Medical image security enhancement using two dimensional chaotic mapping optimized by self-adaptive grey wolf algorithm
暂无分享,去创建一个
[1] He Lei,et al. Novel quantum image encryption using one-dimensional quantum cellular automata , 2016, Inf. Sci..
[2] Ninu Preetha Nirmala Sreedharan,et al. Grey Wolf optimisation-based feature selection and classification for facial emotion recognition , 2018, IET Biom..
[3] Malrey Lee,et al. A hybrid genetic algorithm and chaotic function model for image encryption , 2012 .
[4] Zhihong Zhou,et al. Image compression–encryption scheme based on hyper-chaotic system and 2D compressive sensing , 2016 .
[5] M. Hwang,et al. Image steganographic scheme based on pixel-value differencing and LSB replacement methods , 2005 .
[6] Abdul Hanan Abdullah,et al. Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence , 2014 .
[7] Safya Belghith,et al. A novel image encryption scheme based on substitution-permutation network and chaos , 2016, Signal Process..
[8] Yushu Zhang,et al. Exploiting random convolution and random subsampling for image encryption and compression , 2015 .
[9] Vinod Patidar,et al. Medical image protection using genetic algorithm operations , 2014, Soft Computing.
[10] Andrew Lewis,et al. Grey Wolf Optimizer , 2014, Adv. Eng. Softw..
[11] Andreas Uhl,et al. Identifying deficits of visual security metrics for images , 2016, Signal Process. Image Commun..
[12] T. S. Subashini,et al. Detection of Heart Muscle Damage from Automated Analysis of Echocardiogram Video , 2015 .
[13] M Iyapparaja,et al. Security policy speculation of user uploaded images on content sharing sites , 2017 .
[14] Kartik Shankar,et al. An Efficient Image Encryption Technique Based on Optimized Key Generation in ECC Using Genetic Algorithm , 2016 .
[15] Krishna Mohan Buddhiraju,et al. Secure Dissemination and Protection of Multispectral Images Using Crypto-Watermarking , 2015, IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing.
[16] Yuan Yan Tang,et al. Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation , 2014, IEEE Transactions on Information Forensics and Security.
[17] Xiaobo Li,et al. Partial encryption of compressed images and videos , 2000, IEEE Trans. Signal Process..
[18] K. Murali,et al. Chaos based spread spectrum image steganography , 2004, IEEE Transactions on Consumer Electronics.
[19] Anish Philip. A Generalized Pseudo-Knight?s Tour Algorithm for Encryption of an Image , 2013, IEEE Potentials.
[20] Dinghui Zhang,et al. Chaotic encryption and decryption of JPEG image , 2014 .
[21] Subramania Sudharsanan. Shared key encryption of JPEG color images , 2005, IEEE Transactions on Consumer Electronics.
[22] T. Senthil Murugan,et al. Cluster head selection for energy efficient and delay-less routing in wireless sensor network , 2017, Wireless Networks.
[23] Salwa K. Abd-El-Hafiz,et al. A fractal-based image encryption system , 2014, IET Image Process..
[24] Xiaoling Huang,et al. An Image Encryption Algorithm Based on Autoblocking and Electrocardiography , 2016, IEEE MultiMedia.
[25] A. S. Manjunath,et al. Improved entropy encoding for high efficient video coding standard , 2016 .
[26] Saroj Kumar Lenka,et al. Adaptive circular queue image steganography with RSA cryptosystem , 2016 .
[27] Chi-Wai Chow,et al. Light Encryption Scheme Using Light-Emitting Diode and Camera Image Sensor , 2016, IEEE Photonics Journal.
[28] Nasharuddin Zainal,et al. Decomposition by binary codes-based speedy image encryption algorithm for multiple applications , 2015, IET Image Process..
[29] Nabin Ghoshal,et al. Multiple-Image Encryption Using Genetic Algorithm , 2015 .
[30] B. Bala Krishna,et al. Impact of tamanu oil-diesel blend on combustion, performance and emissions of diesel engine and its prediction methodology , 2017 .
[31] Shital S. Bramhe,et al. Glass Shaped Antenna with Defected Ground Structure for Cognitive Radio Application , 2015, 2015 International Conference on Computing Communication Control and Automation.
[32] Niloy K. Dutta,et al. High-speed all-optical encryption and decryption based on two-photon absorption in semiconductor optical amplifiers , 2015, IEEE/OSA Journal of Optical Communications and Networking.
[33] Hui Liu,et al. Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map , 2013, IET Inf. Secur..
[34] Xing-yuan Wang,et al. Image encryption using genetic operators and intertwining logistic map , 2014, Nonlinear Dynamics.
[35] Analysis of the stability domain for the Hénon map , 1993 .
[36] Yuncai Wang,et al. Enhancing the Brightness of Quantum Dot Light-Emitting Diodes by Multilayer Heterostructures , 2016, IEEE Photonics Journal.
[37] Weiming Zhang,et al. Reversible Data Hiding in Encrypted Images by Reversible Image Transformation , 2016, IEEE Transactions on Multimedia.
[38] Yicong Zhou,et al. 2D Sine Logistic modulation map for image encryption , 2015, Inf. Sci..
[39] Y. Mu,et al. Optical Image Encryption Based on Chaotic Baker Map and Double Random Phase Encoding , 2013, Journal of Lightwave Technology.
[40] Xin-Wen Wu,et al. On the Security of Permutation-Only Image Encryption Schemes , 2016, IEEE Transactions on Information Forensics and Security.
[41] Mariusz Dzwonkowski,et al. A New Quaternion-Based Encryption Method for DICOM Images , 2015, IEEE Transactions on Image Processing.
[42] Manoj Kumar,et al. Encryption of color images using MSVD in DCST domain , 2017 .
[43] Ammasai Gounden Nanjappa Gounder,et al. Image encryption scheme based on block-based confusion and multiple levels of diffusion , 2016, IET Comput. Vis..
[44] Paul M. Chau,et al. Image encryption for secure Internet multimedia applications , 2000, 2000 Digest of Technical Papers. International Conference on Consumer Electronics. Nineteenth in the Series (Cat. No.00CH37102).
[45] N. Bourbakis,et al. Data-image-video encryption , 2004, IEEE Potentials.
[46] Dawei Wang,et al. A novel lossless color image encryption scheme using 2 D DWT and 6 D hyperchaotic system , 2016 .
[47] Magno T. M. Silva,et al. Do chaos-based communication systems really transmit chaotic signals? , 2015, Signal Process..
[48] Shuliang Sun,et al. A novel edge based image steganography with 2k correction and Huffman encoding , 2016, Inf. Process. Lett..
[49] Lina Chen,et al. Image compression and encryption scheme using fractal dictionary and Julia set , 2015, IET Image Process..
[50] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[51] Kavita Bhatnagar,et al. Extending the Neural Model to Study the Impact of Effective Area of Optical Fiber on Laser Intensity , 2017 .
[52] Chen Tang,et al. Cascaded Fresnel holographic image encryption scheme based on a constrained optimization algorithm and Henon map , 2017 .
[53] Satish R. Todmal,et al. Eyelids, Eyelashes Detection Algorithm and Hough Transform Method for Noise Removal in Iris Recognition , 2015 .
[54] Yu-Chee Tseng,et al. A secure data hiding scheme for binary images , 2002, IEEE Trans. Commun..
[55] Rui Zhang,et al. Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme , 2013, IEEE Transactions on Parallel and Distributed Systems.
[56] Kehui Sun,et al. A fast image encryption algorithm based on chaotic map , 2016 .