2022
DOI: 10.32604/iasc.2022.019348
|View full text |Cite
|
Sign up to set email alerts
|

Visual Protection Using RC5 Selective Encryption in Telemedicine

Abstract: The dissemination of the COVID-19 viruses now extends the usage of video consultations to share perspectives and virtual medical consultations, save expenses and health procedures, track the success of care proposals with detail, consistency, and ease from moment to time. The research aims to study the security of video consultations. We will also present the advantages and disadvantages of video consultations and the complications of their implementation. This paper mainly proposes a practical, high-efficienc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 25 publications
(26 reference statements)
0
3
0
Order By: Relevance
“…We first visually inspect the encoded and decoded video frames of the proposed opto-video LASM-based FrFT scheme. Then, we test the quality of the encoded video frames utilizing the entropy [24], the correlation coefficient [25], the histogram deviation (D I ) [26], the irregular deviation (D H ) [27], the number of pixel change rate (NPCR) and the unified average change intensity (UACI) [28]. We also compare histograms [29] of the source, the encrypted, and the decrypted video frames.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…We first visually inspect the encoded and decoded video frames of the proposed opto-video LASM-based FrFT scheme. Then, we test the quality of the encoded video frames utilizing the entropy [24], the correlation coefficient [25], the histogram deviation (D I ) [26], the irregular deviation (D H ) [27], the number of pixel change rate (NPCR) and the unified average change intensity (UACI) [28]. We also compare histograms [29] of the source, the encrypted, and the decrypted video frames.…”
Section: Resultsmentioning
confidence: 99%
“…An accepted video encryption system should conceal this correlation. The correlation coefficient CC(P, C) among the video frame P(x i , y j ) and the encrypted video frame C(x,y j ) is expressed as [25]:…”
Section: Correlation Coefficientmentioning
confidence: 99%
“…As technology advances and video becomes more prevalent in entertainment, education, and surveillance industries, the necessity to protect this form of digital media's privacy and security is growing. Various encryption techniques are employed to protect video content from combating the risk of unauthorized access and breaches, resulting in growth in the branch of video encryption [10], [11], [12], [13], [14], [15], which aims to safeguard video files and ensure the confidentiality of information.…”
mentioning
confidence: 99%