2016 IEEE First International Conference on Data Stream Mining &Amp; Processing (DSMP) 2016
DOI: 10.1109/dsmp.2016.7583523
|View full text |Cite
|
Sign up to set email alerts
|

The method of encryption based on Ateb-functions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 3 publications
0
7
0
Order By: Relevance
“…is calculated for various values of m and n [27], which are given in Table 1. The properties for Ateb-sa, which are used to construct the imaginary component of the Gabor filter, are similar.…”
Section: Construction and Properties Of Ateb-functions For Filtrationmentioning
confidence: 99%
See 1 more Smart Citation
“…is calculated for various values of m and n [27], which are given in Table 1. The properties for Ateb-sa, which are used to construct the imaginary component of the Gabor filter, are similar.…”
Section: Construction and Properties Of Ateb-functions For Filtrationmentioning
confidence: 99%
“…Below is a snippet of the code that calculates the value of Ateb-functions. Numerous methods for calculating Ateb-ca were used in papers [25][26][27]. In this study, odeint was used from the Python scipy library.…”
Section: Image Processing Using the Ateb-gabor Filtermentioning
confidence: 99%
“…An alternative approach to solving data encryption tasks using algebraic transformations is considered in [18][19].…”
Section: Analysis Of Publicationsmentioning
confidence: 99%
“…Fig. 2 shows the normal Gabor filter, which is displayed with the parameters of the Ateb-function [9] m and n of the unit level. Ten figures show a change of ω from 0.1 to 1.0.…”
Section: Ateb-gabor Filtrationmentioning
confidence: 99%