Results 321 to 330 of about 6,410,352 (379)
Some of the next articles are maybe not open access.
IEEE Transactions on Industrial Informatics
With the continuous development of computers, communication technology, and regional medical collaboration services, the security and confidentiality of information are becoming more and more important.
Junwei Sun +3 more
semanticscholar +1 more source
With the continuous development of computers, communication technology, and regional medical collaboration services, the security and confidentiality of information are becoming more and more important.
Junwei Sun +3 more
semanticscholar +1 more source
Optical image encryption via ptychography
Optics Letters, 2013Ptychography is combined with optical image encryption for the first time. Due to the nature of ptychography, not only is the interferometric optical setup that is usually adopted not required any more, but also the encryption for a complex-valued image is achievable.
Yishi, Shi +5 more
openaire +2 more sources
Scalable Coding of Encrypted Images
IEEE Transactions on Image Processing, 2012This paper proposes a novel scheme of scalable coding for encrypted images. In the encryption phase, the original pixel values are masked by a modulo-256 addition with pseudorandom numbers that are derived from a secret key. After decomposing the encrypted data into a downsampled subimage and several data sets with a multiple-resolution construction ...
Xinpeng, Zhang +3 more
openaire +2 more sources
2019
The healthcare industry has been facing a lot of challenges in securing electronic health records (EHR). Medical images have found a noteworthy position for diagnosis leading to therapeutic requirements. Millions of medical images of various modalities are generally safeguarded through software-based encryption.
Sundararaman Rajagopalan +2 more
openaire +1 more source
The healthcare industry has been facing a lot of challenges in securing electronic health records (EHR). Medical images have found a noteworthy position for diagnosis leading to therapeutic requirements. Millions of medical images of various modalities are generally safeguarded through software-based encryption.
Sundararaman Rajagopalan +2 more
openaire +1 more source
Towards Integrating Image Encryption with Compression: A Survey
ACM Trans. Multim. Comput. Commun. Appl., 2022As digital images are consistently generated and transmitted online, the unauthorized utilization of these images is an increasing concern that has a significant impact on both security and privacy issues; additionally, the representation of digital ...
K. Singh, Ashutosh Kumar Singh
semanticscholar +1 more source
Journal of Electronic Imaging, 2009
This paper presents a new homomorphic image cryptosystem. The idea of this system is based on encrypting the reflectance component after the homomorphic transform and embedding the illumination component as a least significant bit watermark into the encrypted reflectance component.
openaire +1 more source
This paper presents a new homomorphic image cryptosystem. The idea of this system is based on encrypting the reflectance component after the homomorphic transform and embedding the illumination component as a least significant bit watermark into the encrypted reflectance component.
openaire +1 more source
Optical image encryption based on diffractive imaging
Optics Letters, 2010In this Letter, we propose a method for optical image encryption based on diffractive imaging. An optical multiple random phase mask encoding system is applied, and one of the phase-only masks is selected and laterally translated along a preset direction during the encryption process.
Chen, W., Chen, X., Sheppard, C.J.R.
openaire +2 more sources
Binary-tree encryption strategy for optical multiple-image encryption
Applied Optics, 2016In traditional optical multiple-image encryption schemes, different images typically have almost the same encryption or decryption process. Provided that an attacker manages to correctly decrypt some image, the conventional attacks upon other images are much easier to be made.
Jiawang, Yi, Guanzheng, Tan
openaire +2 more sources
Image encryption utilizing lossy image compression
2017 International Conference on Computer, Communications and Electronics (Comptelix), 2017As the network technologies are improving, more challenges are coming forward in form of huge amount of data being transferred through the network. A large portion of such data is of multimedia type consisting of huge amount of digital images being sent and received through the network.
Kapil Mishra, Ravi Saharan
openaire +1 more source
Image encryption using binary key-images
2009 IEEE International Conference on Systems, Man and Cybernetics, 2009This paper introduces a new concept for image encryption using a binary “key-image”. The key-image is either a bit plane or an edge map generated from another image, which has the same size as the original image to be encrypted. In addition, we introduce two new lossless image encryption algorithms using this key-image technique.
Yicong Zhou, Karen Panetta, Sos Agaian
openaire +1 more source

