Security of medical images for telemedicine: a systematic review

M Magdy, KM Hosny, NI Ghali, S Ghoniemy - Multimedia Tools and …, 2022 - Springer
Recently, there has been a rapid growth in the utilization of medical images in telemedicine
applications. The authors in this paper presented a detailed discussion of different types of …

A review of research on medical image confidentiality related technology coherent taxonomy, motivations, open challenges and recommendations

B Zhang, B Rahmatullah, SL Wang, AA Zaidan… - Multimedia Tools and …, 2023 - Springer
With the modernization of biomedical image equipment and image processing technology,
the amount of medical image data increases rapidly. These medical images need to be …

Sailfish invasive weed optimization algorithm for multiple image sharing in cloud computing

VS Gutte, D Parasar - International Journal of Intelligent …, 2022 - Wiley Online Library
Visual cryptography (VC) is a secret sharing cryptographic technique, which permits visual
information that is encrypted in such a way that the decrypted information shows the visual …

Reversible data hiding scheme using deep learning and visual cryptography for medical image communication

N Rajesh Kumar, R Bala Krishnan… - Journal of …, 2022 - spiedigitallibrary.org
Due to a growth in information sharing and the use of multiple digital technologies, human
lifestyles have been delivered into the virtual world. This digital world has seen the use of …

A multi-stage chaotic encryption technique for medical image

MSR Tanveer, K Md. Rokibul Alam… - … Security Journal: A …, 2022 - Taylor & Francis
Usually, medical image relates to the disease. Its pixel distortion may cause an erroneous
diagnosis. The multiple chaos-based encryptions can protect it significantly due to high …

[图书][B] Secure image transmission in wireless sensor network (WSN) applications

K Shankar, M Elhoseny - 2019 - Springer
Wireless sensor networks (WSN) is a hot research topic since it is being applied in diverse
fields. The recent interesting applications of WSN include target tracking, source localization …

An optimal lightweight cryptographic hash function for secure image transmission in wireless sensor networks

K Shankar, M Elhoseny, K Shankar… - … image transmission in …, 2019 - Springer
In the recent years, numerous security schemes have been proposed to secure the data and
Digital Images (DI) over WSNs. Especially, encryption and decryption algorithms are …

An efficient data transmission approach using IAES-BE

MI Reddy, APS Kumar - Cluster Computing, 2020 - Springer
Digital communication developed into an imperative element of infrastructure now-a-days.
Many applications that operate infrastructure systems are internet-centered. Because of the …

[PDF][PDF] Novel Image Watermarking Methods for Simultaneous Improvement of Robustness, Imperceptibility, and Embedding Capacity

A Khan - 2023 - scholar.archive.org
Novel Image Watermarking Methods for Simultaneous Improvement of Robustness,
Imperceptibility, and Embedding Capacity Page 1 Novel Image Watermarking Methods for …

[PDF][PDF] Robust Collusion Avoidance-Secure Signific VC Scheme.

H Rangaswamy, S Sellappan - International Journal of Intelligent …, 2022 - ir.psgcas.ac.in
Visual Cryptography (VC) was developed to encrypt images into numerous shares and
decrypt them by grouping the shares without the need for expensive traditional …