Computational image encryption techniques: a comprehensive review
Images contain very sensitive and confidential information. Because images play a
significant role in many applications such as military communication, remote‐sensing, and …
significant role in many applications such as military communication, remote‐sensing, and …
Classification of the COVID-19 infected patients using DenseNet201 based deep transfer learning
Deep learning models are widely used in the automatic analysis of radiological images.
These techniques can train the weights of networks on large datasets as well as fine tuning …
These techniques can train the weights of networks on large datasets as well as fine tuning …
Hatred and trolling detection transliteration framework using hierarchical LSTM in code-mixed social media text
The paper describes the usage of self-learning Hierarchical LSTM technique for classifying
hatred and trolling contents in social media code-mixed data. The Hierarchical LSTM-based …
hatred and trolling contents in social media code-mixed data. The Hierarchical LSTM-based …
Combining improved genetic algorithm and matrix semi-tensor product (STP) in color image encryption
Image encryption is one of the important methods for preservation of confidentiality and
integrity of digital images. In this paper, a color image cryptosystem based on improved …
integrity of digital images. In this paper, a color image cryptosystem based on improved …
A systematic review of metaheuristic-based image encryption techniques
Image encryption protects the sensitive and confidential information of images. This
protection comes from the combination of secret keys, encryption, and decryption algorithms …
protection comes from the combination of secret keys, encryption, and decryption algorithms …
Multiobjective evolutionary optimization techniques based hyperchaotic map and their applications in image encryption
Chaotic-based image encryption approaches have attracted great attention in the field of
information security. The properties of chaotic maps such as randomness and sensitivity …
information security. The properties of chaotic maps such as randomness and sensitivity …
An efficient image encryption using non-dominated sorting genetic algorithm-III based 4-D chaotic maps: Image encryption
Chaotic maps are extensively utilized in the field of image encryption to generate secret
keys. However, these maps suffer from hyper-parameters tuning issues. These parameters …
keys. However, these maps suffer from hyper-parameters tuning issues. These parameters …
Fusion of medical images using deep belief networks
Image fusion plays a significant role in various computer vision applications. However,
designing an efficient image fusion technique is still a challenging task. In this paper, a novel …
designing an efficient image fusion technique is still a challenging task. In this paper, a novel …
Evolutionary-based image encryption using RNA codons truth table
Symmetric image cryptography is a mechanism in which image pixels are encrypted into
some meaningless format called cipher image. Only authorized users have access to the …
some meaningless format called cipher image. Only authorized users have access to the …
A new image encryption scheme based on fractional-order hyperchaotic system and multiple image fusion
X Gao, J Yu, S Banerjee, H Yan, J Mou - Scientific Reports, 2021 - nature.com
A multi-image encryption scheme based on the fractional-order hyperchaotic system is
designed in this paper. The chaotic characteristics of this system are analyzed by the phase …
designed in this paper. The chaotic characteristics of this system are analyzed by the phase …