EPVCNet: Enhancing privacy and security for image authentication in computing-sensitive 6G environment✩,✩✩
Muhammad Shafiq , Lijing Ren , Denghui Zhang , Thippa Reddy Gadekallu , Mohammad Mahtab Alam
›› 2025, Vol. 11 ›› Issue (5) : 1679 -1688.
EPVCNet: Enhancing privacy and security for image authentication in computing-sensitive 6G environment✩,✩✩
As the 5G architecture gains momentum, interest in 6G is growing. The proliferation of Internet of Things (IoT) devices, capable of capturing sensitive images, has increased the need for secure transmission and robust access control mechanisms. The vast amount of data generated by low-computing devices poses a challenge to traditional centralized access control, which relies on trusted third parties and complex computations, resulting in intricate interactions, higher hardware costs, and processing delays. To address these issues, this paper introduces a novel distributed access control approach that integrates a decentralized and lightweight encryption mechanism with image transmission. This method enhances data security and resource efficiency without imposing heavy computational and network burdens. In comparison to the best existing approach, it achieves a 7% improvement in accuracy, effectively addressing existing gaps in lightweight encryption and recognition performance.
ISAC / IoT / Privacy and security / VC
| [1] |
|
| [2] |
|
| [3] |
|
| [4] |
|
| [5] |
|
| [6] |
|
| [7] |
|
| [8] |
|
| [9] |
|
| [10] |
|
| [11] |
|
| [12] |
|
| [13] |
|
| [14] |
|
| [15] |
|
| [16] |
|
| [17] |
|
| [18] |
|
| [19] |
|
| [20] |
|
| [21] |
|
| [22] |
|
| [23] |
|
| [24] |
|
| [25] |
|
| [26] |
|
| [27] |
|
| [28] |
|
| [29] |
|
| [30] |
|
| [31] |
|
| [32] |
|
| [33] |
|
| [34] |
|
| [35] |
|
| [36] |
|
| [37] |
|
| [38] |
|
| [39] |
|
| [40] |
|
| [41] |
|
| [42] |
|
/
| 〈 |
|
〉 |