2018
DOI: 10.1007/978-981-13-1810-8_40
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Random Permutation of Image Pixels Enciphered Model from Cyber Attacks for Covert Operations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…This technique of data representation was developed by "Karl Pearson" it looks similar to bar plots but is completely different from the bar plot. [105][106][107] Histogram analysis is quite useful in medical irregularity detection, 108,109 privacy maintenance, 110 data interpretation 111 resonance imaging, 112 image processing, 113 and so on.…”
Section: Histogrammentioning
confidence: 99%
“…This technique of data representation was developed by "Karl Pearson" it looks similar to bar plots but is completely different from the bar plot. [105][106][107] Histogram analysis is quite useful in medical irregularity detection, 108,109 privacy maintenance, 110 data interpretation 111 resonance imaging, 112 image processing, 113 and so on.…”
Section: Histogrammentioning
confidence: 99%
“…10,11 This shortcoming gives birth to private content-based image retrieval (PCBIR) systems. [12][13][14] Many organizations in the corporate world have developed their PCBIR systems such as Viraz Incorporation, International Business Machine, Media Site Incorporation, Facebook, Google, and so on. 15,16 The main objective of PCBIR systems is to protect confidential data from cyber mugging and digital hacking by making queries through statistical features.…”
Section: F I G U R Ementioning
confidence: 99%
“…Assuming MPS, we have considered only 10% randomly selected image pixels from the total image pixels. An example of an image matrix representing the random pixel distribution is shown in the Equation (13).…”
Section: Mathematical Modelling Of the Proposed Algorithmmentioning
confidence: 99%
See 1 more Smart Citation