Evolution, current challenges, and future possibilities in ECG biometrics
Face and fingerprint are, currently, the most thoroughly explored biometric traits, promising
reliable recognition in diverse applications. Commercial products using these traits for …
reliable recognition in diverse applications. Commercial products using these traits for …
Management of artificial intelligence enabled smart wearable devices for early diagnosis and continuous monitoring of CVDS
G Ahmed - International Journal of Innovative …, 2019 - research.skylineuniversity.ac.ae
Cardiovascular diseases are often sudden and deadly. Every year, world over, there are
millions of CVD deaths, not due to timely detection and treatment and continuous monitoring …
millions of CVD deaths, not due to timely detection and treatment and continuous monitoring …
Misconstrued voice on SC-FDMA for secured comprehension-a cooperative influence of DWT and ECC
VM Padmapriya, K Thenmozhi… - Multimedia Tools and …, 2022 - Springer
Audio encryption needs critical attention due to an insecure channel in the wireless medium.
This paper presents the first-of-its-kind work addressing a Discrete Wavelet Transform …
This paper presents the first-of-its-kind work addressing a Discrete Wavelet Transform …
Achieving big data privacy via hybrid cloud
Nowadays the amount of data is being produced exponentially with the rapid development
of electronic technology and communication, which makes it hard to cost-effectively store …
of electronic technology and communication, which makes it hard to cost-effectively store …
A double chaotic layer encryption algorithm for clinical signals in telemedicine
MA Murillo-Escobar, L Cardoza-Avendaño… - Journal of medical …, 2017 - Springer
Recently, telemedicine offers medical services remotely via telecommunications systems
and physiological monitoring devices. This scheme provides healthcare delivery services …
and physiological monitoring devices. This scheme provides healthcare delivery services …
Cryptanalysis of an image encryption algorithm based on combined chaos for a BAN system, and improved scheme using SHA-512 and hyperchaos
The issues of identity authentication and privacy protection of individuals in body area
network (BAN) systems have raised much concern in past few years. To address the …
network (BAN) systems have raised much concern in past few years. To address the …
Cancelable fingerprint templates with delaunay triangle-based local structures
Security of biometric templates in a fingerprint authentication system is highly critical
because the number of fingers of a person is limited and the raw fingerprints cannot be reset …
because the number of fingers of a person is limited and the raw fingerprints cannot be reset …
A novel audio cryptosystem using chaotic maps and DNA encoding
Chaotic maps have good potential in security applications due to their inherent
characteristics relevant to cryptography. This paper introduces a new audio cryptosystem …
characteristics relevant to cryptography. This paper introduces a new audio cryptosystem …
Chaos based enhanced RC5 algorithm for security and integrity of clinical images in remote health monitoring
The demand for remote health monitoring will significantly increase in the near future due to
a decrease in the doctor/patient ratio as the world population grows. In remote health …
a decrease in the doctor/patient ratio as the world population grows. In remote health …
A new fast double-chaotic based Image encryption scheme
RI Abdelfatah - Multimedia Tools and Applications, 2020 - Springer
In this paper, a new scheme for image encryption based on a double chaotic pseudo
random generator (DCPG), simple XOR and shift rotations operations is proposed. The …
random generator (DCPG), simple XOR and shift rotations operations is proposed. The …