{"id":"https://openalex.org/W267696938","doi":"https://doi.org/10.4018/ijdcf.2015010102","title":"Secure and Efficient Medical Image Transmission by New Tailored Visual Cryptography Scheme with LS Compressions","display_name":"Secure and Efficient Medical Image Transmission by New Tailored Visual Cryptography Scheme with LS Compressions","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W267696938","doi":"https://doi.org/10.4018/ijdcf.2015010102","mag":"267696938"},"language":"en","primary_location":{"id":"doi:10.4018/ijdcf.2015010102","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijdcf.2015010102","pdf_url":null,"source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Digital Crime and Forensics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058580744","display_name":"S. Manimurugan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210166952","display_name":"Peermade Development Society","ror":"https://ror.org/05j4aq945","country_code":"IN","type":"nonprofit","lineage":["https://openalex.org/I4210166952"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"S. Manimurugan","raw_affiliation_strings":["Department of Computer Science and Engineering, MBC College of Engineering and Technology, Kerala, India","Department of Computer Science and Engineering, MBC College of Engineering and Technology, Kerala, India#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, MBC College of Engineering and Technology, Kerala, India","institution_ids":["https://openalex.org/I4210166952"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, MBC College of Engineering and Technology, Kerala, India#TAB#","institution_ids":["https://openalex.org/I4210166952"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035399235","display_name":"C. Narmatha","orcid":null},"institutions":[{"id":"https://openalex.org/I65220239","display_name":"Karpagam Academy of Higher Education","ror":"https://ror.org/00ssvzv66","country_code":"IN","type":"education","lineage":["https://openalex.org/I65220239"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"C. Narmatha","raw_affiliation_strings":["Department of Electronics and Communication Engineering, Karpagam University, Coimbatore, India","Department of Electronics and Communication Engineering, Karpagam University , Coimbatore, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Communication Engineering, Karpagam University, Coimbatore, India","institution_ids":["https://openalex.org/I65220239"]},{"raw_affiliation_string":"Department of Electronics and Communication Engineering, Karpagam University , Coimbatore, India","institution_ids":["https://openalex.org/I65220239"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5058580744"],"corresponding_institution_ids":["https://openalex.org/I4210166952"],"apc_list":null,"apc_paid":null,"fwci":0.9993,"has_fulltext":false,"cited_by_count":36,"citation_normalized_percentile":{"value":0.81052292,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":"7","issue":"1","first_page":"26","last_page":"50"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10901","display_name":"Advanced Data Compression Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.816382884979248},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7762540578842163},{"id":"https://openalex.org/keywords/lossless-compression","display_name":"Lossless compression","score":0.7418670654296875},{"id":"https://openalex.org/keywords/grayscale","display_name":"Grayscale","score":0.6847424507141113},{"id":"https://openalex.org/keywords/visual-cryptography","display_name":"Visual cryptography","score":0.6081255078315735},{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.5636927485466003},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.5593128204345703},{"id":"https://openalex.org/keywords/image-compression","display_name":"Image compression","score":0.5007500648498535},{"id":"https://openalex.org/keywords/lossy-compression","display_name":"Lossy compression","score":0.4808940887451172},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4807024598121643},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.47982335090637207},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.47798627614974976},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.46051135659217834},{"id":"https://openalex.org/keywords/lossless-jpeg","display_name":"Lossless JPEG","score":0.41414546966552734},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.38532590866088867},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3281376361846924},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.3126521706581116},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.2956646680831909},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.0930948555469513}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.816382884979248},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7762540578842163},{"id":"https://openalex.org/C81081738","wikidata":"https://www.wikidata.org/wiki/Q55542","display_name":"Lossless compression","level":3,"score":0.7418670654296875},{"id":"https://openalex.org/C78201319","wikidata":"https://www.wikidata.org/wiki/Q685727","display_name":"Grayscale","level":3,"score":0.6847424507141113},{"id":"https://openalex.org/C2779072331","wikidata":"https://www.wikidata.org/wiki/Q1597418","display_name":"Visual cryptography","level":4,"score":0.6081255078315735},{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.5636927485466003},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.5593128204345703},{"id":"https://openalex.org/C13481523","wikidata":"https://www.wikidata.org/wiki/Q412438","display_name":"Image compression","level":4,"score":0.5007500648498535},{"id":"https://openalex.org/C165021410","wikidata":"https://www.wikidata.org/wiki/Q55564","display_name":"Lossy compression","level":2,"score":0.4808940887451172},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4807024598121643},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.47982335090637207},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.47798627614974976},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.46051135659217834},{"id":"https://openalex.org/C8384606","wikidata":"https://www.wikidata.org/wiki/Q2190356","display_name":"Lossless JPEG","level":5,"score":0.41414546966552734},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.38532590866088867},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3281376361846924},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.3126521706581116},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.2956646680831909},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0930948555469513},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/ijdcf.2015010102","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijdcf.2015010102","pdf_url":null,"source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Digital Crime and Forensics","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jdcf00:v:7:y:2015:i:1:p:26-50","is_oa":false,"landing_page_url":"http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJDCF.2015010102","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W1774545034","https://openalex.org/W1993945592","https://openalex.org/W1994927113","https://openalex.org/W1998075962","https://openalex.org/W2029251894","https://openalex.org/W2030411764","https://openalex.org/W2036046179","https://openalex.org/W2040344223","https://openalex.org/W2045772684","https://openalex.org/W2048393261","https://openalex.org/W2051658178","https://openalex.org/W2066974172","https://openalex.org/W2071702269","https://openalex.org/W2080504776","https://openalex.org/W2085159341","https://openalex.org/W2097192999","https://openalex.org/W2099443251","https://openalex.org/W2103237496","https://openalex.org/W2107472622","https://openalex.org/W2113032778","https://openalex.org/W2114202034","https://openalex.org/W2117773894","https://openalex.org/W2119404147","https://openalex.org/W2126248247","https://openalex.org/W2128234378","https://openalex.org/W2133419229","https://openalex.org/W2133598069","https://openalex.org/W2134283293","https://openalex.org/W2143084917","https://openalex.org/W2143387732","https://openalex.org/W2144896094","https://openalex.org/W2156762449","https://openalex.org/W2159785038","https://openalex.org/W2164896194"],"related_works":["https://openalex.org/W1937922373","https://openalex.org/W2021305240","https://openalex.org/W2149164206","https://openalex.org/W2158260691","https://openalex.org/W3020822113","https://openalex.org/W2368443480","https://openalex.org/W2612146525","https://openalex.org/W4206369806","https://openalex.org/W1522987234","https://openalex.org/W267696938"],"abstract_inverted_index":{"Exchanging":[0],"a":[1,14,18,22,27,59,76,140,253,264],"medical":[2,15,33,46,93,131,174,250,265],"image":[3,16,34,94,146,266],"via":[4],"network":[5],"from":[6,150],"one":[7,108],"place":[8,11,20],"to":[9,126],"another":[10],"or":[12],"storing":[13,247],"in":[17,21,139,243,252],"particular":[19],"secure":[23,32,254],"manner":[24],"has":[25,114],"become":[26],"challenge.":[28],"To":[29,63,169],"overwhelm":[30],"this,":[31],"Lossless":[35,110],"Compression":[36,111],"(LC)":[37,112],"schemes":[38],"have":[39,136,215,267,279],"been":[40,115,137,216,269],"proposed.":[41],"The":[42,91,119,143,256],"original":[43,213],"input":[44],"grayscale":[45,173],"images":[47,214,251],"are":[48,72,81,124,159,180,184,219,228],"encrypted":[49,66,92,130,144,172],"by":[50,97,161,221,271],"Tailored":[51,163],"Visual":[52,164],"Cryptography":[53,165],"Encryption":[54],"Process":[55,87,167,194],"(TVCE)":[56],"which":[57,74,147,218],"is":[58,95,148,201],"proposed":[60,98,154,205,283],"encryption":[61],"system.":[62],"generate":[64],"these":[65,210],"images,":[67,175],"four":[68,176],"types":[69,177],"of":[70,152,178,263],"processes":[71,80,179,183],"adopted":[73,116],"play":[75],"vital":[77],"role.":[78],"These":[79,182,238],"Splitting":[82],"Process,":[83,85,186,189],"Converting":[84],"Pixel":[86,102,188],"and":[88,107,195,248,259],"Merging":[89],"process.":[90],"compressed":[96],"compression":[99,122,128,155,223],"algorithms,":[100],"i.e":[101],"Block":[103],"Short":[104],"algorithm":[105,113],"(PBSA)":[106],"conventional":[109],"(JPEG":[117],"2000LS).":[118],"above":[120],"two":[121,212,222,226],"methods":[123],"used":[125],"separate":[127,141],"for":[129,246],"images.":[132],"And":[133],"also,":[134],"decompressions":[135],"done":[138],"manner.":[142,255],"output":[145],"generated":[149],"decompression":[151],"the":[153,162,171,204,235,244,272],"algorithm,":[156],"JPEG":[157],"2000LS":[158],"decrypted":[160],"Decryption":[166],"(TVCD).":[168],"decrypt":[170],"involved.":[181],"Segregation":[185],"Inverse":[187],"8-Bit":[190],"into":[191],"Decimal":[192],"Conversion":[193],"Amalgamate":[196],"Process.":[197],"However,":[198],"this":[199,276],"paper":[200,277],"focused":[202,280],"on":[203,234,281],"visual":[206,284],"cryptography":[207,285],"only.":[208],"From":[209],"processes,":[211],"reconstructed":[217],"given":[220],"algorithms.":[224],"Ultimately,":[225],"combinations":[227],"compared":[229],"with":[230],"each":[231],"other":[232],"based":[233],"various":[236],"parameters.":[237],"techniques":[239],"can":[240],"be":[241],"implemented":[242],"field":[245],"transmitting":[249],"Confidentiality,":[257],"Integrity":[258],"Availability":[260],"(CIA":[261],"property)":[262],"also":[268],"proved":[270],"experimental":[273],"results.":[274],"In":[275],"we":[278],"only":[282],"scheme.":[286]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":24},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
