2021
DOI: 10.1007/978-3-030-68291-0_40
|View full text |Cite
|
Sign up to set email alerts
|

Image Encryption Algorithms Using Machine Learning and Deep Learning Techniques—A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 20 publications
0
1
0
Order By: Relevance
“…With the development of IoMT, many medical images need to be easily distributed among doctors and patients. [1] Therefore, medical image encryption technology is essential to protect the confidentiality and integrity of medical images during storage and transmission, and it should also be able to effectively resist various network attacks, including cropping attacks and noise attacks, ensuring the quality of medical images throughout the transmission process [2]. By employing different encryption algorithms and keys, medical image encryption ensures that only authorized individuals, such as doctors and medical staff, can access the images and use them for diagnosis or treatment, safeguarding sensitive information from unauthorized access or interception.…”
Section: Introductionmentioning
confidence: 99%
“…With the development of IoMT, many medical images need to be easily distributed among doctors and patients. [1] Therefore, medical image encryption technology is essential to protect the confidentiality and integrity of medical images during storage and transmission, and it should also be able to effectively resist various network attacks, including cropping attacks and noise attacks, ensuring the quality of medical images throughout the transmission process [2]. By employing different encryption algorithms and keys, medical image encryption ensures that only authorized individuals, such as doctors and medical staff, can access the images and use them for diagnosis or treatment, safeguarding sensitive information from unauthorized access or interception.…”
Section: Introductionmentioning
confidence: 99%