-
61
A novel 2D MTMHM based key generation for enhanced security in medical image communication
Published 2025-07-01“…Simulation and experimental analysis demonstrate that the encryption system effectively resists statistical, differential and Brute-force attacks. …”
Get full text
Article -
62
Gradual poisoning of a chest x-ray convolutional neural network with an adversarial attack and AI explainability methods
Published 2025-07-01“…To improve generalizability, we create a generic ResNet pneumonia classification model and then use it as an example by subjecting it to BadNets adversarial attacks. The study uses various poisoned datasets of different compositions (2%, 16.7% and 100% ratios of poisoned data) and two different test sets (a normal set of test data and one that contained poisoned images) to study the effects of BadNets. …”
Get full text
Article -
63
Integrating Fractional-Order Hopfield Neural Network with Differentiated Encryption: Achieving High-Performance Privacy Protection for Medical Images
Published 2025-06-01“…Compared with recent leading counterparts, MIES-FHNN-DE better meets the privacy protection demands for medical images in emerging fields like medical intelligent analysis and medical cloud services.…”
Get full text
Article -
64
Effects of nano-SiO2 on sulfate attack resistance of multi-solid waste-based alkali-activated mortar
Published 2025-07-01“…The mechanism behind the improved sulfate attack resistance due to nano-modification was elucidated using advanced microscopic techniques, such as X-ray diffraction (XRD), scanning electron microscopy (SEM), and backscattered electron imaging (BSE). …”
Get full text
Article -
65
Subjective Cognitive Impairment, Depressive Symptoms, and Fatigue after a TIA or Transient Neurological Attack: A Prospective Study
Published 2017-01-01“…We prospectively investigated their prevalence and course after a transient ischemic attack (TIA) or nonfocal transient neurological attack (TNA) and the association with diffusion-weighted imaging (DWI) lesions. …”
Get full text
Article -
66
4D Memristive Hyperchaotic System for Secure Image Encryption Using Non-Associative Algebraic-Chaotic Sequences
Published 2025-01-01“…The encryption framework provides great efficiency, low computing cost, and resilience to cryptographic attacks. Comprehensive security assessments demonstrate the scheme’s efficacy, such as key sensitivity analysis, entropy evaluation, correlation testing, and differential attack resistance. …”
Get full text
Article -
67
Chaotic image encryption algorithm based on single image local scrambling and dynamic feedback diffusion
Published 2016-11-01“…A novel chaotic image encryption algorithm based on single image local scrambling and dynamic feedback diffusion was presented.Firstly,a single image local scrambling algorithm was proposed.Secondly,a novel dynamic feedback diffusion strategy was proposed to change the pixel values of the scrambled image in the phase of diffusion,by which improved the results of image encryption.Finally,the simulation results and performance analysis show that the number pixels change rate(NPCR)values and unified average changing intensity(UACI)values of the proposed algorithm can be close to 99.6% and 33.4%,showing that the proposed algorithm has better resistance to differential attacks and saves time compared with the other three classic algorithms.…”
Get full text
Article -
68
Implementation of an Image Tampering Detection System with a CMOS Image Sensor PUF and OP-TEE
Published 2024-11-01“…Since image recognition systems use image data acquired by image sensors for analysis by AI technology, an important security issue is guaranteeing the authenticity of data transmitted from image sensors to successfully perform inference using AI. …”
Get full text
Article -
69
EarlyExodus: Leveraging early exits to mitigate backdoor vulnerability in deep learning
Published 2025-09-01Get full text
Article -
70
A compressed image encryption algorithm leveraging optimized 3D chaotic maps for secure image communication
Published 2025-04-01“…The result evaluated the proposed OptiSecure-3D image encryption algorithm with a randomness test, pixel adjacency correlation test, and differential analysis. …”
Get full text
Article -
71
-
72
Evaluating the Impact of Face Anonymization Methods on Computer Vision Tasks: A Trade-Off Between Privacy and Utility
Published 2025-01-01“…However, anonymization affects the quality of the data and thus might affect the performance of later conducted data analysis. In this work, we investigate the influence of different image-based subject anonymization methods on the performance of the three common computer vision (CV) tasks: keypoint detection, instance segmentation, and face detection. …”
Get full text
Article -
73
Correlation of brain segmental volume changes with clinical parameters: a longitudinal study in multiple sclerosis patients
Published 2023-02-01“…In addition, putaminal volume loss was related to a higher number of attacks. Besides, a negative relation between FSS with total amygdala volumes, a link between atrophy of globus pallidus and ARR, and BDI scores was found with the aid of network analysis. …”
Get full text
Article -
74
Object detection with afordable robustness for UAV aerial imagery: model and providing method
Published 2024-08-01“…Development of a model and method to ensure the robustness of object detectors for aerial image analysis. Methods. Combination of ideas and methods for dynamic neural networks, and methods for robustness and resilience optimization for neural networks. …”
Get full text
Article -
75
Chaotic Image Encryption using Two Level Scrambling
Published 2025-06-01“…From the experimental results and analysis, it is evident that the proposed image encryption algorithm resists differential and statistical attacks.…”
Get full text
Article -
76
Image encryption scheme based on thorp shuffle and pseudo dequeue
Published 2025-04-01“…Finally, the performance of this algorithm is evaluated through experiments such as statistical analysis, differential attack analysis, and noise attack analysis. …”
Get full text
Article -
77
A DNA Encoding Image Encryption Algorithm Based on Chaos
Published 2025-04-01“…Finally, the scrambled and diffused DNA strand is decomposed into multiple bit-planes to reconstruct an encrypted image. The experimental results and security analysis show that this algorithm has a large enough key space, strong key sensitivity, high image encryption quality, strong robustness and high encryption efficiency. …”
Get full text
Article -
78
Cryptanalysis of an Image Encryption Algorithm Using DNA Coding and Chaos
Published 2025-01-01“…In recent years, many chaotic image encryption algorithms have been cracked by chosen plaintext attack. …”
Get full text
Article -
79
CR Assisted IE Guarded Authenticated Biomedical Image Transactions
Published 2018-01-01“…Metrics like global–local entropies, correlation coefficients, key sensitivity, chi-square tests, cropping attacks and differential attack analysis were estimated to authenticate the robustness of the projected encryption scheme.…”
Get full text
Article -
80
A Hyperchaotic Lorenz and DNA-Encoded Image Encryption Algorithm
Published 2024-01-01“…Finally, DNA algorithm rules are used for diffusion processing to obtain the ciphertext image. Key space analysis, histogram analysis, correlation analysis of adjacent pixels, and information entropy analysis of the algorithm results are performed. …”
Get full text
Article