Zobrazeno 1 - 10
of 843
pro vyhledávání: '"Integer wavelet"'
Publikováno v:
Engineering Science and Technology, an International Journal, Vol 61, Iss , Pp 101909- (2025)
Image watermarking is one of techniques that can be used to protect and recover from the altered images. Tamper detection in semi-fragile still does not achieve high accuracy for tamper localization, especially in malicious attacks. This study propos
Externí odkaz:
https://doaj.org/article/96432a2271db4873ae8111d78c35757c
Secure medical image encryption scheme for Healthcare IoT using novel hyperchaotic map and DNA cubes
Autor:
Lai, Qiang ⁎, Hua, Hanqiang
Publikováno v:
In Expert Systems With Applications 10 March 2025 264
Publikováno v:
IEEE Access, Vol 12, Pp 123694-123715 (2024)
The secrecy of various forms of multimedia data constitutes a significant aspect of the cybersecurity field. In this case, chaos-based image ciphers can be adapted. Chaotic image encryption has been investigated in the literature using different tran
Externí odkaz:
https://doaj.org/article/e91d350127c04f16aa345a6f3d9eaef5
Publikováno v:
International Journal of Cognitive Computing in Engineering, Vol 5, Iss , Pp 78-87 (2024)
Telemedicine is a form of healthcare delivery that employs communication technology to provide medical care to patients remotely. The use of telemedicine has seen a significant increase in recent years, presenting challenges such as patient privacy,
Externí odkaz:
https://doaj.org/article/5fe0c316f3074db7ad4f69476b554252
Autor:
Mostafa A. Ahmad, Mourad Elloumi, Ahmed H. Samak, Ali M. Al-Sharafi, Ali Alqazzaz, Monir Abdullah Kaid, Costas Iliopoulos
Publikováno v:
Alexandria Engineering Journal, Vol 61, Iss 12, Pp 10577-10592 (2022)
In the latest years, there is an increasing emphasis on DICOM medical images, especially in digital medical images transmission to e-health services. Besides, the confidentiality and protection of patients’ secure information need more attention an
Externí odkaz:
https://doaj.org/article/6960694a4508496a8920bdc9269bcc80
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 34, Iss 10, Pp 9252-9272 (2022)
Image encryption is an effective method to protect private images by converting them into meaningless ones, but many current image encryption algorithms still have security and efficiency problems. This paper combines compressed sensing (CS) and secr
Externí odkaz:
https://doaj.org/article/5849ce2c0e674f96bad2e127fcad28eb
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Alexandria Engineering Journal, Vol 61, Iss 10, Pp 7637-7647 (2022)
This paper presents a new asymmetric image encryption and hiding algorithm based on SHA-3 and compressive sensing. First, to resist the chosen-plaintext attack (CPA) and the known-plaintext attack (KPA), SHA-3 is employed to calculate the hash values
Externí odkaz:
https://doaj.org/article/7898ed6664ef4a0485df5f0e17820fae
Autor:
Nisreen Yassin
Publikováno v:
Jordanian Journal of Computers and Information Technology, Vol 8, Iss 3, Pp 242-255 (2022)
The huge advance in information technology and communication resulted in extreme usage of digital networks that makes information security playing an important role as never before. Steganography is the art of hiding secret message bits into differen
Externí odkaz:
https://doaj.org/article/0c8a1e5b74e8409392ce7e4ff9806eec