2019
DOI: 10.1007/978-3-030-16837-7_3
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Image Encryption Scheme Based on Signcryption Technique with Adaptive Elephant Herding Optimization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(17 citation statements)
references
References 19 publications
0
17
0
Order By: Relevance
“…Indeed, the structure it should have been made sure for the safe transmission and compelling stockpiling of clinical pictures interleaved with quiet data. An alternate disorganized framework in the phases of perplexity and dissemination has been dissected by choosing a complex disordered guide to additionally upgrade the intricacy of the calculation, thus improving the security [9], [13]- [15], and [19]- [23]. The representations of IoMT framework (a) and the Image security paradigm of IoM (b) are shown in Fig 1 . The picture encryption calculation named Shuffle Encryption Algorithm (SEA) had exhibited a nonlinear byte-substitution arrange by utilizing an s-box with the assistance of a mixed activity [19].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Indeed, the structure it should have been made sure for the safe transmission and compelling stockpiling of clinical pictures interleaved with quiet data. An alternate disorganized framework in the phases of perplexity and dissemination has been dissected by choosing a complex disordered guide to additionally upgrade the intricacy of the calculation, thus improving the security [9], [13]- [15], and [19]- [23]. The representations of IoMT framework (a) and the Image security paradigm of IoM (b) are shown in Fig 1 . The picture encryption calculation named Shuffle Encryption Algorithm (SEA) had exhibited a nonlinear byte-substitution arrange by utilizing an s-box with the assistance of a mixed activity [19].…”
Section: Related Workmentioning
confidence: 99%
“…The accessibility of IoMT applications allows to make a diagnosis, make copies, data and retrieve a large number of digital images around the world. It often results in the production of illegitimate copies or unauthorized use in concern [9], [10], [11], [12], [13]. Therefore, to protect images, many researchers have focused on developing techniques for image security in the IoMT applications [6], [9].…”
Section: Introductionmentioning
confidence: 99%
“…Visual inspection is a major indicator in evaluating the quality of encrypted images. If the image features are hidden well, this means that the utilized image cryptosystem is good in performance [15], [16], [20], [23], [25]. Moreover, it is known that visual examination does not detect the full relation between the original and the encrypted images.…”
Section: A Visual Inspectionmentioning
confidence: 99%
“…Consequently, securing images transmitted via digital communication systems to keep them away from modification, partial or total removal of their contents, and addition of fake information has become a vital research problem for scholars. Hence, various image ciphering techniques have been proposed to secure transmitted digital images [1]- [15].…”
Section: Introductionmentioning
confidence: 99%
“…B ECAUSE of the advanced development of the communication networks and the high quantity of valuable information that can be contained in an image, the image ciphering for protecting confidential data is a field with a highly dynamic development [1]- [6].…”
Section: Introductionmentioning
confidence: 99%