Medical Image Security Using Dual Encryption with Oppositional Based Optimization Algorithm
暂无分享,去创建一个
R. Balasubramanian | S. K. Lakshmanaprabu | T. Avudaiappan | S. Sundara Pandiyan | Saravanan Murugan | K. Shankar | S. Lakshmanaprabu | K. Shankar | T. Avudaiappan | S. Pandiyan | R. Balasubramanian | S. Murugan
[1] Moresh Mukhedkar,et al. Secure non real time image encryption algorithm development using cryptography & steganography , 2015, 2015 Annual IEEE India Conference (INDICON).
[2] Mohamed Abdel-Basset,et al. A hybrid whale optimization algorithm based on local search strategy for the permutation flow shop scheduling problem , 2018, Future Gener. Comput. Syst..
[3] Kartik Shankar,et al. Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm , 2018 .
[4] Kartik Shankar,et al. Sharing a Secret Image with Encapsulated Shares in Visual Cryptography , 2015 .
[5] Yicong Zhou,et al. Medical image encryption using edge maps , 2017, Signal Process..
[6] Ali Khalfallah,et al. A Novel Selective Encryption Scheme for Medical Images Transmission based-on JPEG Compression Algorithm , 2017, KES.
[7] Robert Dony,et al. Improving the Security of the Medical Images , 2013 .
[8] Elijah Blessing Rajsingh,et al. A forward secure signcryption scheme with ciphertext authentication for e-payment systems using conic curve cryptography , 2018, J. King Saud Univ. Comput. Inf. Sci..
[9] Juliano B. Lima,et al. Encryption of medical images based on the cosine number transform , 2015, Signal Process. Image Commun..
[10] Naveen K. Chilamkurti,et al. Three-way decisions based on neutrosophic sets and AHP-QFD framework for supplier selection problem , 2018, Future Gener. Comput. Syst..
[11] Mahmoud H. Annaby,et al. Color image encryption using random transforms, phase retrieval, chaotic maps, and diffusion , 2018 .
[12] Lisheng Xu,et al. Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compression , 2018 .
[13] Laurent Nana,et al. A Cryptographic Technique for Security of Medical Images in Health Information Systems , 2015 .
[14] Kartik Shankar,et al. An Efficient Image Encryption Technique Based on Optimized Key Generation in ECC Using Genetic Algorithm , 2016 .
[15] Ali Al-Haj,et al. Medical imaging security using partial encryption and histogram shifting watermarking , 2017, 2017 8th International Conference on Information Technology (ICIT).
[16] W. Puech,et al. Image Encryption and Compression for Medical Image Security , 2008, 2008 First Workshops on Image Processing Theory, Tools and Applications.
[17] Mohamed Abdel-Basset,et al. A novel method for solving the fully neutrosophic linear programming problems , 2018, Neural Computing and Applications.
[18] Rengarajan Amirtharajan,et al. Lightweight chaotic image encryption algorithm for real-time embedded system: Implementation and analysis on 32-bit microcontroller , 2018, Microprocess. Microsystems.
[19] P. Eswaran,et al. RGB-Based Secure Share Creation in Visual Cryptography Using Optimal Elliptic Curve Cryptography Technique , 2016, J. Circuits Syst. Comput..
[20] Mohamed Abdel-Basset,et al. 2-Levels of clustering strategy to detect and locate copy-move forgery in digital images , 2018, Multimedia Tools and Applications.
[21] Mohamed Abdel-Basset,et al. A hybrid approach of neutrosophic sets and DEMATEL method for developing supplier selection criteria , 2018, Des. Autom. Embed. Syst..
[22] Mohammed Ali Hussain,et al. Securing Medical Images by Image Encryption using Key Image , 2014 .
[23] Chenggen Quan,et al. Multiple image encryption scheme based on pixel exchange operation and vector decomposition , 2018 .
[24] Ali Kanso,et al. An efficient and robust image encryption scheme for medical applications , 2015, Commun. Nonlinear Sci. Numer. Simul..
[25] K. Shankar,et al. RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography , 2017, China Communications.
[26] Mohamed Abdel-Basset,et al. A comprehensive review of quadratic assignment problem: variants, hybrids and applications , 2018, Journal of Ambient Intelligence and Humanized Computing.
[27] Ahmed G. Radwan,et al. Generalized double-humped logistic map-based medical image encryption , 2018, Journal of advanced research.
[28] Dolendro Singh Laiphrakpam,et al. Medical image encryption based on improved ElGamal encryption technique , 2017 .
[29] Mohamed Abdel-Basset,et al. Internet of Things (IoT) and its impact on supply chain: A framework for building smart, secure and efficient systems , 2018, Future Gener. Comput. Syst..
[30] Xiaofeng Liao,et al. An efficient mixed inter-intra pixels substitution at 2bits-level for image encryption technique using DNA and chaos , 2018 .
[31] Emad Nabil,et al. A Modified Flower Pollination Algorithm for Global Optimization , 2016, Expert Syst. Appl..