2018
DOI: 10.1007/s10586-018-2096-0
|View full text |Cite
|
Sign up to set email alerts
|

Performance analysis of medical image security using steganography based on fuzzy logic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 2 publications
0
5
0
Order By: Relevance
“…The proposed technique achieves higher SSIM and higher C r than those introduced by Thanki et al [12], but the latest achieves higher PSNR values than those of the proposed technique. The proposed technique achieves higher PSNR and C r values than those of Yuvaraja et al [13], Thakur et al [15], and El-Shafai et al [16]. Shanthakumari et al [14] have higher PSNR values than those of the proposed technique, but SSIM values for the proposed technique are higher than those of Shanthakumari et al [14].…”
Section: Simulation Results and Discussionmentioning
confidence: 68%
See 3 more Smart Citations
“…The proposed technique achieves higher SSIM and higher C r than those introduced by Thanki et al [12], but the latest achieves higher PSNR values than those of the proposed technique. The proposed technique achieves higher PSNR and C r values than those of Yuvaraja et al [13], Thakur et al [15], and El-Shafai et al [16]. Shanthakumari et al [14] have higher PSNR values than those of the proposed technique, but SSIM values for the proposed technique are higher than those of Shanthakumari et al [14].…”
Section: Simulation Results and Discussionmentioning
confidence: 68%
“…Tab. 2 demonstrates the comparison outcomes between the suggested technique and state-of-the-art schemes [12][13][14][15][16]. The proposed technique achieves higher SSIM and higher C r than those introduced by Thanki et al [12], but the latest achieves higher PSNR values than those of the proposed technique.…”
Section: Simulation Results and Discussionmentioning
confidence: 92%
See 2 more Smart Citations
“…To increase the number of messages that can be hidden, fuzzy logic is used to help detect image edges with the chaotic method [10]. Medical image security also utilizes fuzzy logic to insert proprietary information by utilizing image edges [18]. The approach with fuzzy logic in image edge detection is proposed to be combined with the LSB technique to increase the number of messages that can be inserted [19].…”
Section: The Role Of Fuzzy In Steganographymentioning
confidence: 99%