Open Access
Issue
ITM Web Conf.
Volume 56, 2023
First International Conference on Data Science and Advanced Computing (ICDSAC 2023)
Article Number 05005
Number of page(s) 8
Section Machine Learning & Neural Networks
DOI https://doi.org/10.1051/itmconf/20235605005
Published online 09 August 2023
  1. V. Kakkad, M. Patel, and M. Shah, “Biometric authentication and image encryption for image security in cloud framework,” Multiscale and Multidisciplinary Modeling, Experiments and Design, vol. 2, no. 4, pp. 233-248 (2019). [CrossRef] [Google Scholar]
  2. Z. Hua, B. Xu, F. Jin, and H. Huang, “Image encryption using Josephus problem and filtering diffusion,” IEEE Access, vol. 7, pp. 8660-8674(2019). [CrossRef] [Google Scholar]
  3. S. R. Maniyath and V. Anikaiselvan, “An efficient image encryption using deep neural network and chaotic map,” Microprocessors and Microsystems, vol. 77, Article ID 103134 (2020). [CrossRef] [Google Scholar]
  4. Y. Ding, “DeepEDN: a deep learning-based image encryption and decryption network for internet of medical things,” IEEE Internet of ings Journal, vol. 8, no. 3, pp. 1504-1518(2020). [Google Scholar]
  5. S. Yadav and N. Tiwari, “Recent advancements in chaos- based image encryption techniques: a review,” SocialNetworking and Computational Intelligence, Springer, Singapore, pp. 639-647 (2020). [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.