• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4635019)   Today's Articles (6985)   Subscriber (50004)
For: Fu C, Meng WH, Zhan YF, Zhu ZL, Lau FCM, Tse CK, Ma HF. An efficient and secure medical image protection scheme based on chaotic maps. Comput Biol Med 2013;43:1000-10. [PMID: 23816172 DOI: 10.1016/j.compbiomed.2013.05.005] [Citation(s) in RCA: 130] [Impact Index Per Article: 11.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/03/2011] [Revised: 05/06/2013] [Accepted: 05/07/2013] [Indexed: 11/15/2022]
Number Cited by Other Article(s)
1
Zhu E, Feng H, Chen L, Lai Y, Chai S. MP-Net: A Multi-Center Privacy-Preserving Network for Medical Image Segmentation. IEEE TRANSACTIONS ON MEDICAL IMAGING 2024;43:2718-2729. [PMID: 38478456 DOI: 10.1109/tmi.2024.3377248] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 07/02/2024]
2
Zhang B, Rahmatullah B, Wang SL, Almutairi HM, Xiao Y, Liu X, Liu Z. A variable dimensional chaotic map-based medical image encryption algorithm with multi-mode. Med Biol Eng Comput 2023;61:2971-3002. [PMID: 37542682 DOI: 10.1007/s11517-023-02874-3] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/25/2022] [Accepted: 06/20/2023] [Indexed: 08/07/2023]
3
Abdellatef E, Naeem EA, El-Samie FEA. DeepEnc: deep learning-based CT image encryption approach. MULTIMEDIA TOOLS AND APPLICATIONS 2023. [DOI: 10.1007/s11042-023-15818-8] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/19/2022] [Revised: 04/28/2023] [Accepted: 05/10/2023] [Indexed: 09/01/2023]
4
Shi G, Yu S, Wang Q. Security Analysis of the Image Encryption Algorithm Based on a Two-Dimensional Infinite Collapse Map. ENTROPY 2022;24:e24081023. [PMID: 35893003 PMCID: PMC9394294 DOI: 10.3390/e24081023] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/13/2022] [Revised: 07/14/2022] [Accepted: 07/22/2022] [Indexed: 02/04/2023]
5
Khokhar B, Dahiya S, Parmar KS. Load frequency control of a microgrid employing a 2D Sine Logistic map based chaotic sine cosine algorithm. Appl Soft Comput 2021. [DOI: 10.1016/j.asoc.2021.107564] [Citation(s) in RCA: 7] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
6
Chaotic Path Planning for 3D Area Coverage Using a Pseudo-Random Bit Generator from a 1D Chaotic Map. MATHEMATICS 2021. [DOI: 10.3390/math9151821] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
7
Assessment and Feasibility Study of Lemon Ripening Using X-ray Image of Information Visualization. APPLIED SCIENCES-BASEL 2021. [DOI: 10.3390/app11073261] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
8
Differential cryptanalysis of image cipher using block-based scrambling and image filtering. Inf Sci (N Y) 2021. [DOI: 10.1016/j.ins.2020.12.037] [Citation(s) in RCA: 15] [Impact Index Per Article: 5.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/19/2022]
9
Raj V, Janakiraman S, Amirtharajan R. Optimal concurrency on FPGA for lightweight medical image encryption. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS 2021. [DOI: 10.3233/jifs-200203] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
10
Lakshmi C, Thenmozhi K, Venkatesan C, Seshadhri A, Rayappan JBB, Amirtharajan R. Mutated Cleavages of Images for Stealth Disclosure: A Hopfield Neural Network Attractor (HNNA) Approach. Neural Process Lett 2021. [DOI: 10.1007/s11063-020-10412-7] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/22/2022]
11
Chen J, Chen L, Zhou Y. Cryptanalysis of a DNA-based image encryption scheme. Inf Sci (N Y) 2020. [DOI: 10.1016/j.ins.2020.02.024] [Citation(s) in RCA: 40] [Impact Index Per Article: 10.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/25/2022]
12
You L, Yang E, Wang G. A novel parallel image encryption algorithm based on hybrid chaotic maps with OpenCL implementation. Soft comput 2020. [DOI: 10.1007/s00500-020-04683-4] [Citation(s) in RCA: 18] [Impact Index Per Article: 4.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
13
A novel chaotic encryption scheme based on efficient secret keys and confusion technique for confidential of DICOM images. INFORMATICS IN MEDICINE UNLOCKED 2020. [DOI: 10.1016/j.imu.2020.100396] [Citation(s) in RCA: 12] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]  Open
14
Hopfield attractor-trusted neural network: an attack-resistant image encryption. Neural Comput Appl 2019. [DOI: 10.1007/s00521-019-04637-4] [Citation(s) in RCA: 27] [Impact Index Per Article: 5.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/25/2022]
15
Medical image encryption using fractional discrete cosine transform with chaotic function. Med Biol Eng Comput 2019;57:2517-2533. [PMID: 31512034 DOI: 10.1007/s11517-019-02037-3] [Citation(s) in RCA: 33] [Impact Index Per Article: 6.6] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/05/2018] [Accepted: 08/20/2019] [Indexed: 10/26/2022]
16
An efficient spatiotemporal chaotic image cipher with an improved scrambling algorithm driven by dynamic diffusion phase. Inf Sci (N Y) 2019. [DOI: 10.1016/j.ins.2019.01.082] [Citation(s) in RCA: 19] [Impact Index Per Article: 3.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/19/2022]
17
Cryptanalysis of an Image Encryption Algorithm Based on Combined Chaos for a BAN System, and Improved Scheme Using SHA-512 and Hyperchaos. Symmetry (Basel) 2018. [DOI: 10.3390/sym10070266] [Citation(s) in RCA: 34] [Impact Index Per Article: 5.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]  Open
18
Lakshmi C, Thenmozhi K, Rayappan JBB, Amirtharajan R. Encryption and watermark-treated medical image against hacking disease-An immune convention in spatial and frequency domains. COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE 2018;159:11-21. [PMID: 29650305 DOI: 10.1016/j.cmpb.2018.02.021] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/21/2016] [Revised: 02/08/2018] [Accepted: 02/26/2018] [Indexed: 06/08/2023]
19
Mehta G, Dutta MK, Kim PS. An Efficient and Lossless Cryptosystem for Security in Tele-Ophthalmology Applications Using Chaotic Theory. Ophthalmology 2018. [DOI: 10.4018/978-1-5225-5195-9.ch012] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/09/2022]  Open
20
Ravichandran D, Praveenkumar P, Rayappan JBB, Amirtharajan R. DNA Chaos Blend to Secure Medical Privacy. IEEE Trans Nanobioscience 2017;16:850-858. [DOI: 10.1109/tnb.2017.2780881] [Citation(s) in RCA: 111] [Impact Index Per Article: 15.9] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/08/2022]
21
Mohamed Parvees MY, Abdul Samath J, Parameswaran Bose B. Medical Images are Safe - an Enhanced Chaotic Scrambling Approach. J Med Syst 2017;41:167. [PMID: 28900790 DOI: 10.1007/s10916-017-0809-1] [Citation(s) in RCA: 13] [Impact Index Per Article: 1.9] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/24/2017] [Accepted: 08/28/2017] [Indexed: 11/25/2022]
22
Yao W, Wu F, Zhang X, Zheng Z, Wang Z, Wang W, Qiu W. A Fast Color Image Encryption Algorithm Using 4-Pixel Feistel Structure. PLoS One 2016;11:e0165937. [PMID: 27824894 PMCID: PMC5100896 DOI: 10.1371/journal.pone.0165937] [Citation(s) in RCA: 7] [Impact Index Per Article: 0.9] [Reference Citation Analysis] [Abstract] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/13/2016] [Accepted: 10/20/2016] [Indexed: 11/24/2022]  Open
23
Secured Medical Images - a Chaotic Pixel Scrambling Approach. J Med Syst 2016;40:232. [PMID: 27653039 DOI: 10.1007/s10916-016-0611-5] [Citation(s) in RCA: 21] [Impact Index Per Article: 2.6] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/30/2016] [Accepted: 09/13/2016] [Indexed: 10/21/2022]
24
Devi BP, Singh KM, Roy S. A copyright protection scheme for digital images based on shuffled singular value decomposition and visual cryptography. SPRINGERPLUS 2016;5:1091. [PMID: 27468392 PMCID: PMC4947083 DOI: 10.1186/s40064-016-2733-0] [Citation(s) in RCA: 8] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/07/2016] [Accepted: 06/30/2016] [Indexed: 11/10/2022]
25
Chaos based crossover and mutation for securing DICOM image. Comput Biol Med 2016;72:170-84. [DOI: 10.1016/j.compbiomed.2016.03.020] [Citation(s) in RCA: 143] [Impact Index Per Article: 17.9] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/21/2015] [Revised: 03/10/2016] [Accepted: 03/24/2016] [Indexed: 11/23/2022]
26
Differential cryptanalysis of a medical image cryptosystem with multiple rounds. Comput Biol Med 2015;65:69-75. [DOI: 10.1016/j.compbiomed.2015.07.024] [Citation(s) in RCA: 33] [Impact Index Per Article: 3.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/10/2015] [Revised: 07/02/2015] [Accepted: 07/27/2015] [Indexed: 11/20/2022]
27
Praveenkumar P, Amirtharajan R, Thenmozhi K, Balaguru Rayappan JB. Medical data sheet in safe havens - A tri-layer cryptic solution. Comput Biol Med 2015;62:264-76. [PMID: 25966921 DOI: 10.1016/j.compbiomed.2015.04.031] [Citation(s) in RCA: 50] [Impact Index Per Article: 5.6] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/02/2014] [Revised: 04/14/2015] [Accepted: 04/16/2015] [Indexed: 11/16/2022]
28
Fu C, Zhang GY, Bian O, Lei WM, Ma HF. A novel medical image protection scheme using a 3-dimensional chaotic system. PLoS One 2014;9:e115773. [PMID: 25541941 PMCID: PMC4277340 DOI: 10.1371/journal.pone.0115773] [Citation(s) in RCA: 32] [Impact Index Per Article: 3.2] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/19/2014] [Accepted: 11/27/2014] [Indexed: 11/18/2022]  Open
29
Medical image protection using genetic algorithm operations. Soft comput 2014. [DOI: 10.1007/s00500-014-1539-7] [Citation(s) in RCA: 45] [Impact Index Per Article: 4.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
30
Stoyanov B, Kordov K. Novel image encryption scheme based on Chebyshev polynomial and Duffing map. ScientificWorldJournal 2014;2014:283639. [PMID: 25143970 PMCID: PMC3985400 DOI: 10.1155/2014/283639] [Citation(s) in RCA: 28] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/10/2013] [Accepted: 03/04/2014] [Indexed: 11/17/2022]  Open
31
Iacomi M, Cascio D, Fauci F, Raso G. Mammographic images segmentation based on chaotic map clustering algorithm. BMC Med Imaging 2014;14:12. [PMID: 24666766 PMCID: PMC3987162 DOI: 10.1186/1471-2342-14-12] [Citation(s) in RCA: 13] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/08/2013] [Accepted: 03/14/2014] [Indexed: 11/10/2022]  Open
32
A Symmetric Chaos-Based Image Cipher with an Improved Bit-Level Permutation Strategy. ENTROPY 2014. [DOI: 10.3390/e16020770] [Citation(s) in RCA: 32] [Impact Index Per Article: 3.2] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA