2020
DOI: 10.1016/j.imu.2020.100396
|View full text |Cite
|
Sign up to set email alerts
|

A novel chaotic encryption scheme based on efficient secret keys and confusion technique for confidential of DICOM images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(14 citation statements)
references
References 29 publications
0
14
0
Order By: Relevance
“…Plain frontal view of the X-ray images, encrypted images, and decrypted images for the normal condition and different lungrelated diseases, including fibrosis (F), inflammation (In), pneumonia (P), pleural effusion (Eff), pneumothorax (Pt), and emphysema (Em), and normal condition (Nor) with 256 (2 8 ) gray-scale levels, if the distribution of gray values is more uniform, the IE index is greater and approaches 8. This index is defined as follows [1,21,44]:…”
Section: Evaluation Of the Decryption Performancementioning
confidence: 99%
See 3 more Smart Citations
“…Plain frontal view of the X-ray images, encrypted images, and decrypted images for the normal condition and different lungrelated diseases, including fibrosis (F), inflammation (In), pneumonia (P), pleural effusion (Eff), pneumothorax (Pt), and emphysema (Em), and normal condition (Nor) with 256 (2 8 ) gray-scale levels, if the distribution of gray values is more uniform, the IE index is greater and approaches 8. This index is defined as follows [1,21,44]:…”
Section: Evaluation Of the Decryption Performancementioning
confidence: 99%
“…When a hacker attack makes a minor or major change in encrypted pixels, NPCR and UACI are the indexes used to measure the performance and efficiency against differential hacker attacks. These indexes can be defined as follows [1,43,44]:…”
Section: Evaluation Of the Decryption Performancementioning
confidence: 99%
See 2 more Smart Citations
“…While the algorithm claims to perform better than other methods, it did not include concrete results for the same through a variety of security and encryption quality metrics, such as Entropy, NPCR, UACI, etc. [ 20 ].…”
Section: Literature Reviewmentioning
confidence: 99%