2021
DOI: 10.32604/cmc.2021.016165
|View full text |Cite
|
Sign up to set email alerts
|

A Triple-Channel Encrypted Hybrid Fusion Technique to Improve Security of Medical Images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…The technique is also lossless, which is essential in a healthcare encryption system. For a strategy that is more stealthy, secure, and robust than prior approaches, Salama et al [28] combined the Discrete Wavelet Transform's wavelet-induced multi-resolution decomposition capacity with the energy compaction of the Discrete Cosine Transform. Banik et al [29] presented a method for encrypting a series of medical photos using the elliptic curve analog ElGamal encryption scheme and the Mersenne Twister PRNG.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The technique is also lossless, which is essential in a healthcare encryption system. For a strategy that is more stealthy, secure, and robust than prior approaches, Salama et al [28] combined the Discrete Wavelet Transform's wavelet-induced multi-resolution decomposition capacity with the energy compaction of the Discrete Cosine Transform. Banik et al [29] presented a method for encrypting a series of medical photos using the elliptic curve analog ElGamal encryption scheme and the Mersenne Twister PRNG.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Salama et al [23] suggested a triple-channel encrypted hybrid fusion technique to improve the robustness, imperceptibility, and security of medical images. Liu et al [24] introduced image watermarking algorithms based on DWT, Hessenberg decomposition (HD), and SVD transforms.…”
Section: Introductionmentioning
confidence: 99%
“…And in the transform domain, where pixel values are transformed into frequency coefficients and then is used to embed, commonly used techniques are Discrete Cosine Transform(DCT) [2,3], Discrete Wavelet Transform(DWT) [4], Discrete Fourier Transform(DFT) [5], there are some improvements on these basic techniques such as Redundant Discrete Wavelet Transformation(RDWT) [6], Quaternion Discrete Fourier transform(QDFT) [7], etc. Sometimes multiple frequency techniques are used in combination such as DCT-DWT [8,9], Dual Tree Complex Wavelet Transform-Discrete Cosine Transform(DTCWT-DCT ) [10] etc. The screen photography process, which is the process of capturing a screen with a mobile phone and generating an image, undergoes analog-to-digital and digital-to-analog conversion attacks [11] and also causes many distortions.…”
Section: Introductionmentioning
confidence: 99%