2017 3rd International Conference on Information Management (ICIM) 2017
DOI: 10.1109/infoman.2017.7950423
|View full text |Cite
|
Sign up to set email alerts
|

Digital image security based on data hiding and cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
3
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 18 publications
(5 citation statements)
references
References 9 publications
1
3
0
Order By: Relevance
“…Subsequently, we evaluate it by calculating the entropy value. Compared with recent works in [44][45][46][47], as shown in Table 8, we obtained a good entropy very close to 8 bits/pixel.…”
Section: Experiments Results Of the Encryption Schemasupporting
confidence: 58%
“…Subsequently, we evaluate it by calculating the entropy value. Compared with recent works in [44][45][46][47], as shown in Table 8, we obtained a good entropy very close to 8 bits/pixel.…”
Section: Experiments Results Of the Encryption Schemasupporting
confidence: 58%
“…Picture encryption keys are generated by first slicing the image into four sections, then encrypting each section individually n times, then reversing the keys for each section, and finally repeating the process n times. As introduced by Al-Haj A. et al in [13], 94 http://www.i-joe.org the watermark picture may be embedded in the source image by using the Histogram Shifting RDH technique in the spatial domain. A partially encrypted picture was produced.…”
Section: Related Workmentioning
confidence: 99%
“…The framework depends on a hybrid approach to facilitate with medical image's diverse security highlights while exchanging the medicinal records. The specialists are presented by Al-Haj et al [37]. These days, cyber-attackers are focusing on healthcare and medicinal services as the most favored domain as highlighted by Alharam et al [38] presented a comparison of the various cybersecurity applications and concentrated on the Advanced Encryption Standard utilization for protecting medicinal services against cyber-assaults, and its applications in e-HI.…”
Section: Hi-forgery /Eavesdroppingmentioning
confidence: 99%