2024
DOI: 10.1016/j.eswa.2023.121376
|View full text |Cite
|
Sign up to set email alerts
|

Image transformation based on optical reservoir computing for image security

Xiao Jiang,
Yiyuan Xie,
Bocheng Liu
et al.
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2025
2025

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 47 publications
0
1
0
Order By: Relevance
“…Although the image encryption algorithms based on chaos can encrypt the original image into a cipher image without semantic features [16], the prominent appearance of cipher image can easily attract the attention of unfamiliar users during the transmission stage, thus bringing unpredictable security risks. To this end, Bao and Zhou [17] proposed an image protection framework that first encrypts an image and then embeds it into another meaningful image.…”
Section: Related Workmentioning
confidence: 99%
“…Although the image encryption algorithms based on chaos can encrypt the original image into a cipher image without semantic features [16], the prominent appearance of cipher image can easily attract the attention of unfamiliar users during the transmission stage, thus bringing unpredictable security risks. To this end, Bao and Zhou [17] proposed an image protection framework that first encrypts an image and then embeds it into another meaningful image.…”
Section: Related Workmentioning
confidence: 99%