Results 231 to 240 of about 85,913 (281)
Secure medical image encryption with hyperelliptic curve based S-boxes. [PDF]
Alali AS +4 more
europepmc +1 more source
RGB image encryption using SPN with a novel block cipher over simple graph adjacency matrices and Galois fields. [PDF]
Sajjad M, Alqwaifly NA.
europepmc +1 more source
A high-entropy image encryption scheme using optimized chaotic maps with Josephus permutation strategy. [PDF]
Ghouate NE +8 more
europepmc +1 more source
An Innovative Image Encryption Algorithm Based on the DNAS_box and Hyperchaos. [PDF]
Qiu D, Zhang T, Liu J, Liu S, He P.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Image encryption: Generating visually meaningful encrypted images
Information Sciences, 2015zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Long Bao, Yicong Zhou
openaire +4 more sources
Optical image encryption topology
Optics Letters, 2009Optical image encryption topology is proposed based on the principle of random-phase encoding. Various encryption topological units, involving peer-to-peer, ring, star, and tree topologies, can be realized by an optical 6f system. These topological units can be interconnected to constitute an optical image encryption network.
Xiao, Yong-Liang +4 more
openaire +2 more sources
Image Encryption using an Image Pattern based on Advanced Encryption Standard
2021 IEEE Colombian Conference on Communications and Computing (COLCOM), 2021Due to the global pandemic now more than ever, there is a need to send and receive reliable text or graphic information, whether for work, study, or any other activity. And this is where encryption plays an important role in improving data protection.
Merisabel Ruelas Quenaya +5 more
openaire +1 more source
Optical image encryption via ptychography
Optics Letters, 2013Ptychography is combined with optical image encryption for the first time. Due to the nature of ptychography, not only is the interferometric optical setup that is usually adopted not required any more, but also the encryption for a complex-valued image is achievable.
Yishi, Shi +5 more
openaire +2 more sources
Scalable Coding of Encrypted Images
IEEE Transactions on Image Processing, 2012This paper proposes a novel scheme of scalable coding for encrypted images. In the encryption phase, the original pixel values are masked by a modulo-256 addition with pseudorandom numbers that are derived from a secret key. After decomposing the encrypted data into a downsampled subimage and several data sets with a multiple-resolution construction ...
Xinpeng, Zhang +3 more
openaire +2 more sources
2019
The healthcare industry has been facing a lot of challenges in securing electronic health records (EHR). Medical images have found a noteworthy position for diagnosis leading to therapeutic requirements. Millions of medical images of various modalities are generally safeguarded through software-based encryption.
Sundararaman Rajagopalan +2 more
openaire +1 more source
The healthcare industry has been facing a lot of challenges in securing electronic health records (EHR). Medical images have found a noteworthy position for diagnosis leading to therapeutic requirements. Millions of medical images of various modalities are generally safeguarded through software-based encryption.
Sundararaman Rajagopalan +2 more
openaire +1 more source

