2021
DOI: 10.1016/j.optlastec.2020.106911
|View full text |Cite
|
Sign up to set email alerts
|

Optical selective encryption based on the FRFCM algorithm and face biometric for the medical image

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 33 publications
(8 citation statements)
references
References 32 publications
0
8
0
Order By: Relevance
“…To isolate the lung from the background, the images were segmented using snake optimization. The proposed approach was compared with three fuzzy-based clustering methods, FCM [ 10 ], KFCM [ 16 ], SAFCM [ 14 ] and FRFCM [ 62 ] based on two metrics: intersection over union (IoU) [ 58 ] and Hausdorff distance. Figure 8 indicates examples of lungs segmented by the Snake algorithm.…”
Section: Empirical Evaluationsmentioning
confidence: 99%
“…To isolate the lung from the background, the images were segmented using snake optimization. The proposed approach was compared with three fuzzy-based clustering methods, FCM [ 10 ], KFCM [ 16 ], SAFCM [ 14 ] and FRFCM [ 62 ] based on two metrics: intersection over union (IoU) [ 58 ] and Hausdorff distance. Figure 8 indicates examples of lungs segmented by the Snake algorithm.…”
Section: Empirical Evaluationsmentioning
confidence: 99%
“…Cluster group keys are diverse from one cluster to another. Also in [23], an optical selective encryption scheme for the medical image based on the fast and robust fuzzy C-means clustering (FRFCM) algorithm and face biometric has been proposed.…”
Section: Related Workmentioning
confidence: 99%
“…With the fast development and application of network technology, image information is more and more widely used in our daily life for different purposes such as medical images, scanned images, and remote sensing images Hossein Movafegh Ghadirli and Enayatifar [1]; Jianfeng Zhao et al [2]; Sui and Gao [3]; Nanrun Zhou et al [4]; Yuxin Shen et al [5]; Xiaoyong Ji et al [6]. To prevent image information from being attacked by hackers and other illegal elements during the network transmission process, which poses a threat to information security, researchers from various countries have studied various methods to hide and protect image information Gen Liu and Jiang [7]; Yuzhen Li et al [8]; Xingyuan Wang and Cao [9]; Wang and Sun [10]; Vidhya and Brindha [11].…”
Section: Introductionmentioning
confidence: 99%