2022
DOI: 10.1109/tnnls.2021.3062754
|View full text |Cite
|
Sign up to set email alerts
|

DeepKeyGen: A Deep Learning-Based Stream Cipher Generator for Medical Image Encryption and Decryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
40
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 79 publications
(40 citation statements)
references
References 33 publications
0
40
0
Order By: Relevance
“…As shown in Table 6 which displays the comparative results assessing our proposed system with older systems due to their NPCR and UACI values, from the following analysis, it has been proved that the proposed scheme is robust and can withstand the differential assaults. [35] 0.9961 0.3357 Ding et al [23] 0.9959 0.2319 Bao and Xue [39] 0.9964 0.3349…”
Section: Resistance To Differential Attack Attackersmentioning
confidence: 99%
“…As shown in Table 6 which displays the comparative results assessing our proposed system with older systems due to their NPCR and UACI values, from the following analysis, it has been proved that the proposed scheme is robust and can withstand the differential assaults. [35] 0.9961 0.3357 Ding et al [23] 0.9959 0.2319 Bao and Xue [39] 0.9964 0.3349…”
Section: Resistance To Differential Attack Attackersmentioning
confidence: 99%
“…where κ is a parameter of chaotic map, which is used to adjust the value of β-map and indicate the bifurcation parameter. Beta function is utilized in various types of applications in image processing and engineering, especially in bio-medical signal and image compression, image detection [27][28][29][30][31].…”
Section: Fractional Beta Chaotic (Fbc) Mapsmentioning
confidence: 99%
“…Finally, Arnold map and RSA algorithm are used by Zahmoul et al [26]. Beta function is utilized in various types of applications in image processing and engineering, especially in bio-medical signal and image compression, image detection [27][28][29][30][31][32][33][34][35][36]. Other works can be located in [37][38][39][40][41][42][43][44][45][46][47][48][49].…”
Section: Introductionmentioning
confidence: 99%
“…D EEP learning methods have been widely adopted in a broad range of domains, such as image classification [1][2][3][4], image security [5][6][7], medical aided diagnosis [8][9][10][11] and facial recognition [12,13]. In some of these application domains, the performance of deep learning models has reportedly exceed those of human.…”
Section: Introductionmentioning
confidence: 99%