<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>0188-9532</journal-id>
<journal-title><![CDATA[Revista mexicana de ingeniería biomédica]]></journal-title>
<abbrev-journal-title><![CDATA[Rev. mex. ing. bioméd]]></abbrev-journal-title>
<issn>0188-9532</issn>
<publisher>
<publisher-name><![CDATA[Sociedad Mexicana de Ingeniería Biomédica]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S0188-95322022000200103</article-id>
<article-id pub-id-type="doi">10.17488/rmib.43.2.5</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Secure Exchange of Medical Images Via Extended Visual Cryptography]]></article-title>
<article-title xml:lang="es"><![CDATA[Intercambio Seguro de Imágenes Médicas Mediante Criptografía Visual Extendida]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Olvera-Martinez]]></surname>
<given-names><![CDATA[Luis Angel]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Cedillo-Hernandez]]></surname>
<given-names><![CDATA[Manuel]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Diaz-Rodriguez]]></surname>
<given-names><![CDATA[Carlos Adolfo]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Jimenez-Borgonio]]></surname>
<given-names><![CDATA[Enrique Tonatiuh]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Instituto Politécnico Nacional Escuela Superior de Ingeniería Mecánica y Eléctrica ]]></institution>
<addr-line><![CDATA[ Culhuacán]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>08</month>
<year>2022</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>08</month>
<year>2022</year>
</pub-date>
<volume>43</volume>
<numero>2</numero>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S0188-95322022000200103&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S0188-95322022000200103&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S0188-95322022000200103&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[ABSTRACT Medical image security is acquiring its importance to preserve the integrity and confidentiality of information (medical data) from malicious users given its importance in timely and successful diagnosis. In this context, several techniques have been developed to protect medical images, such as encryption, data hiding, image tagging, application of Hash algorithms, etc. This paper proposes a technique to cipher medical images by adding the metadata inside a cover image, based on extended visual cryptography as well as the inclusion of a Hash-like function to verify the integrity of the image and the metadata once they are recovered. The method proposed in this work is implemented using medical images with a grayscale resolution of [0,4095] that is a depth of 12 bits/pixel and color images with 24 bits/pixel depth. Experimental results prove the effectiveness of the proposed method in the task of secure exchange of medical images by allowing higher hiding capability, lower distortion in the visual quality of the image with the hidden medical data, as well as a means to verify the integrity of the sent data, compared to state-of-the-art.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[RESUMEN La seguridad de imágenes médicas está incrementando su importancia para preservar la integridad y la confidencialidad de la información (datos médicos), frente a usuarios malintencionados dada su importancia en el diagnóstico oportuno y acertado. En este contexto, se han desarrollado varias técnicas para proteger las imágenes médicas, como el cifrado, la ocultación de datos, el etiquetado de imágenes, la aplicación de algoritmos Hash, etc. Este trabajo propone una técnica para cifrar imágenes médicas añadiendo los metadatos dentro de una imagen de cubierta, basada en la criptografía visual extendida, así como la inclusión de una función tipo Hash para comprobar la integridad de la imagen y los metadatos una vez estos sean recuperados. El método propuesto en este trabajo se implementa utilizando imágenes médicas con una resolución en escala de grises de [0,4095] es decir una profundidad de 12 bits/ píxel e imágenes en color con 24 bits/píxel de profundidad. Los resultados experimentales demuestran la eficacia del método propuesto en la tarea de transmisión segura de imágenes médicas permitiendo una mayor capacidad de ocultamiento, una menor distorsión en la calidad visual de la imagen con los datos médicos ocultos, así como un medio para comprobar la integridad de los datos enviados, en comparación con los artículos publicados.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[DICOM imaging]]></kwd>
<kwd lng="en"><![CDATA[visual cryptography]]></kwd>
<kwd lng="en"><![CDATA[information security]]></kwd>
<kwd lng="en"><![CDATA[circular shifting]]></kwd>
<kwd lng="en"><![CDATA[least significant bit replacement]]></kwd>
<kwd lng="es"><![CDATA[Imágenes DICOM]]></kwd>
<kwd lng="es"><![CDATA[criptografía visual]]></kwd>
<kwd lng="es"><![CDATA[seguridad de la información]]></kwd>
<kwd lng="es"><![CDATA[desplazamiento circular]]></kwd>
<kwd lng="es"><![CDATA[sustitución de bits menos significativos]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="book">
<collab>National Electrical Manufacturers Association</collab>
<source><![CDATA[DICOM Security]]></source>
<year>2019</year>
<publisher-name><![CDATA[DICOM Digital Imaging and Communication in Medicine]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Coatrieux]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
<name>
<surname><![CDATA[Quantin]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Montagner]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Fassa]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Watermarking medical images with anonymous patient identification to verify authenticity]]></article-title>
<source><![CDATA[Stud Health Technol Inform]]></source>
<year>2008</year>
<volume>136</volume>
<page-range>667-72</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Qasim]]></surname>
<given-names><![CDATA[AF]]></given-names>
</name>
<name>
<surname><![CDATA[Meziane]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
<name>
<surname><![CDATA[Aspin]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Digital watermarking: Applicability for developing trust in medical imaging workflows state of the art review]]></article-title>
<source><![CDATA[Comput Sci Rev]]></source>
<year>2018</year>
<volume>27</volume>
<page-range>45-60</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mousavi]]></surname>
<given-names><![CDATA[SM]]></given-names>
</name>
<name>
<surname><![CDATA[Naghsh]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Abu-Bakar]]></surname>
<given-names><![CDATA[SAR]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Watermarking Techniques used in Medical Images: a Survey]]></article-title>
<source><![CDATA[J Digit Imaging]]></source>
<year>2014</year>
<volume>27</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>714-29</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cedillo-Hernandez]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Cedillo-Hernandez]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Nakano-Miyake]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Perez-Meana]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Improving the management of medical imaging by using robust and secure dual watermarking]]></article-title>
<source><![CDATA[Biomed Signal Process Control]]></source>
<year>2020</year>
<volume>56</volume>
<page-range>101695</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mirsky]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
<name>
<surname><![CDATA[Mahler]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Shelef]]></surname>
<given-names><![CDATA[I]]></given-names>
</name>
<name>
<surname><![CDATA[Elovici]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
</person-group>
<source><![CDATA[CT-GAN: malicious tampering of 3D medical imagery using deep learning]]></source>
<year>2019</year>
<conf-name><![CDATA[ 28USENIX Conference on Security Symposium]]></conf-name>
<conf-loc> </conf-loc>
<page-range>461-78</page-range><publisher-loc><![CDATA[Santa Clara, CA ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Stallings]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
</person-group>
<source><![CDATA[Cryptography and network security: Principles and practice]]></source>
<year>2011</year>
<publisher-loc><![CDATA[New York ]]></publisher-loc>
<publisher-name><![CDATA[Prentice Hall]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Medina Velandia]]></surname>
<given-names><![CDATA[LN]]></given-names>
</name>
</person-group>
<source><![CDATA[Criptografía y mecanismos de seguridad]]></source>
<year>2017</year>
<publisher-loc><![CDATA[Bogotá ]]></publisher-loc>
<publisher-name><![CDATA[Fundación Universitaria del Área Andina]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Blackledge]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Bezobrazov]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Tobin]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Zamora]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
</person-group>
<source><![CDATA[Cryptography using evolutionary computing]]></source>
<year>2013</year>
<conf-name><![CDATA[ 24IET Irish Signals and Systems Conference (ISSC 2013)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-8</page-range><publisher-name><![CDATA[Letterkenny: Institution of Engineering and Technology]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Diffie]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
<name>
<surname><![CDATA[Hellman]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[New directions in cryptography. Secure communications and asymmetric cryptosystems]]></article-title>
<source><![CDATA[IEEE Trans Inf Theory]]></source>
<year>1976</year>
<volume>22</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>644-54</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Menezes]]></surname>
<given-names><![CDATA[AJ]]></given-names>
</name>
<name>
<surname><![CDATA[van Oorschot]]></surname>
<given-names><![CDATA[PC]]></given-names>
</name>
<name>
<surname><![CDATA[Vanstone]]></surname>
<given-names><![CDATA[SA]]></given-names>
</name>
</person-group>
<source><![CDATA[Handbook of Applied Cryptography]]></source>
<year>2018</year>
<publisher-loc><![CDATA[Boca Raton ]]></publisher-loc>
<publisher-name><![CDATA[CRC press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Naor]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Shamir]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Visual cryptography]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[De Santis]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[EUROCRYPT'94. EUROCRYPT 1994]]></source>
<year>1994</year>
<page-range>1-12</page-range><publisher-loc><![CDATA[Berlin ]]></publisher-loc>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Olvera-Martinez]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Jimenez-Borgonio]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Frias-Carmona]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[AbarcaRodriguez]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[First SN P visual cryptographic circuit with astrocyte control of structural plasticity for security applications]]></article-title>
<source><![CDATA[Neurocomputing]]></source>
<year>2021</year>
<volume>457</volume>
<numero>7</numero>
<issue>7</issue>
<page-range>67-73</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Morkel]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Eloff]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Olivier]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Eloff]]></surname>
<given-names><![CDATA[JHP]]></given-names>
</name>
<name>
<surname><![CDATA[Labuschagne]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Eloff]]></surname>
<given-names><![CDATA[MM]]></given-names>
</name>
<name>
<surname><![CDATA[Venter]]></surname>
<given-names><![CDATA[HS]]></given-names>
</name>
</person-group>
<source><![CDATA[An overview of image steganography]]></source>
<year>2005</year>
<conf-name><![CDATA[ ISSA 2005 New Knowledge Today Conference]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-11</page-range><publisher-loc><![CDATA[Pretoria ]]></publisher-loc>
<publisher-name><![CDATA[ISSA]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cox]]></surname>
<given-names><![CDATA[IJ]]></given-names>
</name>
<name>
<surname><![CDATA[Pakura]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
<name>
<surname><![CDATA[Sheel]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Information Transmission and Steganography]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Barni]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Cox]]></surname>
<given-names><![CDATA[I]]></given-names>
</name>
<name>
<surname><![CDATA[Kalker]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Kim]]></surname>
<given-names><![CDATA[HJ]]></given-names>
</name>
</person-group>
<source><![CDATA[Digital Watermarking. IWDW 2005]]></source>
<year>2005</year>
<page-range>15-7</page-range><publisher-loc><![CDATA[Siena, Itlay ]]></publisher-loc>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[X]]></given-names>
</name>
<name>
<surname><![CDATA[Qiao]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Sign steganography revisited with robust domain selection]]></article-title>
<source><![CDATA[Signal Process]]></source>
<year>2022</year>
<volume>196</volume>
<page-range>108522</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yousefi Valandar]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A chaotic video steganography technique for carrying different types of secret messages]]></article-title>
<source><![CDATA[J Inf Secur Appl]]></source>
<year>2022</year>
<volume>66</volume>
<page-range>103160</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vinothkanna]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A secure steganography creation algorithm for multiple file formats]]></article-title>
<source><![CDATA[J Innov Image Process]]></source>
<year>2019</year>
<volume>1</volume>
<numero>01</numero>
<issue>01</issue>
<page-range>20-30</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gupta]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Goyal]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Bhushan]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Information Hiding Using Least Significant Bit Steganography and Cryptography]]></article-title>
<source><![CDATA[Int J Mod Educ Comput Sci]]></source>
<year>2012</year>
<volume>4</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>27-34</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dhiman]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Kasana]]></surname>
<given-names><![CDATA[SS]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Extended visual cryptography techniques for true color images]]></article-title>
<source><![CDATA[Comput Electr Eng]]></source>
<year>2018</year>
<volume>70</volume>
<page-range>647658</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Maurya]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Kannojiya]]></surname>
<given-names><![CDATA[AK]]></given-names>
</name>
<name>
<surname><![CDATA[Rajitha]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<source><![CDATA[An Extended Visual Cryptography Technique for Medical Image Security]]></source>
<year>2020</year>
<conf-name><![CDATA[ 2Int Conf on Innov Mech for Ind App (ICIMIA)]]></conf-name>
<conf-date>2020</conf-date>
<conf-loc> </conf-loc>
<page-range>415-21</page-range><publisher-loc><![CDATA[Bangalore, India ]]></publisher-loc>
<publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Omari]]></surname>
<given-names><![CDATA[AH]]></given-names>
</name>
<name>
<surname><![CDATA[Al-Kasasbeh]]></surname>
<given-names><![CDATA[BM]]></given-names>
</name>
<name>
<surname><![CDATA[Al-Qutaish]]></surname>
<given-names><![CDATA[RE]]></given-names>
</name>
<name>
<surname><![CDATA[Muhairat]]></surname>
<given-names><![CDATA[MI]]></given-names>
</name>
<name>
<surname><![CDATA[Zaharim]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Mastorakis]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Gonos]]></surname>
<given-names><![CDATA[I]]></given-names>
</name>
</person-group>
<source><![CDATA[A new cryptographic algorithm for the real time applications]]></source>
<year>2008</year>
<conf-name><![CDATA[ 7WSEAS international conference on Information security and privacy]]></conf-name>
<conf-loc> </conf-loc>
<page-range>33-8</page-range><publisher-loc><![CDATA[Cairo ]]></publisher-loc>
<publisher-name><![CDATA[Egypt; World Scientific and Engineering Academy and Society (WSEAS)]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schneier]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<source><![CDATA[Applied Cryptography]]></source>
<year>1996</year>
<publisher-loc><![CDATA[Indianapolis ]]></publisher-loc>
<publisher-name><![CDATA[John Wiley &amp; Sons]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Horé]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Ziou]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<source><![CDATA[Image Quality Metrics: PSNR vs. SSIM]]></source>
<year>2010</year>
<conf-name><![CDATA[ 20Int Conf on Pat Rec]]></conf-name>
<conf-loc> </conf-loc>
<page-range>2366-9</page-range><publisher-loc><![CDATA[Istanbul ]]></publisher-loc>
<publisher-name><![CDATA[Turkey; IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sara]]></surname>
<given-names><![CDATA[U]]></given-names>
</name>
<name>
<surname><![CDATA[Akter]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Uddin]]></surname>
<given-names><![CDATA[MS]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Image Quality Assessment through FSIM, SSIM, MSE and PSNR-A Comparative Study]]></article-title>
<source><![CDATA[J Comput Commun]]></source>
<year>2019</year>
<volume>7</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>8-18</page-range></nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[Z]]></given-names>
</name>
<name>
<surname><![CDATA[Bovik]]></surname>
<given-names><![CDATA[AC]]></given-names>
</name>
<name>
<surname><![CDATA[Sheikh]]></surname>
<given-names><![CDATA[HR]]></given-names>
</name>
<name>
<surname><![CDATA[Simoncelli]]></surname>
<given-names><![CDATA[EP]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Image quality assessment: from error visibility to structural similarity]]></article-title>
<source><![CDATA[IEEE Trans Image Process]]></source>
<year>2004</year>
<volume>13</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>600-12</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
