2017
DOI: 10.1007/s11042-017-4741-7
|View full text |Cite
|
Sign up to set email alerts
|

Transreceiving of encrypted medical image – a cognitive approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 26 publications
(8 citation statements)
references
References 40 publications
0
8
0
Order By: Relevance
“…The flatter the distribution of gray pixel values is, the higher the information entropy. It is calculated by the following equation [35]: Hfalse(xfalse)=i=1Lpfalse(xifalse)log2pfalse(xifalse),where p(xi) represents the probability of the information source x , for an 8‐bit depth gray image, the maximum value of entropy is 8. So, the closer it gets to 8, the greater and random the cryptosystem is.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The flatter the distribution of gray pixel values is, the higher the information entropy. It is calculated by the following equation [35]: Hfalse(xfalse)=i=1Lpfalse(xifalse)log2pfalse(xifalse),where p(xi) represents the probability of the information source x , for an 8‐bit depth gray image, the maximum value of entropy is 8. So, the closer it gets to 8, the greater and random the cryptosystem is.…”
Section: Resultsmentioning
confidence: 99%
“…The DNA is a molecule composed of four types of nucleotides: Adenine (A), Thymine (T), Cytosine (C), and Guanine (G). Among these bases, A and G are complementary to T and C, respectively [35]. In binary numbers, 0 is the complement of 1.…”
Section: Introductionmentioning
confidence: 99%
“…The proposed scheme involves operations like RC5, Logistic mapping, DNA, DGT, LSIC and CR based sensing schemes. The descriptions of the methods are as follows [4]- [6], [8], [10], [12]:…”
Section: Background Of the Proposed Schemementioning
confidence: 99%
“…To conserve the concealment of the information new proficiency was developed to make high authentication in communication, one such developed is encryption. Encryption techniques are very optimistic for digital images and should be used to disappoint opponent attacks from unintended users [4], [5].…”
Section: Introductionmentioning
confidence: 99%
“…In terms of form, these maps are all chaotic maps with low dimension. The image encryption system built by Praveenkumar is based on logical mapping, but its weakness is that its anti attack ability is not obvious [ 8 ].…”
Section: Introductionmentioning
confidence: 99%