2017
DOI: 10.1016/j.optlaseng.2016.10.009
|View full text |Cite
|
Sign up to set email alerts
|

An algorithm for encryption of secret images into meaningful images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
70
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 105 publications
(71 citation statements)
references
References 37 publications
1
70
0
Order By: Relevance
“…Reference image encryption methods are similar to data hiding methods. Therefore, visual quality is used for evaluating these methods because imperceptibility is very important for reference image encryption methods (Ghebleh et al, 2014;Dhall et al, 2018;Bao and Zhou, 2015;Kanso and Ghebleh, 2017;Avci et al, 2016).…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…Reference image encryption methods are similar to data hiding methods. Therefore, visual quality is used for evaluating these methods because imperceptibility is very important for reference image encryption methods (Ghebleh et al, 2014;Dhall et al, 2018;Bao and Zhou, 2015;Kanso and Ghebleh, 2017;Avci et al, 2016).…”
Section: Related Workmentioning
confidence: 99%
“…Noise-like, texture-like and visually meaningful encrypted images are shown in Fig. 1 (Dhall et al, 2018;Bao and Zhou, 2015;Kanso and Ghebleh, 2017;Yang et al, 2018).…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations