2019
DOI: 10.1007/s11517-019-02037-3
|View full text |Cite
|
Sign up to set email alerts
|

Medical image encryption using fractional discrete cosine transform with chaotic function

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
47
0
1

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 96 publications
(48 citation statements)
references
References 54 publications
0
47
0
1
Order By: Relevance
“…The cosine transform is a very useful mathematical tool that is used in applications of signal and optical processing, such as filtering, encryption, compression and recognition [1][2][3][4][5][6][7][8][9]. The finite fields are special mathematical structures based on integer numbers, which are used in image and video watermarking; digital data coding and decoding with detection and correction of errors in communication systems; estimation; compression; filtering and encryption of signals and images; and other applications [10][11][12][13][14][15].…”
Section: Introductionmentioning
confidence: 99%
“…The cosine transform is a very useful mathematical tool that is used in applications of signal and optical processing, such as filtering, encryption, compression and recognition [1][2][3][4][5][6][7][8][9]. The finite fields are special mathematical structures based on integer numbers, which are used in image and video watermarking; digital data coding and decoding with detection and correction of errors in communication systems; estimation; compression; filtering and encryption of signals and images; and other applications [10][11][12][13][14][15].…”
Section: Introductionmentioning
confidence: 99%
“…We compare both images to detect a correlation between the plain image and the encrypted image. Using a practical algorithm, -0.0012 0.0099 -0.0032 [24] 0.0027 0.0015 0.0019 [25] 0.0023 -0.0010 0.0009 [26] 0.0944 0.0057 0.0067 [15] 0.0098 -0.0078 0.0181…”
Section: Analysis Of Differential Attackmentioning
confidence: 99%
“…The results show that our proposed algorithm is highly capable of resisting differential attacks. [23] 99.610 33.261 [24] 99.532 33.450 [25] 99.51 33.39 [26] 99.79 33.16 [15] 99.6067 33.4954…”
Section: Analysis Of Differential Attackmentioning
confidence: 99%
“…Data encryption is usually done by chaotic or hyper-chaotic methods [ 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 ]. In some researches, chaotic or hyper-chaotic systems are used to encrypt peripheral data [ 38 , 39 , 40 , 41 , 42 , 43 ].…”
Section: Introductionmentioning
confidence: 99%