Security of medical images for telemedicine: a systematic review
Recently, there has been a rapid growth in the utilization of medical images in telemedicine
applications. The authors in this paper presented a detailed discussion of different types of …
applications. The authors in this paper presented a detailed discussion of different types of …
A review of research on medical image confidentiality related technology coherent taxonomy, motivations, open challenges and recommendations
With the modernization of biomedical image equipment and image processing technology,
the amount of medical image data increases rapidly. These medical images need to be …
the amount of medical image data increases rapidly. These medical images need to be …
Sailfish invasive weed optimization algorithm for multiple image sharing in cloud computing
Visual cryptography (VC) is a secret sharing cryptographic technique, which permits visual
information that is encrypted in such a way that the decrypted information shows the visual …
information that is encrypted in such a way that the decrypted information shows the visual …
Reversible data hiding scheme using deep learning and visual cryptography for medical image communication
N Rajesh Kumar, R Bala Krishnan… - Journal of …, 2022 - spiedigitallibrary.org
Due to a growth in information sharing and the use of multiple digital technologies, human
lifestyles have been delivered into the virtual world. This digital world has seen the use of …
lifestyles have been delivered into the virtual world. This digital world has seen the use of …
A multi-stage chaotic encryption technique for medical image
MSR Tanveer, K Md. Rokibul Alam… - … Security Journal: A …, 2022 - Taylor & Francis
Usually, medical image relates to the disease. Its pixel distortion may cause an erroneous
diagnosis. The multiple chaos-based encryptions can protect it significantly due to high …
diagnosis. The multiple chaos-based encryptions can protect it significantly due to high …
[图书][B] Secure image transmission in wireless sensor network (WSN) applications
K Shankar, M Elhoseny - 2019 - Springer
Wireless sensor networks (WSN) is a hot research topic since it is being applied in diverse
fields. The recent interesting applications of WSN include target tracking, source localization …
fields. The recent interesting applications of WSN include target tracking, source localization …
An optimal lightweight cryptographic hash function for secure image transmission in wireless sensor networks
In the recent years, numerous security schemes have been proposed to secure the data and
Digital Images (DI) over WSNs. Especially, encryption and decryption algorithms are …
Digital Images (DI) over WSNs. Especially, encryption and decryption algorithms are …
An efficient data transmission approach using IAES-BE
Digital communication developed into an imperative element of infrastructure now-a-days.
Many applications that operate infrastructure systems are internet-centered. Because of the …
Many applications that operate infrastructure systems are internet-centered. Because of the …
[PDF][PDF] Novel Image Watermarking Methods for Simultaneous Improvement of Robustness, Imperceptibility, and Embedding Capacity
A Khan - 2023 - scholar.archive.org
Novel Image Watermarking Methods for Simultaneous Improvement of Robustness,
Imperceptibility, and Embedding Capacity Page 1 Novel Image Watermarking Methods for …
Imperceptibility, and Embedding Capacity Page 1 Novel Image Watermarking Methods for …
[PDF][PDF] Robust Collusion Avoidance-Secure Signific VC Scheme.
H Rangaswamy, S Sellappan - International Journal of Intelligent …, 2022 - ir.psgcas.ac.in
Visual Cryptography (VC) was developed to encrypt images into numerous shares and
decrypt them by grouping the shares without the need for expensive traditional …
decrypt them by grouping the shares without the need for expensive traditional …