Related references
Note: Only part of the references are listed.A forward secure signcryption scheme with ciphertext authentication for e-payment systems using conic curve cryptography
Renu Mary Daniel et al.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES (2021)
2-Levels of clustering strategy to detect and locate copy-move forgery in digital images
Mohamed Abdel-Basset et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2020)
A novel method for solving the fully neutrosophic linear programming problems
Mohamed Abdel-Basset et al.
NEURAL COMPUTING & APPLICATIONS (2019)
A hybrid approach of neutrosophic sets and DEMATEL method for developing supplier selection criteria
Mohamed Abdel-Basset et al.
DESIGN AUTOMATION FOR EMBEDDED SYSTEMS (2018)
被撤回的出版物: A hybrid whale optimization algorithm based on local search strategy for the permutation flow shop scheduling problem (Retracted article. See vol. 128, pg. 567, 2022)
Mohamed Abdel-Basset et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
Lightweight chaotic image encryption algorithm for real-time embedded system: Implementation and analysis on 32-bit microcontroller
Siva Janakiraman et al.
MICROPROCESSORS AND MICROSYSTEMS (2018)
Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compression
Junxin Chen et al.
OPTICS AND LASER TECHNOLOGY (2018)
Color image encryption using random transforms, phase retrieval, chaotic maps, and diffusion
M. H. Annaby et al.
OPTICS AND LASERS IN ENGINEERING (2018)
Multiple image encryption scheme based on pixel exchange operation and vector decomposition
Y. Xiong et al.
OPTICS AND LASERS IN ENGINEERING (2018)
An efficient mixed inter-intra pixels substitution at 2bits-level for image encryption technique using DNA and chaos
Aqeel-ur-Rehman et al.
OPTIK (2018)
A comprehensive review of quadratic assignment problem: variants, hybrids and applications
Mohamed Abdel-Basset et al.
Journal of Ambient Intelligence and Humanized Computing (2018)
Medical image encryption based on improved ElGamal encryption technique
Dolendro Singh Laiphrakpam et al.
OPTIK (2017)
Medical image encryption using edge maps
Weijia Cao et al.
SIGNAL PROCESSING (2017)
A Novel Selective Encryption Scheme for Medical Images Transmission based-on JPEG Compression Algorithm
Med Karim Abdmouleh et al.
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (2017)
RGB Based Multiple Share Creation in Visual Cryptography with Aid of Elliptic Curve Cryptography
K. Shankar et al.
CHINA COMMUNICATIONS (2017)
A Modified Flower Pollination Algorithm for Global Optimization
Emad Nabil
EXPERT SYSTEMS WITH APPLICATIONS (2016)
RGB-Based Secure Share Creation in Visual Cryptography Using Optimal Elliptic Curve Cryptography Technique
K. Shankar et al.
JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS (2016)
An efficient and robust image encryption scheme for medical applications
A. Kanso et al.
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION (2015)
Encryption of medical images based on the cosine number transform
J. B. Lima et al.
SIGNAL PROCESSING-IMAGE COMMUNICATION (2015)
Sharing a Secret Image with Encapsulated Shares in Visual Cryptography
K. Shankar et al.
PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON ECO-FRIENDLY COMPUTING AND COMMUNICATION SYSTEMS (2015)
A Cryptographic Technique for Security of Medical Images in Health Information Systems
Quist-Aphetsi Kester et al.
SECOND INTERNATIONAL SYMPOSIUM ON COMPUTER VISION AND THE INTERNET (VISIONNET'15) (2015)