2018
DOI: 10.1007/s11042-018-6795-6
|View full text |Cite
|
Sign up to set email alerts
|

A medical image crypto-compression algorithm based on neural network and PWLCM

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8

Relationship

3
5

Authors

Journals

citations
Cited by 29 publications
(8 citation statements)
references
References 18 publications
0
8
0
Order By: Relevance
“…The frequently used tools for statistical analysis in the image cryptography community are the image histogram, information Entropy (E), correlation coefficient (ρ), and Normalized Correlation (NC). [31][32][33][34] The use of the hardware co-simulation approach allows us to generate the corresponding encrypted image for each image. Afterward, we use the aforementioned tools to analyze the encrypted image.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The frequently used tools for statistical analysis in the image cryptography community are the image histogram, information Entropy (E), correlation coefficient (ρ), and Normalized Correlation (NC). [31][32][33][34] The use of the hardware co-simulation approach allows us to generate the corresponding encrypted image for each image. Afterward, we use the aforementioned tools to analyze the encrypted image.…”
Section: Discussionmentioning
confidence: 99%
“…Statistical analysis provides a variety of mathematical methods for evaluating the ciphered image against statistical hackers. The frequently used tools for statistical analysis in the image cryptography community are the image histogram, information Entropy (E), correlation coefficient ( ρ), and Normalized Correlation (NC) 31–34 . The use of the hardware co‐simulation approach allows us to generate the corresponding encrypted image for each image.…”
Section: Discussionmentioning
confidence: 99%
“…References [ 11 , 12 ] use carrier images transformed by wavelet packets to hide information. References [ 13 , 14 ] proposed an image hiding algorithm in the discrete Fourier transform domain. References [ 15 , 16 ] proposed a DCT algorithm to change the pixel length to achieve image hiding.…”
Section: Related Workmentioning
confidence: 99%
“…Indeed, the resemblance between the original and extracted watermark is detected by the calculus of different distances among the detected and inserted watermark. is measure is performed via the NCC (normalized cross-correlation) [23,37,38]. Its value is generally between 0 and 1.…”
Section: Ncc (Normalized Cross-correlationmentioning
confidence: 99%