-
121
Three-Dimensional and Multiple Image Encryption Algorithm Using a Fractional-Order Chaotic System
Published 2025-05-01“…In the last step of the proposed method, various statistical and security tests, including histogram analysis, correlation coefficient analysis, data loss and noise attack simulations, have been performed on the proposed algorithm. …”
Get full text
Article -
122
Multi-Threshold Remote Sensing Image Segmentation Based on Improved Black-Winged Kite Algorithm
Published 2025-05-01“…Experimental validation using representative samples from the ISPRS Potsdam benchmark dataset demonstrates that our IBKA-optimized OTSU multi-threshold segmentation method outperforms traditional IBKA-optimized pulse coupled neural network (PCNN) approaches in remote sensing image analysis. Quantitative evaluations reveal substantial improvements in the dice coefficient across six randomly selected remote sensing images, achieving performance enhancements of 7.76%, 11.99%, 30.75%, 22.91%, 44.37%, and 18.55%, respectively. …”
Get full text
Article -
123
Medical Image Hybrid Watermark Algorithm Based on Frequency Domain Processing and Inception v3
Published 2025-06-01“…The watermark extraction and decryption process relies on a key provided by a third party, enabling blind extraction of the watermark without requiring the original image. Through extensive experimental data analysis and comparisons with multiple existing algorithms, the results demonstrate that the proposed hybrid watermarking algorithm excels in terms of attack resistance and robustness, significantly improving the security and reliability of medical image watermarking.…”
Get full text
Article -
124
Reversible Adversarial Examples with Minimalist Evolution for Recognition Control in Computer Vision
Published 2025-01-01“…Ultimately, when combined with reversible data hiding, adversarial attacks can achieve reversibility. Experimental results demonstrate that the PSNR and SSIM between the restored images by the method and the original images are ∞ and 1, respectively. …”
Get full text
Article -
125
The correlation analysis between Normalized Wall Index and cerebral perfusion in patients with Mild Carotid Artery Stenosis under 3.0T MRI
Published 2025-03-01“…Abstract Background To explore the relationship between Normalized Wall Index (NWI) and Magnetic Resonance Perfusion Imaging Parameters in Patients with Mild Carotid Artery Stenosis. …”
Get full text
Article -
126
A novel chaotic system with one absolute term: stability, ultimate boundedness, and image encryption
Published 2025-01-01“…The test results showed that the suggested image scheme is very secure and impervious to differential, statistical analysis, and other types of attacks. …”
Get full text
Article -
127
Enhancing medical image privacy in IoT with bit-plane level encryption using chaotic map
Published 2025-06-01“…Finally, the bit planes are combined to produce the ciphertext image. For further security enhancement, this ciphertext is embedded into a carrier image, resulting in a visually secured output.ResultsTo evaluate the effectiveness of our algorithm, various tests are conducted, including correlation coefficient analysis (C.C < or negative), histogram analysis, key space [(1090)8] and sensitivity assessments, entropy evaluation [E(S) > 7.98], and occlusion analysis.ConclusionExtensive evaluations have proven that the designed scheme exhibits a high degree of resilience to attacks, making it particularly suitable for small IoT devices with limited processing power and memory.…”
Get full text
Article -
128
A Color Image Encryption Scheme Based on a Novel 3D Chaotic Mapping
Published 2020-01-01“…The secret key is applied in the shuffling and diffusion. Security analysis indicates that the proposed scheme can resist cryptanalytic attacks. …”
Get full text
Article -
129
A Double-Layer Image Encryption Scheme Based on Chaotic Maps and DNA Strand Displacement
Published 2022-01-01“…Simulation results and security analysis show that the proposed encryption scheme can effectively protect image information and resist conventional information attacks.…”
Get full text
Article -
130
Model and training method for aerial image object detector with optimization of both robustness and computational efficiency
Published 2024-10-01“…The subject of research is Neural network-based object detectors, which are widely used for video image analysis. An increasing number of tasks now demand data processing directly at the source, which limits the available computational resources. …”
Get full text
Article -
131
Enhancing AES image encryption with a three-dimensional hyperchaotic system for increased security and efficiency.
Published 2025-01-01“…Simulation results confirm its robustness against various cryptographic attacks, demonstrating its potential as a preferred solution for digital image privacy protection.…”
Get full text
Article -
132
Deep learning-based encryption scheme for medical images using DCGAN and virtual planet domain
Published 2025-01-01“…Experimental results validate the efficacy of the approach in safeguarding medical images from various security threats, including unauthorized access, tampering, and adversarial attacks. …”
Get full text
Article -
133
A Hybrid Approach for Color Face Recognition Based on Image Quality Using Multiple Color Spaces
Published 2024-12-01“…A comparative analysis that assesses the proposed approach with the state-of-the-art systems using Faces94, ColorFERET, and Replay Attack datasets is presented. …”
Get full text
Article -
134
Dynamical System in Chaotic Neurons with Time Delay Self-Feedback and Its Application in Color Image Encryption
Published 2022-01-01“…The security analysis of the simulation results shows that the encryption algorithm has an excellent anti-attack ability. …”
Get full text
Article -
135
An Image Encryption Scheme Using a 1D Chaotic Double Section Skew Tent Map
Published 2020-01-01“…Analysis of the function implies its chaotic properties in addition to its ability to generate a cryptographically secured random stream of numbers. …”
Get full text
Article -
136
Compressive sensing and DNA coding operation: Revolutionary approach to colour medical image compression‐encryption algorithm
Published 2024-12-01“…Finally, the regrouped bit planes help yield the compressed encrypted images. A comprehensive analysis of the proposed algorithm's encryption and decryption effectiveness, compression performance, and security was conducted. …”
Get full text
Article -
137
A Novel Construction of Substitution Box Based on Polynomial Mapped and Finite Field With Image Encryption Application
Published 2022-01-01“…Moreover, the features of newly constructed S-box compared with recent S-boxes from literature which show superior performance against intruders’ attacks. Further, S-box is utilized in image encryption scheme and apply MLC (majority logic criterion) and histogram analysis to examined the encryption quality. …”
Get full text
Article -
138
A Robust Image Encryption Scheme Based on Quantum Walks and Dynamic DNA for Secure Cloud Applications
Published 2025-01-01“…Finally, after decoding, the pixel permutation and substitution processes are applied to produce the final cipher image. Experimental analysis demonstrates that the proposed approach achieves high encryption quality and robust resistance to cryptographic attacks, which makes it suitable for secure cloud-based services. …”
Get full text
Article -
139
Dual-Model Synergy for Fingerprint Spoof Detection Using VGG16 and ResNet50
Published 2025-02-01Get full text
Article -
140
A Simple and Robust Gray Image Encryption Scheme Using Chaotic Logistic Map and Artificial Neural Network
Published 2014-01-01“…Some security analyses such as entropy analysis, statistical analysis, and key sensitivity analysis are given to demonstrate the key space of the proposed algorithm which is large enough to make brute force attacks infeasible. …”
Get full text
Article