The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2021
DOI: 10.1007/s10462-021-10070-8
|View full text |Cite
|
Sign up to set email alerts
|

Secure video communication using firefly optimization and visual cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 41 publications
(14 citation statements)
references
References 39 publications
0
14
0
Order By: Relevance
“…Readers can refer to [202] for more works about it. Security [203] and privacy-perserving problem [204] are also important in image reconstruction, especially in medical image reconstruction tasks. However, they have not been studied deeply.…”
Section: Discussion and Future Directionsmentioning
confidence: 99%
“…Readers can refer to [202] for more works about it. Security [203] and privacy-perserving problem [204] are also important in image reconstruction, especially in medical image reconstruction tasks. However, they have not been studied deeply.…”
Section: Discussion and Future Directionsmentioning
confidence: 99%
“…WHT is used to extract directional features from each image block to assure the robustness of our proposed approach against geometrical attacks [37]. Then, LBP is used to extract the texture feature representation of image blocks that are robust to false positives and geometrical attacks [33]. Lastly, DWT is used to extract multiscale features from image blocks that represent the important features of each block at the different scales [41].…”
Section: Shares Construction Phasementioning
confidence: 99%
“…Kumar el al. [33] developed an approach using an optimization algorithm and visual cryptography to protect the authenticity and integrity of digital videos by embedding robust watermarks inside them.…”
Section: Introductionmentioning
confidence: 99%
“…The pretreated data were provided from medical imaging professionals; to preserve patient privacy [14,15], all the identity information was removed. As shown in Figure 1, the image slices have been ordered from head to hip in spatial relation.…”
Section: Introductionmentioning
confidence: 99%