2017 14th International Conference on Computer Graphics, Imaging and Visualization 2017
DOI: 10.1109/cgiv.2017.10
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Selective Encryption DWT-Based Algorithm for Medical Images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(9 citation statements)
references
References 9 publications
0
9
0
Order By: Relevance
“…A framework for the chaos-based quantum encryption has been proposed by Ahmed and coauthors [17]. Abdmouleh and coauthors [18] presented a new approach of partial encryption based on the Discrete Wavelet Transform (DWT). Abdel-Nabi and coauthors [19] implemented a simple and efficient joint reversible data hiding and encryption algorithm.…”
Section: Literature Reviewmentioning
confidence: 99%
“…A framework for the chaos-based quantum encryption has been proposed by Ahmed and coauthors [17]. Abdmouleh and coauthors [18] presented a new approach of partial encryption based on the Discrete Wavelet Transform (DWT). Abdel-Nabi and coauthors [19] implemented a simple and efficient joint reversible data hiding and encryption algorithm.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Encryption technology achieves the function of hiding information by encoding information. Abdmouleh et al [13] proposed a new approach of partial encryption based on the discrete wavelet transform (DWT) and compatible with the norm JPEG2000 in order to assure an optimal and a secure transmission and storage of medical images. Shalaby et al [14] proposed a novel chaotic-based medical image encryption technique.…”
Section: Introductionmentioning
confidence: 99%
“…Their scheme represents permutation and substitution operations to obtain the necessary effect of diffusion and confusion [12,13]. This approach includes a wide range of benefits, like a wide key space range, increased sensitivity of the key, decreased time of encryption, amongst other factors [14,15]. None-the-less, the author has discovered that this specific approach has been exposed to certain plain-text attack which is why it puts forth a successful plain-text attack.…”
Section: Introductionmentioning
confidence: 99%