Evolution, current challenges, and future possibilities in ECG biometrics

JR Pinto, JS Cardoso, A Lourenço - Ieee Access, 2018 - ieeexplore.ieee.org
Face and fingerprint are, currently, the most thoroughly explored biometric traits, promising
reliable recognition in diverse applications. Commercial products using these traits for …

Management of artificial intelligence enabled smart wearable devices for early diagnosis and continuous monitoring of CVDS

G Ahmed - International Journal of Innovative …, 2019 - research.skylineuniversity.ac.ae
Cardiovascular diseases are often sudden and deadly. Every year, world over, there are
millions of CVD deaths, not due to timely detection and treatment and continuous monitoring …

Misconstrued voice on SC-FDMA for secured comprehension-a cooperative influence of DWT and ECC

VM Padmapriya, K Thenmozhi… - Multimedia Tools and …, 2022 - Springer
Audio encryption needs critical attention due to an insecure channel in the wireless medium.
This paper presents the first-of-its-kind work addressing a Discrete Wavelet Transform …

Achieving big data privacy via hybrid cloud

X Huang, X Du - 2014 IEEE Conference on Computer …, 2014 - ieeexplore.ieee.org
Nowadays the amount of data is being produced exponentially with the rapid development
of electronic technology and communication, which makes it hard to cost-effectively store …

A double chaotic layer encryption algorithm for clinical signals in telemedicine

MA Murillo-Escobar, L Cardoza-Avendaño… - Journal of medical …, 2017 - Springer
Recently, telemedicine offers medical services remotely via telecommunications systems
and physiological monitoring devices. This scheme provides healthcare delivery services …

Cryptanalysis of an image encryption algorithm based on combined chaos for a BAN system, and improved scheme using SHA-512 and hyperchaos

M Ahmad, E Al Solami, XY Wang, MN Doja, MMS Beg… - Symmetry, 2018 - mdpi.com
The issues of identity authentication and privacy protection of individuals in body area
network (BAN) systems have raised much concern in past few years. To address the …

Cancelable fingerprint templates with delaunay triangle-based local structures

W Yang, J Hu, S Wang, J Yang - … , November 13-15, 2013, Proceedings 5, 2013 - Springer
Security of biometric templates in a fingerprint authentication system is highly critical
because the number of fingers of a person is limited and the raw fingerprints cannot be reset …

A novel audio cryptosystem using chaotic maps and DNA encoding

SJ Sheela, KV Suresh, D Tandur - Journal of Computer …, 2017 - Wiley Online Library
Chaotic maps have good potential in security applications due to their inherent
characteristics relevant to cryptography. This paper introduces a new audio cryptosystem …

Chaos based enhanced RC5 algorithm for security and integrity of clinical images in remote health monitoring

R Shahzadi, SM Anwar, F Qamar, M Ali… - IEEE …, 2019 - ieeexplore.ieee.org
The demand for remote health monitoring will significantly increase in the near future due to
a decrease in the doctor/patient ratio as the world population grows. In remote health …

A new fast double-chaotic based Image encryption scheme

RI Abdelfatah - Multimedia Tools and Applications, 2020 - Springer
In this paper, a new scheme for image encryption based on a double chaotic pseudo
random generator (DCPG), simple XOR and shift rotations operations is proposed. The …