Li Y, Lim FSC, Luebs A, Vinyals O, Walters TC. Low Bit-rate Speech Coding with VQ-VAE and a WaveNet Decoder. In: ICASSP 2019 - IEEE int. conf. acoust. speech signal process. 2019, p. 735–9. Xue, An, Ou (b21) 2025; 224 van den Oord, Vinyals, Kavukcuoglu (b34) 2017; 30 Rachmawati D, et al. H-rabin cryptosystem for three-pass protocol. In: Proc. IEEE ICITACEE. 2017, p. 1–6. Zou Renjie, Song Chunfeng, Zhang Zhaoxiang. The devil is in the details: Window-based attention for image compression. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition. 2022, p. 17492–501. Al-Selwi, Ning, Gao, Chao, Li, Li (b41) 2025; 15 Zhang, Li (b22) 2006; 20 Dong, Wan, Luo, Todd (b29) 2023; 188 Yazicigil, Haque, Kinget, Wright (b30) 2019; 36 Kullback, Leibler (b52) 1951; 22 Li, Wang, He, Gao, Zhang, Wang (b39) 2025; 74 Massey, Omura (b10) 1986 Wang, Chen, Qian, Feng, Chen, Zuo (b40) 2025; 14 Yang (b19) 2002; 89 Bao, Yu, Li, Mao, Jiao, Zou, Ou (b27) 2015; 22 Massey (b7) 1988; 76 Kingma DP, Welling M, et al. Auto-encoding variational Bayes. Banff, Canada; 2013. Cheng Zhengxue, Sun Heming, Takeuchi Masaru, Katto Jiro. Learned image compression with discretized gaussian mixture likelihoods and attention modules. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition. 2020, p. 7939–48. Swain, Ballard (b50) 1991; 7 Yang, Nagarajaiah, Ni (b32) 2015; 22 Abdelfattah, Hegazy, Obayya (b2) 2025; 57 Hodosh, Young, Hockenmaier (b43) 2013; 47 Wang, Yan, Wu, He, Chen, Yuan, Li (b3) 2023; 118 Wang, Yin, Li, Li, Liu (b5) 2025; 143 Donoho (b24) 2006; 52 Duan, Lu, Ma, Huang, Ma, Zhu (b45) 2023; 46 Duan, Lu, Ma, Huang, Ma, Zhu (b35) 2024; 46 Carlsen (b53) 1994 Menezes, van Oorschot, Vanstone (b6) 1997 Kang N, Qiu S, Zhang S, Li Z, Xia ST. PILC: Practical image lossless compression with an end-to-end GPU-oriented neural framework. In: Proc. IEEE/CVF conference on computer vision and pattern recognition. 2022, p. 3739–48. Kasiski (b15) 1863 Schneier (b8) 2015 Lang (b17) 2008; 46 Dupont (b20) 2024; 20 Zhou, Qian, Gamba (b4) 2024; 62 Subandi B, et al. Vigenère cipher in three-pass protocol for text encryption. In: Proc. IEEE iCSITech. 2017, p. 231–6. Duan Z, Lu M, Ma Z, Zhu F. Lossy image compression with quantized hierarchical VAEs. In: Proc. IEEE/CVF winter conference on applications of computer vision. 2023, p. 198–207. Rachmawati (b12) 2018; 6 Ni, Zhang, Noori (b23) 2020; 35 Chen, Ni, Zhou (b28) 2022; 29 Al-Selwi (10.1016/j.jisa.2025.104204_b41) 2025; 15 10.1016/j.jisa.2025.104204_b48 Yang (10.1016/j.jisa.2025.104204_b33) 2014; 140 10.1016/j.jisa.2025.104204_b47 Massey (10.1016/j.jisa.2025.104204_b10) 1986 10.1016/j.jisa.2025.104204_b44 Zhou (10.1016/j.jisa.2025.104204_b4) 2024; 62 Lang (10.1016/j.jisa.2025.104204_b18) 2010; 90 Donoho (10.1016/j.jisa.2025.104204_b24) 2006; 52 Chen (10.1016/j.jisa.2025.104204_b28) 2022; 29 An (10.1016/j.jisa.2025.104204_b31) 2024; 211 Kullback (10.1016/j.jisa.2025.104204_b52) 1951; 22 Swain (10.1016/j.jisa.2025.104204_b50) 1991; 7 10.1016/j.jisa.2025.104204_b42 Wang (10.1016/j.jisa.2025.104204_b5) 2025; 143 Ni (10.1016/j.jisa.2025.104204_b23) 2020; 35 Dong (10.1016/j.jisa.2025.104204_b29) 2023; 188 10.1016/j.jisa.2025.104204_b13 10.1016/j.jisa.2025.104204_b11 Wang (10.1016/j.jisa.2025.104204_b3) 2023; 118 Kasiski (10.1016/j.jisa.2025.104204_b15) 1863 Wang (10.1016/j.jisa.2025.104204_b40) 2025; 14 Friedman (10.1016/j.jisa.2025.104204_b16) 1922 Kuo (10.1016/j.jisa.2025.104204_b49) 2008; 16 Massey (10.1016/j.jisa.2025.104204_b7) 1988; 76 Almasri (10.1016/j.jisa.2025.104204_b25) 2020; 34 Zhang (10.1016/j.jisa.2025.104204_b22) 2006; 20 Singh (10.1016/j.jisa.2025.104204_b1) 2023; 79 Abdelfattah (10.1016/j.jisa.2025.104204_b2) 2025; 57 Bao (10.1016/j.jisa.2025.104204_b26) 2020; 19 Yang (10.1016/j.jisa.2025.104204_b19) 2002; 89 Yazicigil (10.1016/j.jisa.2025.104204_b30) 2019; 36 Lang (10.1016/j.jisa.2025.104204_b17) 2008; 46 Lu (10.1016/j.jisa.2025.104204_b46) 2022 Lin (10.1016/j.jisa.2025.104204_b51) 1991; 37 Menezes (10.1016/j.jisa.2025.104204_b6) 1997 Khasanah (10.1016/j.jisa.2025.104204_b14) 2020; 11 Li (10.1016/j.jisa.2025.104204_b39) 2025; 74 10.1016/j.jisa.2025.104204_b37 Schneier (10.1016/j.jisa.2025.104204_b8) 2015 10.1016/j.jisa.2025.104204_b38 10.1016/j.jisa.2025.104204_b36 Duan (10.1016/j.jisa.2025.104204_b45) 2023; 46 Yang (10.1016/j.jisa.2025.104204_b32) 2015; 22 Xue (10.1016/j.jisa.2025.104204_b21) 2025; 224 Carlsen (10.1016/j.jisa.2025.104204_b53) 1994 Bao (10.1016/j.jisa.2025.104204_b27) 2015; 22 Hodosh (10.1016/j.jisa.2025.104204_b43) 2013; 47 Duan (10.1016/j.jisa.2025.104204_b35) 2024; 46 Rachmawati (10.1016/j.jisa.2025.104204_b12) 2018; 6 Dupont (10.1016/j.jisa.2025.104204_b20) 2024; 20 10.1016/j.jisa.2025.104204_b9 van den Oord (10.1016/j.jisa.2025.104204_b34) 2017; 30 |
| References_xml | – volume: 140 year: 2014 ident: b33 article-title: Data compression of structural seismic responses via principled independent component analysis publication-title: J Struct Eng – volume: 30 start-page: 6306 year: 2017 end-page: 6315 ident: b34 article-title: Neural discrete representation learning publication-title: Adv Neural Inf Process Syst – volume: 79 year: 2023 ident: b1 article-title: Deep learning-based biometric image feature extraction for securing medical images through data hiding and joint encryption–compression publication-title: J Inf Secur Appl – volume: 11 start-page: 1 year: 2020 end-page: 8 ident: b14 article-title: Three-pass protocol using hybrid Vigenère-RSA algorithm publication-title: Int J Adv Comput Sci Appl – start-page: 192 year: 1994 end-page: 200 ident: b53 article-title: Cryptographic protocol flaws: Know your enemy publication-title: Proc. the computer security foundations workshop VII – volume: 143 start-page: 1595 year: 2025 end-page: 1616 ident: b5 article-title: A low light image enhancement method based on dehazing physical model publication-title: Comput Model Eng Sci – volume: 35 start-page: 685 year: 2020 end-page: 700 ident: b23 article-title: Deep learning for data anomaly detection and data compression of a long-span suspension bridge publication-title: Comput Aided Civ Inf Eng – reference: Loshchilov I, Hutter F. Decoupled weight decay regularization. In: International conference on learning representations. ICLR, 2019. – reference: Gârbacea C, van den Oord A, Li Y, Lim FSC, Luebs A, Vinyals O, Walters TC. Low Bit-rate Speech Coding with VQ-VAE and a WaveNet Decoder. In: ICASSP 2019 - IEEE int. conf. acoust. speech signal process. 2019, p. 735–9. – volume: 52 start-page: 1289 year: 2006 end-page: 1306 ident: b24 article-title: Compressed sensing publication-title: IEEE Trans Inform Theory – volume: 19 start-page: 293 year: 2020 end-page: 304 ident: b26 article-title: Compressive-sensing data reconstruction for structural health monitoring: A machine-learning approach publication-title: Struct Heal Monit – volume: 36 start-page: 81 year: 2019 end-page: 100 ident: b30 article-title: Taking compressive sensing to the hardware level: Breaking fundamental radio-frequency hardware performance tradeoffs publication-title: IEEE Signal Process Mag – volume: 34 year: 2020 ident: b25 article-title: Toward compressed sensing of structural monitoring data using discrete cosine transform publication-title: J Comput Civ Eng – reference: Duan Z, Lu M, Ma Z, Zhu F. Lossy image compression with quantized hierarchical VAEs. In: Proc. IEEE/CVF winter conference on applications of computer vision. 2023, p. 198–207. – volume: 22 start-page: 1119 year: 2015 end-page: 1131 ident: b32 article-title: Data compression of very large-scale structural seismic and typhoon responses by low-rank representation with matrix reshape publication-title: Struct Control Heal Monit – reference: Cheng Zhengxue, Sun Heming, Takeuchi Masaru, Katto Jiro. Learned image compression with discretized gaussian mixture likelihoods and attention modules. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition. 2020, p. 7939–48. – year: 2015 ident: b8 article-title: Applied cryptography: Protocols, algorithms, and source code in C – volume: 47 start-page: 853 year: 2013 end-page: 899 ident: b43 article-title: Framing image description as a ranking task: Data, models and evaluation metrics publication-title: J Artif Intell Res – volume: 37 start-page: 145 year: 1991 end-page: 151 ident: b51 article-title: Divergence measures based on the Shannon entropy publication-title: IEEE Trans Inform Theory – reference: Subandi B, et al. Vigenère cipher in three-pass protocol for text encryption. In: Proc. IEEE iCSITech. 2017, p. 231–6. – volume: 62 start-page: 1 year: 2024 end-page: 21 ident: b4 article-title: A novel iterative self-organizing pixel matrix entanglement classifier for remote sensing imagery publication-title: IEEE Trans Geosci Remote Sens – volume: 74 start-page: 1 year: 2025 end-page: 8 ident: b39 article-title: Active thermography nondestructive testing going beyond camera’s resolution limitation: A heterogenous dual-band single-pixel approach publication-title: IEEE Trans Instrum Meas – volume: 46 start-page: 436 year: 2023 end-page: 450 ident: b45 article-title: QARV: Quantization-aware resnet vae for lossy image compression publication-title: IEEE Trans Pattern Anal Mach Intell – volume: 7 start-page: 11 year: 1991 end-page: 32 ident: b50 article-title: Color indexing publication-title: Int J Comput Vis – volume: 224 year: 2025 ident: b21 article-title: Frequency enhanced vector quantized variational autoencoder for structural vibration response compression publication-title: Mech Syst Signal Process – reference: Kingma DP, Welling M, et al. Auto-encoding variational Bayes. Banff, Canada; 2013. – volume: 29 year: 2022 ident: b28 article-title: A deep learning framework for adaptive compressive sensing of high-speed train vibration responses publication-title: Struct Control Heal Monit – volume: 22 start-page: 79 year: 1951 end-page: 86 ident: b52 article-title: On information and sufficiency publication-title: Ann Math Stat – volume: 22 start-page: 433 year: 2015 end-page: 448 ident: b27 article-title: Compressive sensing-based lost data recovery of fast-moving wireless sensing for structural health monitoring publication-title: Struct Control Heal Monit – volume: 20 start-page: 390 year: 2006 end-page: 399 ident: b22 article-title: Wavelet-based vibration sensor data compression technique for civil infrastructure condition monitoring publication-title: J Comput Civ Eng – reference: Oktaviana R, et al. Three-pass protocol implementation using modular exponentiation. In: Proc. IEEE int. conf. ICT. 2016, p. 1–4. – year: 1986 ident: b10 article-title: Method and apparatus for maintaining the privacy of digital messages conveyed by public transmission – reference: Rachmawati D, et al. H-rabin cryptosystem for three-pass protocol. In: Proc. IEEE ICITACEE. 2017, p. 1–6. – volume: 14 start-page: 70 year: 2025 ident: b40 article-title: Single-shot super-resolved fringe projection profilometry (SSSR-FPP): 100,000 frames-per-second 3D imaging with deep learning publication-title: Light Sci Appl – volume: 46 start-page: 575 year: 2008 end-page: 581 ident: b17 article-title: Multiple-image encryption via fractional Fourier transform publication-title: Opt Lasers Eng – year: 1863 ident: b15 article-title: Die geheimschriften und die dechiffrir-kunst – reference: Kang N, Qiu S, Zhang S, Li Z, Xia ST. PILC: Practical image lossless compression with an end-to-end GPU-oriented neural framework. In: Proc. IEEE/CVF conference on computer vision and pattern recognition. 2022, p. 3739–48. – volume: 211 year: 2024 ident: b31 article-title: Deep learning-based sparsity-free compressive sensing method for high accuracy structural vibration response reconstruction publication-title: Mech Syst Sig Process – volume: 46 start-page: 436 year: 2024 end-page: 450 ident: b35 article-title: QARV: Quantization-aware ResNet VAE for lossy image compression publication-title: IEEE Trans Pattern Anal Mach Intell – year: 1922 ident: b16 article-title: The index of coincidence and its applications in cryptography – volume: 6 start-page: 40289 year: 2018 end-page: 40298 ident: b12 article-title: Enhanced H-Rabin cryptosystem with three large primes publication-title: IEEE Access – volume: 89 year: 2002 ident: b19 article-title: Quantum cryptography for secure communication publication-title: Phys Rev Lett – volume: 90 start-page: 923 year: 2010 end-page: 931 ident: b18 article-title: Discrete fractional Fourier transform for image encryption publication-title: Signal Process – year: 1997 ident: b6 article-title: Handbook of applied cryptography – volume: 188 year: 2023 ident: b29 article-title: A fast sparsity-free compressive sensing approach for vibration data reconstruction using deep convolutional GAN publication-title: Mech Syst Sig Process – volume: 57 year: 2025 ident: b2 article-title: Asymmetric optical cryptosystem with secret-key sharing based on coherent superposition and normalized decomposition publication-title: Opt Quantum Electron – volume: 16 start-page: 3989 year: 2008 end-page: 3998 ident: b49 article-title: Digital holographic microscopy with automatic focus tracking and common-path interferometry publication-title: Opt Express – volume: 76 start-page: 533 year: 1988 end-page: 549 ident: b7 article-title: An introduction to contemporary cryptology publication-title: Proc IEEE – reference: Zou Renjie, Song Chunfeng, Zhang Zhaoxiang. The devil is in the details: Window-based attention for image compression. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition. 2022, p. 17492–501. – volume: 118 year: 2023 ident: b3 article-title: Low-light image enhancement based on virtual exposure publication-title: Signal Process, Image Commun – volume: 15 start-page: 8745 year: 2025 ident: b41 article-title: Enhancing object pose estimation for RGB images in cluttered scenes publication-title: Sci Rep – year: 2022 ident: b46 article-title: High-efficiency lossy image coding through adaptive neighborhood information aggregation – volume: 20 start-page: 237 year: 2024 end-page: 248 ident: b20 article-title: A new Shamir’s three pass random matrix ciphering mechanism publication-title: J Comput Virol Hacking Tech – volume: 11 start-page: 1 issue: 4 year: 2020 ident: 10.1016/j.jisa.2025.104204_b14 article-title: Three-pass protocol using hybrid Vigenère-RSA algorithm publication-title: Int J Adv Comput Sci Appl – volume: 46 start-page: 436 issue: 1 year: 2023 ident: 10.1016/j.jisa.2025.104204_b45 article-title: QARV: Quantization-aware resnet vae for lossy image compression publication-title: IEEE Trans Pattern Anal Mach Intell doi: 10.1109/TPAMI.2023.3322904 – year: 2022 ident: 10.1016/j.jisa.2025.104204_b46 – volume: 6 start-page: 40289 year: 2018 ident: 10.1016/j.jisa.2025.104204_b12 article-title: Enhanced H-Rabin cryptosystem with three large primes publication-title: IEEE Access – volume: 20 start-page: 237 issue: 2 year: 2024 ident: 10.1016/j.jisa.2025.104204_b20 article-title: A new Shamir’s three pass random matrix ciphering mechanism publication-title: J Comput Virol Hacking Tech doi: 10.1007/s11416-023-00467-0 – volume: 36 start-page: 81 year: 2019 ident: 10.1016/j.jisa.2025.104204_b30 article-title: Taking compressive sensing to the hardware level: Breaking fundamental radio-frequency hardware performance tradeoffs publication-title: IEEE Signal Process Mag doi: 10.1109/MSP.2018.2880837 – ident: 10.1016/j.jisa.2025.104204_b38 doi: 10.1109/ICASSP.2019.8683277 – volume: 74 start-page: 1 year: 2025 ident: 10.1016/j.jisa.2025.104204_b39 article-title: Active thermography nondestructive testing going beyond camera’s resolution limitation: A heterogenous dual-band single-pixel approach publication-title: IEEE Trans Instrum Meas – volume: 211 year: 2024 ident: 10.1016/j.jisa.2025.104204_b31 article-title: Deep learning-based sparsity-free compressive sensing method for high accuracy structural vibration response reconstruction publication-title: Mech Syst Sig Process doi: 10.1016/j.ymssp.2024.111168 – volume: 46 start-page: 575 issue: 8 year: 2008 ident: 10.1016/j.jisa.2025.104204_b17 article-title: Multiple-image encryption via fractional Fourier transform publication-title: Opt Lasers Eng – ident: 10.1016/j.jisa.2025.104204_b44 – year: 2015 ident: 10.1016/j.jisa.2025.104204_b8 – volume: 15 start-page: 8745 issue: 1 year: 2025 ident: 10.1016/j.jisa.2025.104204_b41 article-title: Enhancing object pose estimation for RGB images in cluttered scenes publication-title: Sci Rep doi: 10.1038/s41598-025-90482-6 – ident: 10.1016/j.jisa.2025.104204_b11 – volume: 89 issue: 25 year: 2002 ident: 10.1016/j.jisa.2025.104204_b19 article-title: Quantum cryptography for secure communication publication-title: Phys Rev Lett – volume: 76 start-page: 533 issue: 5 year: 1988 ident: 10.1016/j.jisa.2025.104204_b7 article-title: An introduction to contemporary cryptology publication-title: Proc IEEE doi: 10.1109/5.4440 – volume: 34 year: 2020 ident: 10.1016/j.jisa.2025.104204_b25 article-title: Toward compressed sensing of structural monitoring data using discrete cosine transform publication-title: J Comput Civ Eng doi: 10.1061/(ASCE)CP.1943-5487.0000855 – volume: 20 start-page: 390 year: 2006 ident: 10.1016/j.jisa.2025.104204_b22 article-title: Wavelet-based vibration sensor data compression technique for civil infrastructure condition monitoring publication-title: J Comput Civ Eng doi: 10.1061/(ASCE)0887-3801(2006)20:6(390) – volume: 16 start-page: 3989 issue: 6 year: 2008 ident: 10.1016/j.jisa.2025.104204_b49 article-title: Digital holographic microscopy with automatic focus tracking and common-path interferometry publication-title: Opt Express – volume: 22 start-page: 433 year: 2015 ident: 10.1016/j.jisa.2025.104204_b27 article-title: Compressive sensing-based lost data recovery of fast-moving wireless sensing for structural health monitoring publication-title: Struct Control Heal Monit doi: 10.1002/stc.1681 – volume: 46 start-page: 436 year: 2024 ident: 10.1016/j.jisa.2025.104204_b35 article-title: QARV: Quantization-aware ResNet VAE for lossy image compression publication-title: IEEE Trans Pattern Anal Mach Intell doi: 10.1109/TPAMI.2023.3322904 – year: 1986 ident: 10.1016/j.jisa.2025.104204_b10 – volume: 188 year: 2023 ident: 10.1016/j.jisa.2025.104204_b29 article-title: A fast sparsity-free compressive sensing approach for vibration data reconstruction using deep convolutional GAN publication-title: Mech Syst Sig Process doi: 10.1016/j.ymssp.2022.109937 – volume: 35 start-page: 685 year: 2020 ident: 10.1016/j.jisa.2025.104204_b23 article-title: Deep learning for data anomaly detection and data compression of a long-span suspension bridge publication-title: Comput Aided Civ Inf Eng doi: 10.1111/mice.12528 – volume: 22 start-page: 79 issue: 1 year: 1951 ident: 10.1016/j.jisa.2025.104204_b52 article-title: On information and sufficiency publication-title: Ann Math Stat doi: 10.1214/aoms/1177729694 – year: 1863 ident: 10.1016/j.jisa.2025.104204_b15 – volume: 224 year: 2025 ident: 10.1016/j.jisa.2025.104204_b21 article-title: Frequency enhanced vector quantized variational autoencoder for structural vibration response compression publication-title: Mech Syst Signal Process doi: 10.1016/j.ymssp.2024.112136 – ident: 10.1016/j.jisa.2025.104204_b47 doi: 10.1109/CVPR42600.2020.00796 – volume: 47 start-page: 853 year: 2013 ident: 10.1016/j.jisa.2025.104204_b43 article-title: Framing image description as a ranking task: Data, models and evaluation metrics publication-title: J Artif Intell Res doi: 10.1613/jair.3994 – volume: 118 year: 2023 ident: 10.1016/j.jisa.2025.104204_b3 article-title: Low-light image enhancement based on virtual exposure publication-title: Signal Process, Image Commun doi: 10.1016/j.image.2023.117016 – volume: 29 year: 2022 ident: 10.1016/j.jisa.2025.104204_b28 article-title: A deep learning framework for adaptive compressive sensing of high-speed train vibration responses publication-title: Struct Control Heal Monit – volume: 7 start-page: 11 issue: 1 year: 1991 ident: 10.1016/j.jisa.2025.104204_b50 article-title: Color indexing publication-title: Int J Comput Vis doi: 10.1007/BF00130487 – year: 1997 ident: 10.1016/j.jisa.2025.104204_b6 – volume: 143 start-page: 1595 issue: 2 year: 2025 ident: 10.1016/j.jisa.2025.104204_b5 article-title: A low light image enhancement method based on dehazing physical model publication-title: Comput Model Eng Sci – year: 1922 ident: 10.1016/j.jisa.2025.104204_b16 – volume: 30 start-page: 6306 year: 2017 ident: 10.1016/j.jisa.2025.104204_b34 article-title: Neural discrete representation learning publication-title: Adv Neural Inf Process Syst – volume: 19 start-page: 293 year: 2020 ident: 10.1016/j.jisa.2025.104204_b26 article-title: Compressive-sensing data reconstruction for structural health monitoring: A machine-learning approach publication-title: Struct Heal Monit doi: 10.1177/1475921719844039 – ident: 10.1016/j.jisa.2025.104204_b9 – ident: 10.1016/j.jisa.2025.104204_b48 doi: 10.1109/CVPR52688.2022.01697 – volume: 62 start-page: 1 year: 2024 ident: 10.1016/j.jisa.2025.104204_b4 article-title: A novel iterative self-organizing pixel matrix entanglement classifier for remote sensing imagery publication-title: IEEE Trans Geosci Remote Sens – volume: 52 start-page: 1289 year: 2006 ident: 10.1016/j.jisa.2025.104204_b24 article-title: Compressed sensing publication-title: IEEE Trans Inform Theory doi: 10.1109/TIT.2006.871582 – volume: 37 start-page: 145 issue: 1 year: 1991 ident: 10.1016/j.jisa.2025.104204_b51 article-title: Divergence measures based on the Shannon entropy publication-title: IEEE Trans Inform Theory doi: 10.1109/18.61115 – volume: 79 year: 2023 ident: 10.1016/j.jisa.2025.104204_b1 article-title: Deep learning-based biometric image feature extraction for securing medical images through data hiding and joint encryption–compression publication-title: J Inf Secur Appl – ident: 10.1016/j.jisa.2025.104204_b42 – volume: 90 start-page: 923 issue: 3 year: 2010 ident: 10.1016/j.jisa.2025.104204_b18 article-title: Discrete fractional Fourier transform for image encryption publication-title: Signal Process – volume: 22 start-page: 1119 year: 2015 ident: 10.1016/j.jisa.2025.104204_b32 article-title: Data compression of very large-scale structural seismic and typhoon responses by low-rank representation with matrix reshape publication-title: Struct Control Heal Monit doi: 10.1002/stc.1737 – start-page: 192 year: 1994 ident: 10.1016/j.jisa.2025.104204_b53 article-title: Cryptographic protocol flaws: Know your enemy – ident: 10.1016/j.jisa.2025.104204_b13 – volume: 140 year: 2014 ident: 10.1016/j.jisa.2025.104204_b33 article-title: Data compression of structural seismic responses via principled independent component analysis publication-title: J Struct Eng doi: 10.1061/(ASCE)ST.1943-541X.0000946 – volume: 57 issue: 2 year: 2025 ident: 10.1016/j.jisa.2025.104204_b2 article-title: Asymmetric optical cryptosystem with secret-key sharing based on coherent superposition and normalized decomposition publication-title: Opt Quantum Electron doi: 10.1007/s11082-025-08061-y – ident: 10.1016/j.jisa.2025.104204_b37 doi: 10.1109/CVPR52688.2022.00372 – ident: 10.1016/j.jisa.2025.104204_b36 doi: 10.1109/WACV56688.2023.00028 – volume: 14 start-page: 70 issue: 1 year: 2025 ident: 10.1016/j.jisa.2025.104204_b40 article-title: Single-shot super-resolved fringe projection profilometry (SSSR-FPP): 100,000 frames-per-second 3D imaging with deep learning publication-title: Light Sci Appl doi: 10.1038/s41377-024-01721-w |
| SSID | ssj0001219523 |
| Score | 2.3558729 |
| Snippet | Key-based cryptography faces persistent challenges in secure key distribution and newly rising vulnerabilities. Three-Pass Protocols (3PPs) tackle these issues... |
| SourceID | crossref elsevier |
| SourceType | Index Database Publisher |
| StartPage | 104204 |
| SubjectTerms | Bandwidth efficiency Fresnel transform Image compression Secure image transmission Three-Pass Protocol Vector Quantized Variational Autoencoder |
| Title | Compression-enhanced Three-Pass Protocol for secure and bandwidth-efficient image transmission |
| URI | https://dx.doi.org/10.1016/j.jisa.2025.104204 |
| Volume | 94 |
| WOSCitedRecordID | wos001561531200003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 issn: 2214-2126 databaseCode: AIEXJ dateStart: 20130701 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: false ssIdentifier: ssj0001219523 providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1JT9tAFB6l0EMvFLoIumkOvUUTxbvnGFXQRSrikEo51ZrNTSLiIGIo4hfws_vezDg2kFZw6GUUWc7LyN-XN89vJeSj0iIIVKbYMNNDFsdlwEQYaBalqQbrQivDhR02kR0f55MJP-n1bppamMvTrKryqyt-9l-hhmsANpbOPgLutVC4AJ8BdFgBdlgfBDz-w11ya8VMNXUR_jFAZtgJWMpYGlAvAX6bYLhCd7uLIEhYfs90PWXGtpXAJIHZAlN6ajzPgA-rBsP7xqzvv2rJtPIj8Vwf2E6AvA01aXNairoW1qfzfTkVcCb3Pw_aRJIKDFsbKRpNF778yjpsf4lrl5wG59qifzToOi3CxFfvrXVbGAYxg1Mz7SpiHnc0Kbwmhm4w8T0l7_wN88Ecw_0ofdDefLuj9p2Tbp1_2KS2zQuUUaCMwsl4QrbDLOGg4rdHXw8n3zr-uoAndlrgeu--BsulC97dzGY7p2O7jHfJjseJjhxZ9kjPVC_I82agB_X6_SX5uYk7tOUObbhDAW3quEMBZbqBO9Ryh3a584r8ODocf_rC_AAOpsIkqpkRMS-Vwi59YJiiZapllKk0M2VaplivV8ILhcq54qEeqhhUOGxL5mBGp8LwJHpNtqplZfYJDRKM98o8lxl2KATVIWU0lOghKbkMzAHpN4-rOHN9Voq_o3RAkuaJFt5SdBZgARz5x_fePOpX3pJnLXffka36_MK8J0_VZT1bnX_wBPkDfaaNEA |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Compression-enhanced+Three-Pass+Protocol+for+secure+and+bandwidth-efficient+image+transmission&rft.jtitle=Journal+of+information+security+and+applications&rft.au=Abdelfattah%2C+Mohamed+G.&rft.au=Elnakib%2C+Ahmed&rft.au=Hegazy%2C+Salem+F.&rft.date=2025-11-01&rft.issn=2214-2126&rft.volume=94&rft.spage=104204&rft_id=info:doi/10.1016%2Fj.jisa.2025.104204&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_jisa_2025_104204 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2214-2126&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2214-2126&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2214-2126&client=summon |