Hybrid optimization with cryptography encryption for medical image security in Internet of Things

M Elhoseny, K Shankar, SK Lakshmanaprabu… - Neural computing and …, 2020 - Springer
The development of the Internet of Things (IoT) is predicted to change the healthcare
industry and might lead to the rise of the Internet of Medical Things. The IoT revolution is …

An enhanced whale optimization algorithm for vehicular communication networks

SR Valayapalayam Kittusamy… - International Journal …, 2022 - Wiley Online Library
In the field of vehicle communication networks, vehicular ad hoc network (VANET) is
established with the help of road side unit (RSU). Each vehicle in the traffic system is …

RETRACTED ARTICLE: Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique

K Shankar, M Elhoseny, RS Kumar… - Journal of Ambient …, 2020 - Springer
Abstract Secret Image Sharing (SIS) scheme is to encrypt a secret image into 'n'specious
shadows. It is unable to reveal any data on the secret image if at least one of the shadows is …

Secure data transmission through reliable vehicles in VANET using optimal lightweight cryptography

P Manickam, K Shankar, E Perumal, M Ilayaraja… - … and secure information …, 2019 - Springer
Abstract Vehicular Ad Hoc Networks (VANETs) is an important communication paradigm in
modern mobile computing for transferring message for either condition, road conditions. A …

A survey of image encryption for healthcare applications

Priyanka, AK Singh - Evolutionary Intelligence, 2023 - Springer
Recently, medical image encryption has attracted many researchers because of security
issues in the communication process. The recent COVID-19 has highlighted the fact that …

An efficient image encryption scheme based on signcryption technique with adaptive elephant herding optimization

K Shankar, M Elhoseny, E Perumal, M Ilayaraja… - … and Secure Information …, 2019 - Springer
IoT makes incorporated communication circumstances of interconnected devices and stages
by drawing in both practical and substantial worlds simultaneously. The researchers of the …

Sharing a secret image with encapsulated shares in visual cryptography

K Shankar, P Eswaran - Procedia Computer Science, 2015 - Elsevier
Due to advances in digital world, security has become an inseparable issue while
transmitting the image. Visual cryptography (VC) is a modern cryptographic technique which …

An efficient image encryption technique based on optimized key generation in ECC using genetic algorithm

K Shankar, P Eswaran - Artificial Intelligence and Evolutionary …, 2016 - Springer
Nowadays image encryption has turned into an approach to transmit interactive image
information with utmost confidentiality and authenticity. In order to transmit the secret …

[图书][B] An Eeg based emotion recognition and classification using machine learning techniques

Akalya devi C, Dr. Karthika Renuka D, S Soundarya - 2019 - researchgate.net
Emotions are complex phenomena that play significant roles in the quality of human life.
Emotion plays a major role in motivation, perception, cognition, creativity, attention, learning …

Security in Medical Image Management Using Ant Colony Optimization

S Karthikeyini, R Sagayaraj, N Rajkumar… - … Technology and Control, 2023 - itc.ktu.lt
Data encryption before transmission is still a crucial step in lowering security concerns in
cloud-based environments. Steganography and image encryption methods validate the …