2014 International Conference on Circuits, Systems, Communication and Information Technology Applications (CSCITA) 2014
DOI: 10.1109/cscita.2014.6839235
|View full text |Cite
|
Sign up to set email alerts
|
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…In Table 3, the variance of several images' histograms are listed. In practice, histograms are often normalized by Equation (13).…”
Section: Histogramsmentioning
confidence: 99%
See 2 more Smart Citations
“…In Table 3, the variance of several images' histograms are listed. In practice, histograms are often normalized by Equation (13).…”
Section: Histogramsmentioning
confidence: 99%
“…The calculation formula of information entropy is as shown in Equation (14). Here, the p(r i ) is identical to Equation (13).…”
Section: Information Entropymentioning
confidence: 99%
See 1 more Smart Citation
“…When a random variable's probability distributes equally, the Shannon entropy will be the biggest. If the Shannon entropy of a cipher text image approaches the theoretical peak value, the encryption will be considered as effective [7]. Assume the probability of pixel value is ℎ( ) and the total gray level is ; Shannon entropy of the image is calculated by…”
Section: Shannon Entropy Shannon Entropy or Informationmentioning
confidence: 99%