[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
survey

Towards Integrating Image Encryption with Compression: A Survey

Published: 04 March 2022 Publication History

Abstract

As digital images are consistently generated and transmitted online, the unauthorized utilization of these images is an increasing concern that has a significant impact on both security and privacy issues; additionally, the representation of digital images requires a large amount of data. In recent years, an image compression scheme has been widely considered; such a scheme saves on hardware storage space and lowers both the transmission time and bandwidth demand for various potential applications. In this article, we review the various approaches taken to consider joint encryption and compression, assessing both their merits and their limitations. In addition to the survey, we also briefly introduce the most interesting and most often utilized applications of image encryption and evaluation metrics, providing an overview of the various kinds of image encryption schemes available. The contribution made by these approaches is then summarized and compared, offering a consideration of the different technical perspectives. Lastly, we highlight the recent challenges and some potential research directions that could fill the gaps in these domains for both researchers and developers.

References

[1]
W. Sun, J. Zhou, Y. Li, M. Cheung, and J. She. 2021. Robust high-capacity watermarking over online social network shared images. IEEE Transactions on Circuits and Systems for Video Technology 31, 3 (2021), 1208–1221.
[2]
S. Mahato, D. Yadav, and D. Khan. 2019. A novel information hiding scheme based on social networking site viewers’ public comments. Journal of Information Security and Applications 47 (2019), 275–283.
[3]
M. Osman. 2021. Wild and interesting Facebook statistics and facts. Retrieved from https://kinsta.com/blog/facebook-statistics/.
[4]
K. Systrom. 2021. Instagram by the numbers: Stats, demographics & fun facts. Retrieved from https://www.omnicoreagency.com/instagram-statistics/.
[5]
C. Smith. 2021. Flickr statistics, user count and facts. Retrieved from https://expandedramblings.com/index.php/flickr-stats/.
[6]
Quicksprout. 2019. How to increase Twitter engagement by 324%. Retrieved from https://www.quicksprout.com/twitter-engagement/.
[7]
B. B. Gupta, S. Yamaguchi, and D. P. Agrawal. 2018. Advances in security and privacy of multimedia big data in mobile and cloud computing. Multimedia Tools and Applications 77, 7 (2018), 9203–9208.
[8]
X. Q. Zhou, H. K. Huang, and S. L. Lou. 2001. Authenticity and integrity of digital mammography images. IEEE Transactions on Medical Imaging 20, 8 (2001), 784–791.
[9]
S. Haddad, G. Coatrieux, A. Moreau-Gaudry, and M. Cozic. 2020. Joint watermarking-encryption-JPEG-LS for medical image reliability control in encrypted and compressed domains. IEEE Transactions on Information Forensics and Security 15 (2020), 2556–2569.
[10]
A. K. Singh and A. Mohan. 2019. Handbook of Multimedia Information Security: Techniques and Applications. Springer International Publishing.
[11]
A. Swaminathan, Yinian Mao, and Min Wu. 2006. Robust and secure image hashing. IEEE Transactions on Information Forensics and Security 1, 2 (2006), 215–230.
[12]
B. Schneier. 2015. Applied Cryptography: Protocols, Algorithms and Source Code in C. John Wiley & Sons.
[13]
Y. Li, H. Yu, B. Song, and J. Chen. 2021. Image encryption based on a single-round dictionary and chaotic sequences in cloud computing. Concurrency and Computation: Practice and Experience 33, 7 (2021), 1.
[14]
H. Liu, B. Zhao, and L. Huang. 2019. A remote-sensing image encryption scheme using DNA bases probability and two-dimensional logistic map. IEEE Access 7 (2019), 65450–65459.
[15]
Y. Li, B. Song, R. Cao, Y. Zhang, and H. Qin. 2016. Image encryption based on compressive sensing and scrambled index for secure multimedia transmission. ACM Transactions on Multimedia Computing, Communications, and Applications 12, 4 (2016), 1–22.
[16]
Meysam Asgari-Chenaghlu, Mohammad-Reza Feizi-Derakhshi, Narjes Nikzad-Khasmakhi, Ali-Reza Feizi-Derakhshi, Majid Ramezani, Zoleikha Jahanbakhsh-Nagadeh, Taymaz Rahkar-Farshi, Elnaz Zafarani-Moattar, Mehrdad Ranjbar-Khadivi, and Mohammad-Ali Balafar. 2021. Cy: Chaotic yolo for user intended image encryption and sharing in social media. Information Sciences 542 (2021), 212–227.
[17]
S. Kumar, B. Panna, and R. K. Jha. 2019. Medical image encryption using fractional discrete cosine transform with chaotic function. Medical & Biological Engineering & Computing 57 (2019), 2517–2533.
[18]
K. Muhammad, R. Hamza, J. Ahmad, J. Lloret, H. Wang, and S. W. Baik. 2018. Secure surveillance framework for IoT systems using probabilistic image encryption. IEEE Transactions on Industrial Informatics 14, 8 (2018), 3679–3689.
[19]
P. P. Dang and P. M. Chau. 2000. Image encryption for secure internet multimedia applications. IEEE Transactions on Consumer Electronics 46, 3 (2000), 395–403.
[20]
M. Preishuber, T. Hütter, S. Katzenbeisser, and A. Uhl. 2018. Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Transactions on Information Forensics and Security 13, 9 (2018), 2137–2150.
[21]
Anwar Shamama and Solleti Meghana. 2019. A pixel permutation based image encryption technique using chaotic map. Multimedia Tools and Applications 78, 19 (2019), 27569–27590.
[22]
Niu Ying and Xuncai Zhang. 2020. A novel plaintext-related image encryption scheme based on chaotic system and pixel permutation. IEEE Access 8 (2020), 22082–22093.
[23]
G. R. W. Thoms, R. Muresan, and A. Al-Dweik. 2019. Chaotic encryption algorithm with key controlled neural networks for intelligent transportation systems. IEEE Access 7 (2019), 158697–158709.
[24]
H. Singh. 2016. Cryptosystem for securing image encryption using structured phase masks in fresnel wavelet transform domain. 3D Research 7, 34 (2016), 1--18.
[25]
A. Shafique and F. Ahmed. 2020. Image encryption using dynamic S-box substitution in the wavelet domain. Wireless Personal Communications 115 (2020). 2243–2268.
[26]
J. B. Lima, F. Madeiro, and F. Sales. 2015. Encryption of medical images based on the cosine number transform. Signal Processing: Image Communication 35 (2015), 1–8.
[27]
W. Huang, D. Jiang, Y. An, L. Liu, and X. Wang. 2021. A novel double-image encryption algorithm based on rossler hyperchaotic system and compressive sensing. IEEE Access 9 (2021), 41704–41716.
[28]
D. Huo, X. Zhu, G. Dai, H. Yang, X. Zhou, and M. Feng. 2020. Novel image compression–encryption hybrid scheme based on DNA encoding and compressive sensing. Applied Physics B 126, 3 (2020), 45.
[29]
V. Cambareri, M. Mangia, F. Pareschi, R. Rovatti, and G. Setti. 2015. On known-plaintext attacks to a compressed sensing-based encryption: A quantitative analysis. IEEE Transactions on Information Forensics and Security 10, 10 (2015), 2182–2195.
[30]
Jaehun Song and Yeon Ho Lee. 2021. Optical image encryption using different twiddle factors in the butterfly algorithm of fast Fourier transform. Optics Communications 485 (2021), 126707.
[31]
W. Sun, L. Wang, J. Wang, H. Li, and Q. Wu. 2018. Optical image encryption using gamma distribution phase masks in the gyrator domain. Journal of the European Optical Society Rapid Publications 14, 28 (2018), 1--10.
[32]
X. Chai, J. Bi, Z. Gan, X. Liu, Y. Zhang, and Y. Chen. 2020. Color image compression and encryption scheme based on compressive sensing and double random encryption strategy. Signal Processing 176 (2020), 107684.
[33]
X. J. Tong, M. Zhang, Z. Wang, and J. Ma. 2016. A joint color image encryption and compression scheme based on hyper-chaotic system. Nonlinear Dynamics 84, 4 (2016), 2333–2356.
[34]
J. Uthayakumar, T. Vengattaraman, and P. Dhavachelvan. 2021. A survey on data compression techniques: From the perspective of data quality, coding schemes, data type and applications. Journal of King Saud University - Computer and Information Sciences 33, 2 (2021), 119–140.
[35]
A. J. Hussain, Ali Al-Fayadh, and Naeem Radi. 2018. Image compression techniques: A survey in lossless and lossy algorithms. Neurocomputing 300 (2018), 44–69.
[36]
N. Zhou, S. Pan, S. Cheng, and Z. Zhou. 2016. Image compression–encryption scheme based on hyper-chaotic system and 2D compressive sensing. Optics & Laser Technology 82 (2016), 121–133.
[37]
N. Mahendiran and C. Deepa. 2021. A comprehensive analysis on image encryption and compression techniques with the assessment of performance evaluation metrics. SN Computer Science 2, 29 (2021), 1--12.
[38]
X. Zhang, G. Zhu, and S. Ma. 2012. Remote-sensing image encryption in hybrid domain. Optics Communications 285, 7 (2012), 1736–1743.
[39]
M. Guan, X. Yang, and W. Hu. 2019. Chaotic image encryption algorithm using frequency-domain DNA encoding. IET Image Processing 13, 9 (2019), 1535–1539.
[40]
Y. Zhang, L. Y. Zhang, J. Zhou, L. Liu, F. Chen, and X. He. 2016. A review of compressive sensing in information security field. IEEE Access 4 (2016), 2507–2519.
[41]
H. Chen, X. Du, Z. Liu, and C. Yang. 2013. Color image encryption based on the affine transform and gyrator transform. Optics and Lasers in Engineering 51, 6 (2013), 768–775.
[42]
Y. Wu, J. P. Noonan, and S. Agaian. 2011. NPCR and UACI randomness tests for image encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications 1, 2 (2011), 31–38.
[43]
Z. Gan, J. Bi, W. Ding, and X. Chai. 2021. Exploiting 2D compressed sensing and information entropy for secure color image compression and encryption. Neural Computing & Applications 33 (2021), 12845–12867.
[44]
I. Mehra and N. K. Nishchal. 2015. Optical asymmetric image encryption using gyrator wavelet transform. Optics Communications 354 (2015), 344–352.
[45]
Nidaa AbdulMohsin Abbas. 2016. Image encryption based on independent component analysis and Arnold's cat map. Egyptian Informatics Journal 17, 1 (2016), 139–146.
[46]
Faraoun Kamel Mohamed. 2014. A parallel block-based encryption schema for digital images using reversible cellular automata. Engineering Science and Technology, an International Journal 17, 2 (2014), 85–94.
[47]
A. Martín del Rey, G. Rodríguez Sánchez, and A. de la Villa Cuenca.2015. A protocol to encrypt digital images using chaotic maps and memory cellular automata. Logic Journal of the IGPL 23, 3 (2015), 485–494.
[48]
Lili Yao, Caojin Yuan, Junjie Qiang, Shaotong Feng, and Shouping Nie. 2017. An asymmetric color image encryption method by using deduced gyrator transform. Optics and Lasers in Engineering 89 (2017), 72–79.
[49]
G. Srivastava, C. N. S. Vinoth Kumar, V. Kavitha, N. Parthiban, and R. Venkataraman. 2020. Two-stage data encryption using chaotic neural networks. Journal of Intelligent & Fuzzy Systems 38, 3 (2020), 2561–2568.
[50]
Y. Sun, R. Xu, L. Chen, and X. Hu. 2015. Image compression and encryption scheme using fractal dictionary and Julia set. IET Image Processing 9, 3 (2015), 173–183.
[51]
K. Minemura, K. Wong, X. Qi, and K. Tanaka. 2017. A scrambling framework for block transform compressed image. Multimedia Tools and Applications 76, 5 (2017), 6709–6729.
[52]
X. Li, D. Xiao, H. Mou, D. Lu, and M. Peng. 2020. A compressive sensing based image encryption and compression algorithm with identity authentication and blind signcryption. IEEE Access 8 (2020), 211676–211690.
[53]
F. Yang, J. Mou, K. Sun, and R. Chu. 2020. Lossless image compression-encryption algorithm based on BP neural network and chaotic system. Multimedia Tools and Applications 79, 27 (2020), 19963–19992.
[54]
L. Lidong, D. Jiang, X. Wang, L. Zhang, and X. Rong. 2020. A dynamic triple-image encryption scheme based on chaos, S-Box and image compressing. IEEE Access 8 (2020), 210382–210399.
[55]
C. Yu, H. Li, and X. Wang. 2019. SVD-based image compression, encryption, and identity authentication algorithm on cloud. IET Image Processing 13, 12 (2019), 2224–2232.
[56]
D. Jiang, L. Liu, X. Wang, and X. Rong. 2021. Image encryption algorithm for crowd data based on a new hyperchaotic system and Bernstein polynomial. IET Image Processing 15, 14 (2021), 1–20.
[57]
F. Yang, J. Mou, K. Sun, Y. Cao, and J. Jin. 2019. Color image compression-encryption algorithm based on fractional-order memristor chaotic circuit. IEEE Access 7 (2019), 58751–58763.
[58]
H. Hu, Y. Cao, J. Xu, C. Ma, and H. Yan. 2021. An image compression and encryption algorithm based on the fractional-order simplest chaotic circuit. IEEE Access 9 (2021), 22141–22155.
[59]
A. Anand, A. K. Singh, Z. Lv, and G. Bhatnagar. 2020. Compression-then-encryption-based secure watermarking technique for smart healthcare system. IEEE MultiMedia 27, 4 (2020), 133–143.
[60]
J. Zhou, X. Liu, O. C. Au, and Y. Y. Tang. 2014. Designing an efficient image encryption-then-compression system via prediction error clustering and random permutation. IEEE Transactions on Information Forensics and Security 9, 1 (2014), 39–50.
[61]
X. Zhang, Y. Ren, L. Shen, Z. Qian, and G. Feng. 2014. Compressing encrypted images with auxiliary information. IEEE Transactions on Multimedia 16, 5 (2014), 1327–1336.
[62]
Chuntao Wang, Jiangqun Ni, and Qiong Huang. 2015. A new encryption-then-compression algorithm using the rate–distortion optimization. Signal Processing: Image Communication 39 (2015), 141–150.
[63]
Kenta Kurihara, Masanori Kikuchi, Shoko Imaizumi, Sayaka Shiota, and Hitoshi Kiya. 2015. An encryption-then-compression system for JPEG/Motion JPEG standard. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E98, 11 (2015), 2238–2245.
[64]
Manoj Kumar and Ankita Vaish. 2017. An efficient encryption-then-compression technique for encrypted images using SVD. Digital Signal Processing 60 (2017), 81–89.
[65]
S. Zhu, C. Zhu, and W. Wang. 2018. A novel image compression-encryption scheme based on chaos and compression sensing. IEEE Access 6 (2018), 67095–67107.
[66]
T. Chuman, W. Sirichotedumrong, and H. Kiya. 2019. Encryption-then-compression systems using grayscale-based image encryption for JPEG images. IEEE Transactions on Information Forensics and Security 14, 6 (2019), 1515–1525.
[67]
C. Qin, Q. Zhou, F. Cao, J. Dong, and X. Zhang. 2019. Flexible lossy compression for selective encrypted image with image inpainting. IEEE Transactions on Circuits and Systems for Video Technology 29, 11 (2019), 3341–3355.
[68]
C. Wang, T. Li, J. Ni, and Q. Huang. 2020. A new MRF-based lossy compression for encrypted binary images. IEEE Access 8 (2020), 11328–11341.
[69]
B. Zhang, D. Xiao, and Y. Xiang. 2020. Robust coding of encrypted images via 2D compressed sensing. IEEE Transactions on Multimedia 23 (2020), 2656–267.
[70]
T. Suguna and R. Shanmugalakshmi. 2021. Secure image communication through adaptive deer hunting optimization based vector quantization coding of perceptually encrypted images. Wireless Personal Communications 116, 3 (2021), 2239–2260.
[71]
K. Singh and C. Kumar. 2020. Encryption-then-compression-based copyright protection scheme for E-Governance. IT Professional 22, 2 (2020), 45–52.
[72]
A. K. Singh, S. Thakur, Alireza Jolfaei, Gautam Srivastava, Md. Elhoseny, and A. Mohan. 2021. Joint encryption and compression-based watermarking technique for security of digital documents. ACM Transactions on Internet Technology 21, 1 (2021), 1–20
[73]
B. A. Y. Alqaralleh, T. Vaiyapuri, V. S. Parvathy, G. Gupta, A. Khanna, and K. Shankar. 2021. Blockchain-assisted secure image transmission and diagnosis model on Internet of medical things environment. Personal and Ubiquitous Computing (2021), 1--11.
[74]
Xiaoling Huang, Guodong Ye, Huajin Chai, and Ou Xie. 2015. Compression and encryption for remote sensing image using chaotic system. Security and Communication Networks 8, 18 (2015), 3659–3666.
[75]
Q. Wang, X. Chen, M. Wei, and Z. Miao. 2016. Simultaneous encryption and compression of medical images based on optimized tensor compressed sensing with 3D Lorenz. BioMedical Engineering OnLine 15, 1 (2016), 118.
[76]
Peiya Li and Kwok-Tung Lo. 2017. Joint image compression and encryption based on order-8 alternating transforms. Journal of Visual Communication and Image Representation 44 (2017), 61–71.
[77]
Ye Zhang, Biao Xu, and Nanrun Zhou. 2017. A novel image compression–encryption hybrid algorithm based on the analysis sparse representation. Optics Communications 392 (2017), 223–233.
[78]
P. Li and K. Lo. 2018. A content-adaptive joint image compression and encryption scheme. IEEE Transactions on Multimedia 20, 8 (2018), 1960–1972.
[79]
R. Ponuma and R. Amutha. 2018. Compressive sensing based image compression-encryption using novel 1D-chaotic map. Multimedia Tools and Applications 77, 15 (2018), 19209–19234.
[80]
Q. Wang, M. Wei, X. Chen, and Z. Miao. 2018. Joint encryption and compression of 3D images based on tensor compressive sensing with non-autonomous 3D chaotic system. Multimedia Tools and Applications 77, 2 (2018), 1715–1734.
[81]
T. Duseja and M. Deshmukh. 2019. Image compression and encryption using Chinese remainder theorem. Multimedia Tools and Applications 78, 12 (2019), 16727–16753.
[82]
M. Zhang, X. J. Tong, J. Liu, Z. Wang, J. Liu, B. Liu, and J. Ma. 2020. Image compression and encryption scheme based on compressive sensing and Fourier transform. IEEE Access 8 (2020), 40838–40849.
[83]
A. Ghaffari. 2021. Image compression-encryption method based on two-dimensional sparse recovery and chaotic system. Scientific Reports 11, 1 (2021).
[84]
Y. Xu, L. Xiong, Z. Xu, and S. Pan. 2014. A content security protection scheme in jpeg compressed domain. Journal of Visual Communication and Image Representation 25, 5 (2014), 805–813.
[85]
D. Socek, H. Kalva, S. S. Magliveras, O. Marques, D. Culibrk, and B. Furht. 2007. New approaches to encryption and steganography for digital videos. Multimedia Systems 13, 3 (2007), 191–204.
[86]
Z. H. Gan, X. L. Chai, D. J. Han, and Y. R. Chen. 2019. A chaotic image encryption algorithm based on 3-d bit-plane permutation. Neural Computing & Applications 31, 11 (2019), 7111–7130.
[87]
J. Hu and F. Han. 2009. A pixel-based scrambling scheme for digital medical images protection. Journal of Network and Computer Applications 32, 4 (2009), 788–794.
[88]
H. Zhu, C. Zhao, and X. Zhang. 2013. A novel image encryption-compression scheme using hyper-chaos and Chinese remainder theorem. Signal Processing: Image Communication 28, 6 (2013), 670–680.
[89]
X. J. Tong, Z. Wang, M. Zhang, and Y. Liu. 2013. A new algorithm of the combination of image compression and encryption technology based on cross chaotic map. Nonlinear Dynamics, 72, 1 (2013), 229–241.

Cited By

View all
  • (2025)Split ways: Using GAN watermarking for digital image protection with privacy-preserving split model trainingFuture Generation Computer Systems10.1016/j.future.2024.107523163(107523)Online publication date: Feb-2025
  • (2024)An Approach for Safe Network Image Communication Using Hybrid Cloud and Half Tensor Product Compression PerceptionRisk Assessment and Countermeasures for Cybersecurity10.4018/979-8-3693-2691-6.ch011(189-205)Online publication date: 31-May-2024
  • (2024)Statistical Analysis of the Negative–Positive Transformation in Image EncryptionMathematics10.3390/math1206090812:6(908)Online publication date: 20-Mar-2024
  • Show More Cited By

Index Terms

  1. Towards Integrating Image Encryption with Compression: A Survey

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Multimedia Computing, Communications, and Applications
    ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 18, Issue 3
    August 2022
    478 pages
    ISSN:1551-6857
    EISSN:1551-6865
    DOI:10.1145/3505208
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 04 March 2022
    Accepted: 01 November 2021
    Revised: 01 August 2021
    Received: 01 August 2021
    Published in TOMM Volume 18, Issue 3

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Encryption
    2. digital images
    3. compression
    4. joint encryption compression

    Qualifiers

    • Survey
    • Refereed

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)275
    • Downloads (Last 6 weeks)41
    Reflects downloads up to 12 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)Split ways: Using GAN watermarking for digital image protection with privacy-preserving split model trainingFuture Generation Computer Systems10.1016/j.future.2024.107523163(107523)Online publication date: Feb-2025
    • (2024)An Approach for Safe Network Image Communication Using Hybrid Cloud and Half Tensor Product Compression PerceptionRisk Assessment and Countermeasures for Cybersecurity10.4018/979-8-3693-2691-6.ch011(189-205)Online publication date: 31-May-2024
    • (2024)Statistical Analysis of the Negative–Positive Transformation in Image EncryptionMathematics10.3390/math1206090812:6(908)Online publication date: 20-Mar-2024
    • (2024)A Hybrid Cryptosystem Incorporating a New Algorithm for Improved EntropyEntropy10.3390/e2602015426:2(154)Online publication date: 10-Feb-2024
    • (2024)GAN-DNADE: Image encryption algorithm based on generative adversarial network and DNA dynamic encodingComputer Science and Information Systems10.2298/CSIS240314053W21:4(1673-1697)Online publication date: 2024
    • (2024)Discard Significant Bits of Compressed Sensing: A Robust Image Coding for Resource-Limited ContextsACM Transactions on Multimedia Computing, Communications, and Applications10.1145/3701732Online publication date: 24-Oct-2024
    • (2024)JPEG-compatible Joint Image Compression and Encryption Algorithm with File Size PreservationACM Transactions on Multimedia Computing, Communications, and Applications10.1145/363345920:4(1-20)Online publication date: 11-Jan-2024
    • (2024)E-TPE: Efficient Thumbnail-Preserving Encryption for Privacy Protection in Visual Sensor NetworksACM Transactions on Sensor Networks10.1145/359261120:4(1-26)Online publication date: 11-May-2024
    • (2024)Robust Copyright Protection Technique with High-embedding Capacity for Color ImagesACM Transactions on Multimedia Computing, Communications, and Applications10.1145/358050220:11(1-12)Online publication date: 12-Sep-2024
    • (2024)Thumbnail-Preserving Encryption Based on Binary–Decimal Hybrid and a Generalized Coupled Logistic MapInternational Journal of Bifurcation and Chaos10.1142/S021812742450193134:15Online publication date: 6-Nov-2024
    • Show More Cited By

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    Full Text

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media