Results 321 to 330 of about 6,410,352 (379)
Some of the next articles are maybe not open access.

A Memristive Fully Connect Neural Network and Application of Medical Image Encryption Based on Central Diffusion Algorithm

IEEE Transactions on Industrial Informatics
With the continuous development of computers, communication technology, and regional medical collaboration services, the security and confidentiality of information are becoming more and more important.
Junwei Sun   +3 more
semanticscholar   +1 more source

Optical image encryption via ptychography

Optics Letters, 2013
Ptychography is combined with optical image encryption for the first time. Due to the nature of ptychography, not only is the interferometric optical setup that is usually adopted not required any more, but also the encryption for a complex-valued image is achievable.
Yishi, Shi   +5 more
openaire   +2 more sources

Scalable Coding of Encrypted Images

IEEE Transactions on Image Processing, 2012
This paper proposes a novel scheme of scalable coding for encrypted images. In the encryption phase, the original pixel values are masked by a modulo-256 addition with pseudorandom numbers that are derived from a secret key. After decomposing the encrypted data into a downsampled subimage and several data sets with a multiple-resolution construction ...
Xinpeng, Zhang   +3 more
openaire   +2 more sources

Medical Image Encryption

2019
The healthcare industry has been facing a lot of challenges in securing electronic health records (EHR). Medical images have found a noteworthy position for diagnosis leading to therapeutic requirements. Millions of medical images of various modalities are generally safeguarded through software-based encryption.
Sundararaman Rajagopalan   +2 more
openaire   +1 more source

Towards Integrating Image Encryption with Compression: A Survey

ACM Trans. Multim. Comput. Commun. Appl., 2022
As digital images are consistently generated and transmitted online, the unauthorized utilization of these images is an increasing concern that has a significant impact on both security and privacy issues; additionally, the representation of digital ...
K. Singh, Ashutosh Kumar Singh
semanticscholar   +1 more source

Homomorphic image encryption

Journal of Electronic Imaging, 2009
This paper presents a new homomorphic image cryptosystem. The idea of this system is based on encrypting the reflectance component after the homomorphic transform and embedding the illumination component as a least significant bit watermark into the encrypted reflectance component.
openaire   +1 more source

Optical image encryption based on diffractive imaging

Optics Letters, 2010
In this Letter, we propose a method for optical image encryption based on diffractive imaging. An optical multiple random phase mask encoding system is applied, and one of the phase-only masks is selected and laterally translated along a preset direction during the encryption process.
Chen, W., Chen, X., Sheppard, C.J.R.
openaire   +2 more sources

Binary-tree encryption strategy for optical multiple-image encryption

Applied Optics, 2016
In traditional optical multiple-image encryption schemes, different images typically have almost the same encryption or decryption process. Provided that an attacker manages to correctly decrypt some image, the conventional attacks upon other images are much easier to be made.
Jiawang, Yi, Guanzheng, Tan
openaire   +2 more sources

Image encryption utilizing lossy image compression

2017 International Conference on Computer, Communications and Electronics (Comptelix), 2017
As the network technologies are improving, more challenges are coming forward in form of huge amount of data being transferred through the network. A large portion of such data is of multimedia type consisting of huge amount of digital images being sent and received through the network.
Kapil Mishra, Ravi Saharan
openaire   +1 more source

Image encryption using binary key-images

2009 IEEE International Conference on Systems, Man and Cybernetics, 2009
This paper introduces a new concept for image encryption using a binary “key-image”. The key-image is either a bit plane or an edge map generated from another image, which has the same size as the original image to be encrypted. In addition, we introduce two new lossless image encryption algorithms using this key-image technique.
Yicong Zhou, Karen Panetta, Sos Agaian
openaire   +1 more source

Home - About - Disclaimer - Privacy