2019
DOI: 10.1117/1.jei.28.3.033031
|View full text |Cite
|
Sign up to set email alerts
|

Secure image transmission based on visual cryptography scheme and artificial neural network-particle swarm optimization-guided adaptive vector quantization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 46 publications
0
3
0
Order By: Relevance
“…Chu et al gave a general overview of AI algorithms based on artificial intelligence technology, mainly focusing on their use in network intrusion detection [2]. Das et al help information and communication technology (ICT) practitioners use AI tools and methods to effectively manage their platforms and provide them with sufficient AI background to deal with real-life problems [3]. The combination of the two, that is, applying the expert system theory to the optimization of the mobile communication network, is an effective way to realize the "intellectualization" of the optimization of the mobile communication network.…”
Section: Introductionmentioning
confidence: 99%
“…Chu et al gave a general overview of AI algorithms based on artificial intelligence technology, mainly focusing on their use in network intrusion detection [2]. Das et al help information and communication technology (ICT) practitioners use AI tools and methods to effectively manage their platforms and provide them with sufficient AI background to deal with real-life problems [3]. The combination of the two, that is, applying the expert system theory to the optimization of the mobile communication network, is an effective way to realize the "intellectualization" of the optimization of the mobile communication network.…”
Section: Introductionmentioning
confidence: 99%
“…This model also supports various image types and is applied to binary, grey, and color images. Das et al (2019), proposed that the unnecessary shares in VCS can grab the hacker's attention while performing transactions, thus posing a threat by revealing the secret image. To avoid undue attention, Shamir's (k, m) scheme can be used for encoding meaningless images.…”
Section: Related Workmentioning
confidence: 99%
“…A Boolean matrix is a matrix with entries from the Boolean domain {0, 1}. Boolean matrices are widely used in many fields such as visual cryptography [1], circuit design and analysis [2], algorithm designing of GPU (graphic processing unit) [3], testability design [4] and artificial intelligence [5].…”
Section: Introductionmentioning
confidence: 99%