2023
DOI: 10.3991/ijoe.v19i01.36901
|View full text |Cite
|
Sign up to set email alerts
|

An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments

Abstract: Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image base… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 25 publications
0
4
0
Order By: Relevance
“…This has been conducted by the luminosity method. The latter indicates that the contribution of the Red color must be reduced, the contribution of the Green color must be increased, and the contribution of the Blue color must be placed between these two [26,27]. Samples of the generated grayscale images are portrayed in Figure 3.…”
Section: A Convert Color To Grayscale Imagesmentioning
confidence: 99%
See 1 more Smart Citation
“…This has been conducted by the luminosity method. The latter indicates that the contribution of the Red color must be reduced, the contribution of the Green color must be increased, and the contribution of the Blue color must be placed between these two [26,27]. Samples of the generated grayscale images are portrayed in Figure 3.…”
Section: A Convert Color To Grayscale Imagesmentioning
confidence: 99%
“…This method can replace thousands of features with hundreds or less. Such features are referred to as weak classifiers [26,31].…”
Section: ) Adaptive Boosting (Adaboost)mentioning
confidence: 99%
“…Corners can be determined according to on the USAN zone. When the zone of USAN is up to the tiny, like status "a," the nucleus is within the corner [44,[46][47][48][49]. (…”
Section: Susan Edge Detectorsmentioning
confidence: 99%
“…g refers to geometric threshold that locates the sharp scale of corner. ultimately, corners being establish via non-maximum inhibition [46,[48][49][50]. Suggested method A partial facial encryption manner in real world experiences is offered in the suggested manner function.…”
Section: 𝑛𝑛(𝑟𝑟mentioning
confidence: 99%