2019
DOI: 10.36478/jeasci.2019.2203.2207
|View full text |Cite
|
Sign up to set email alerts
|

Suggested Method to Create Color Image Features Victor

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“… Multipurpose use: Using the method to encryptdecrypt any data including secret messages (with any length) and digital images (with any type and size) [35][36][37][38][39][40].…”
Section: Figure-7 Data Cryptography Processmentioning
confidence: 99%
See 2 more Smart Citations
“… Multipurpose use: Using the method to encryptdecrypt any data including secret messages (with any length) and digital images (with any type and size) [35][36][37][38][39][40].…”
Section: Figure-7 Data Cryptography Processmentioning
confidence: 99%
“… The possibility of converting the matrix of each color into an available number of elements, this can be done by applying an image resizing operation as shown in the example illustrated in figure 2. Image resizing can be done to get a private key (PK) will a selected length, the contents of this PK will depend on the selected length, the selected color image (image_key), and the selected color matrix as shown in the example illustrated in Figure-3 [11][12][13][14][15][16][17].  The possibility of using two image-keys to generate necessary PKs, these images can be kept in secret (without transmission) and can be used to generate PKs with any needed length as shown in figure 3 [18][19][20][21][22].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Digital images have various sizes, so it is difficult to select the number of decomposition levels, so we can use the total color image histogram with 256 elements to get the image features using WPT decomposition [25].…”
Section: Figure 6 Wpt Decompositionmentioning
confidence: 99%
“…Most encryption operations depend on the use of a private secret key [5][6][7], as this key is used in the process of executing some specific operations on the secret data to generate destructive and incomprehensible data [8,9] as shown in the Figure 1. In order to generate data that is similar to the original secret data without ever losing any data or any part of it, the decryption process is carried out using the specified operations on the secret key and the encrypted data [10][11][12].…”
Section: Introductionmentioning
confidence: 99%