4.6 Article

Medical Image Security Using Dual Encryption with Oppositional Based Optimization Algorithm

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

A forward secure signcryption scheme with ciphertext authentication for e-payment systems using conic curve cryptography

Renu Mary Daniel et al.

Summary: The study introduces an efficient signcryption scheme based on RSA assumption and discrete logarithm problem, ensuring message confidentiality and authenticity. The protocol supports forward secrecy, ciphertext authentication, and resistance to low public and private key exponent attacks. It is applied to design a secure e-commerce system.

JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES (2021)

Article Computer Science, Information Systems

2-Levels of clustering strategy to detect and locate copy-move forgery in digital images

Mohamed Abdel-Basset et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2020)

Article Computer Science, Artificial Intelligence

A novel method for solving the fully neutrosophic linear programming problems

Mohamed Abdel-Basset et al.

NEURAL COMPUTING & APPLICATIONS (2019)

Article Computer Science, Hardware & Architecture

A hybrid approach of neutrosophic sets and DEMATEL method for developing supplier selection criteria

Mohamed Abdel-Basset et al.

DESIGN AUTOMATION FOR EMBEDDED SYSTEMS (2018)

Article Computer Science, Theory & Methods

被撤回的出版物: A hybrid whale optimization algorithm based on local search strategy for the permutation flow shop scheduling problem (Retracted article. See vol. 128, pg. 567, 2022)

Mohamed Abdel-Basset et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Hardware & Architecture

Lightweight chaotic image encryption algorithm for real-time embedded system: Implementation and analysis on 32-bit microcontroller

Siva Janakiraman et al.

MICROPROCESSORS AND MICROSYSTEMS (2018)

Article Optics

Color image encryption using random transforms, phase retrieval, chaotic maps, and diffusion

M. H. Annaby et al.

OPTICS AND LASERS IN ENGINEERING (2018)

Article

A comprehensive review of quadratic assignment problem: variants, hybrids and applications

Mohamed Abdel-Basset et al.

Journal of Ambient Intelligence and Humanized Computing (2018)

Article Optics

Medical image encryption based on improved ElGamal encryption technique

Dolendro Singh Laiphrakpam et al.

OPTIK (2017)

Article Engineering, Electrical & Electronic

Medical image encryption using edge maps

Weijia Cao et al.

SIGNAL PROCESSING (2017)

Proceedings Paper Computer Science, Artificial Intelligence

A Novel Selective Encryption Scheme for Medical Images Transmission based-on JPEG Compression Algorithm

Med Karim Abdmouleh et al.

KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (2017)

Article Computer Science, Artificial Intelligence

A Modified Flower Pollination Algorithm for Global Optimization

Emad Nabil

EXPERT SYSTEMS WITH APPLICATIONS (2016)

Article Computer Science, Hardware & Architecture

RGB-Based Secure Share Creation in Visual Cryptography Using Optimal Elliptic Curve Cryptography Technique

K. Shankar et al.

JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS (2016)

Article Mathematics, Applied

An efficient and robust image encryption scheme for medical applications

A. Kanso et al.

COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION (2015)

Article Engineering, Electrical & Electronic

Encryption of medical images based on the cosine number transform

J. B. Lima et al.

SIGNAL PROCESSING-IMAGE COMMUNICATION (2015)

Proceedings Paper Computer Science, Artificial Intelligence

Sharing a Secret Image with Encapsulated Shares in Visual Cryptography

K. Shankar et al.

PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON ECO-FRIENDLY COMPUTING AND COMMUNICATION SYSTEMS (2015)

Proceedings Paper Computer Science, Theory & Methods

A Cryptographic Technique for Security of Medical Images in Health Information Systems

Quist-Aphetsi Kester et al.

SECOND INTERNATIONAL SYMPOSIUM ON COMPUTER VISION AND THE INTERNET (VISIONNET'15) (2015)