A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Secure Analysis for IIOT Systems Using Hyperchaotic Image Encryption
2022
Security and Communication Networks
Like edge computing, intelligent cameras and image sensors are widely used in the Industrial Internet of Things (IIOT), including design and finished product quality inspection. However, the images generated by these sensors are constantly at risk of information leakage and privacy violations in the IIOT. Due to the involvement of third parties, traditional encryption algorithms are no longer adapted to image encryption for IIOT. In the context of the IIOT, an image encryption technology based
doi:10.1155/2022/3664986
doaj:73217b3902674ef7837b42360f3e2b2c
fatcat:gsonosnvyvdafh2ozsrhezwsgy