Search alternatives:
image » images (Expand Search)
Showing 121 - 140 results of 261 for search 'attack image analysis', query time: 0.15s Refine Results
  1. 121

    Three-Dimensional and Multiple Image Encryption Algorithm Using a Fractional-Order Chaotic System by Ghader Ghasemi, Reza Parvaz, Yavar Khedmati Yengejeh

    Published 2025-05-01
    “…In the last step of the proposed method, various statistical and security tests, including histogram analysis, correlation coefficient analysis, data loss and noise attack simulations, have been performed on the proposed algorithm. …”
    Get full text
    Article
  2. 122

    Multi-Threshold Remote Sensing Image Segmentation Based on Improved Black-Winged Kite Algorithm by Yi Zhang, Xinyu Liu, Wei Sun, Tianshu You, Xin Qi

    Published 2025-05-01
    “…Experimental validation using representative samples from the ISPRS Potsdam benchmark dataset demonstrates that our IBKA-optimized OTSU multi-threshold segmentation method outperforms traditional IBKA-optimized pulse coupled neural network (PCNN) approaches in remote sensing image analysis. Quantitative evaluations reveal substantial improvements in the dice coefficient across six randomly selected remote sensing images, achieving performance enhancements of 7.76%, 11.99%, 30.75%, 22.91%, 44.37%, and 18.55%, respectively. …”
    Get full text
    Article
  3. 123

    Medical Image Hybrid Watermark Algorithm Based on Frequency Domain Processing and Inception v3 by Yu Fan, Jingbing Li, Uzair Aslam Bhatti, Saqib Ali Nawaz, Yenwei Chen

    Published 2025-06-01
    “…The watermark extraction and decryption process relies on a key provided by a third party, enabling blind extraction of the watermark without requiring the original image. Through extensive experimental data analysis and comparisons with multiple existing algorithms, the results demonstrate that the proposed hybrid watermarking algorithm excels in terms of attack resistance and robustness, significantly improving the security and reliability of medical image watermarking.…”
    Get full text
    Article
  4. 124

    Reversible Adversarial Examples with Minimalist Evolution for Recognition Control in Computer Vision by Shilong Yang, Lu Leng, Ching-Chun Chang, Chin-Chen Chang

    Published 2025-01-01
    “…Ultimately, when combined with reversible data hiding, adversarial attacks can achieve reversibility. Experimental results demonstrate that the PSNR and SSIM between the restored images by the method and the original images are ∞ and 1, respectively. …”
    Get full text
    Article
  5. 125

    The correlation analysis between Normalized Wall Index and cerebral perfusion in patients with Mild Carotid Artery Stenosis under 3.0T MRI by Yonggang Cai, Shouming Chen, Tongyu Shang, Binze Han, Lei Zhang, Changyan Xu, Zhibin He, Ting Yin

    Published 2025-03-01
    “…Abstract Background To explore the relationship between Normalized Wall Index (NWI) and Magnetic Resonance Perfusion Imaging Parameters in Patients with Mild Carotid Artery Stenosis. …”
    Get full text
    Article
  6. 126

    A novel chaotic system with one absolute term: stability, ultimate boundedness, and image encryption by Ali A. Shukur, Ammar Ali Neamah, Viet-Thanh Pham, Giuseppe Grassi

    Published 2025-01-01
    “…The test results showed that the suggested image scheme is very secure and impervious to differential, statistical analysis, and other types of attacks. …”
    Get full text
    Article
  7. 127

    Enhancing medical image privacy in IoT with bit-plane level encryption using chaotic map by Fatima Asiri, Wajdan Al Malwi, Tamara Zhukabayeva, Ibtehal Nafea, Abdullah Aziz, Nadhmi A. Gazem, Abdullah Qayyum

    Published 2025-06-01
    “…Finally, the bit planes are combined to produce the ciphertext image. For further security enhancement, this ciphertext is embedded into a carrier image, resulting in a visually secured output.ResultsTo evaluate the effectiveness of our algorithm, various tests are conducted, including correlation coefficient analysis (C.C < or negative), histogram analysis, key space [(1090)8] and sensitivity assessments, entropy evaluation [E(S) > 7.98], and occlusion analysis.ConclusionExtensive evaluations have proven that the designed scheme exhibits a high degree of resilience to attacks, making it particularly suitable for small IoT devices with limited processing power and memory.…”
    Get full text
    Article
  8. 128

    A Color Image Encryption Scheme Based on a Novel 3D Chaotic Mapping by Chunyuan Liu, Qun Ding

    Published 2020-01-01
    “…The secret key is applied in the shuffling and diffusion. Security analysis indicates that the proposed scheme can resist cryptanalytic attacks. …”
    Get full text
    Article
  9. 129

    A Double-Layer Image Encryption Scheme Based on Chaotic Maps and DNA Strand Displacement by Zhen Tang, Zhixiang Yin, Risheng Wang, Xiyuan Wang, Jing Yang, Jianzhong Cui

    Published 2022-01-01
    “…Simulation results and security analysis show that the proposed encryption scheme can effectively protect image information and resist conventional information attacks.…”
    Get full text
    Article
  10. 130

    Model and training method for aerial image object detector with optimization of both robustness and computational efficiency by Alona Moskalenko, Mykola Zaretskyi, Maksym Vynohradov, Vladyslav Babych

    Published 2024-10-01
    “…The subject of research is Neural network-based object detectors, which are widely used for video image analysis. An increasing number of tasks now demand data processing directly at the source, which limits the available computational resources. …”
    Get full text
    Article
  11. 131

    Enhancing AES image encryption with a three-dimensional hyperchaotic system for increased security and efficiency. by Mingyi Huo, Yanpei Zheng, Jun Huang

    Published 2025-01-01
    “…Simulation results confirm its robustness against various cryptographic attacks, demonstrating its potential as a preferred solution for digital image privacy protection.…”
    Get full text
    Article
  12. 132

    Deep learning-based encryption scheme for medical images using DCGAN and virtual planet domain by Manish Kumar, Aneesh Sreevallabh Chivukula, Gunjan Barua

    Published 2025-01-01
    “…Experimental results validate the efficacy of the approach in safeguarding medical images from various security threats, including unauthorized access, tampering, and adversarial attacks. …”
    Get full text
    Article
  13. 133

    A Hybrid Approach for Color Face Recognition Based on Image Quality Using Multiple Color Spaces by Mahdi Hosseinzadeh, Mohammad Mehdi Pazouki, Önsen Toygar

    Published 2024-12-01
    “…A comparative analysis that assesses the proposed approach with the state-of-the-art systems using Faces94, ColorFERET, and Replay Attack datasets is presented. …”
    Get full text
    Article
  14. 134

    Dynamical System in Chaotic Neurons with Time Delay Self-Feedback and Its Application in Color Image Encryption by Yao-Qun Xu, Xin-Xin Zhen, Meng Tang

    Published 2022-01-01
    “…The security analysis of the simulation results shows that the encryption algorithm has an excellent anti-attack ability. …”
    Get full text
    Article
  15. 135

    An Image Encryption Scheme Using a 1D Chaotic Double Section Skew Tent Map by Rania A. Elmanfaloty, Ehab Abou-Bakr

    Published 2020-01-01
    “…Analysis of the function implies its chaotic properties in addition to its ability to generate a cryptographically secured random stream of numbers. …”
    Get full text
    Article
  16. 136

    Compressive sensing and DNA coding operation: Revolutionary approach to colour medical image compression‐encryption algorithm by Xianglian Xue, Haiyan Jin, Changjun Zhou

    Published 2024-12-01
    “…Finally, the regrouped bit planes help yield the compressed encrypted images. A comprehensive analysis of the proposed algorithm's encryption and decryption effectiveness, compression performance, and security was conducted. …”
    Get full text
    Article
  17. 137

    A Novel Construction of Substitution Box Based on Polynomial Mapped and Finite Field With Image Encryption Application by Abid Mahboob, Muhammad Asif, Imran Siddique, Aysha Saleem, Muhammad Nadeem, Dariusz Grzelczyk, Jan Awrejcewicz

    Published 2022-01-01
    “…Moreover, the features of newly constructed S-box compared with recent S-boxes from literature which show superior performance against intruders’ attacks. Further, S-box is utilized in image encryption scheme and apply MLC (majority logic criterion) and histogram analysis to examined the encryption quality. …”
    Get full text
    Article
  18. 138

    A Robust Image Encryption Scheme Based on Quantum Walks and Dynamic DNA for Secure Cloud Applications by Ahmed A. Abd El-Latif, May Almousa, Bassem Abd-El-Atty

    Published 2025-01-01
    “…Finally, after decoding, the pixel permutation and substitution processes are applied to produce the final cipher image. Experimental analysis demonstrates that the proposed approach achieves high encryption quality and robust resistance to cryptographic attacks, which makes it suitable for secure cloud-based services. …”
    Get full text
    Article
  19. 139
  20. 140

    A Simple and Robust Gray Image Encryption Scheme Using Chaotic Logistic Map and Artificial Neural Network by Adelaïde Nicole Kengnou Telem, Colince Meli Segning, Godpromesse Kenne, Hilaire Bertrand Fotsin

    Published 2014-01-01
    “…Some security analyses such as entropy analysis, statistical analysis, and key sensitivity analysis are given to demonstrate the key space of the proposed algorithm which is large enough to make brute force attacks infeasible. …”
    Get full text
    Article