[HTML][HTML] Visually meaningful image encryption algorithm based on digital signature
Traditional image encryption algorithms transform a plain image into a noise-like image. To
lower the chances for the encrypted image being detected by the attacker during the image …
lower the chances for the encrypted image being detected by the attacker during the image …
Chaos based Medical Image Encryption Techniques: A Comprehensive Review and Analysis
S Pankaj, M Dua - Information Security Journal: A Global …, 2024 - Taylor & Francis
In the past two decades, we have seen the proliferation of Internet and its applications. The
information exchange happens via images, videos, texts, audio clips, etc. Medical experts …
information exchange happens via images, videos, texts, audio clips, etc. Medical experts …
Improved chaos‐based cryptosystem for medical image encryption and decryption
In the medical sector, the digital image is multimedia data that contain secret information.
However, designing an efficient secure cryptosystem to protect the confidential images in …
However, designing an efficient secure cryptosystem to protect the confidential images in …
Enhancing security of medical images using deep learning, chaotic map, and hash table
The advancement in technology with high computing power leads to many security attacks.
Thus, the demand for innovative security algorithms is also rising. In the healthcare system …
Thus, the demand for innovative security algorithms is also rising. In the healthcare system …
Securing E‐Healthcare Images Using an Efficient Image Encryption Model
With the advancements in e‐healthcare services, it is possible to provide remote medical
services to patients and swifter first aid. Medical images play an essential role in e …
services to patients and swifter first aid. Medical images play an essential role in e …
[HTML][HTML] Research on cloud data encryption algorithm based on bidirectional activation neural network
Z Man, J Li, X Di, R Zhang, X Li, X Sun - Information Sciences, 2023 - Elsevier
Recently, it has been found that cloud storage still has security risks, and research on the
security and privacy of user data and information is still in the early stage. This paper studies …
security and privacy of user data and information is still in the early stage. This paper studies …
A practical medical image cryptosystem with parallel acceleration
Modern medical imaging techniques, eg, CT and MRI, can produce many privacy-sensitive
images, which are usually stored or transmitted through Picture Archiving and …
images, which are usually stored or transmitted through Picture Archiving and …
An optical-based encryption and authentication algorithm for color and grayscale medical images
The continuous digitization of healthcare services makes them more targeted by security
attackers that attempt to steal the patients' confidential records and hijack their healthcare …
attackers that attempt to steal the patients' confidential records and hijack their healthcare …
A novel compression-based 2D-chaotic sine map for enhancing privacy and security of biometric identification systems
Human biometric images are utilized for cell phone authentication, airport security, and
biometric passports. To improve the biometric identification process, this should be protected …
biometric passports. To improve the biometric identification process, this should be protected …
A chaotic hierarchical encryption/watermark embedding scheme for multi-medical images based on row–column confusion and closed-loop bi-directional diffusion
Z Zhang, J Mou, S Banerjee, Y Cao - Chinese Physics B, 2024 - iopscience.iop.org
Security during remote transmission has been an important concern for researchers in
recent years. In this paper, a hierarchical encryption multi-image encryption scheme for …
recent years. In this paper, a hierarchical encryption multi-image encryption scheme for …