Hybrid cryptographic approach for internet ofhybrid cryptographic approach for internet ofthings applications: A review

NN Mohamed, YM Yussoff, MA Saleh… - Journal of Information …, 2020 - e-journal.uum.edu.my
Cryptography is described as the study of encrypting or secretCryptography is described as
the study of encrypting or secretwriting of data using logical and mathematical principles …

Secure fusion of crypto-stegano based scheme for satellite image application

P Preethi, G Prakash - 2021 Asian Conference on Innovation in …, 2021 - ieeexplore.ieee.org
The transmission of satellite images in the Internet has elicited significant attention over the
past few years, due to the foreword of cloud and web based satellite information. Today …

[HTML][HTML] Encryption of 3D medical images based on a novel multiparameter cosine number transform

VS Lima, F Madeiro, JB Lima - Computers in Biology and Medicine, 2020 - Elsevier
In this paper, a multiparameter cosine number transform is proposed. Such a transform is
obtained using the fact that the basis vectors of the three-dimensional cosine number …

Smartphone application for medical images secured exchange based on encryption using the matrix product and the exclusive addition

M Boussif, N Aloui, A Cherif - IET Image Processing, 2017 - Wiley Online Library
In this study, the authors present a secured transfer method for medical images, using
smartphone, based on a proposed images encryption algorithm using the matrix product …

[PDF][PDF] A survey on medical image encryption

PK Kavitha, PV Saraswathi - ijsrst. com, 2017 - researchgate.net
In healthcare industry Medical images or information is transmitted from source to
destination using wired or wireless medium. The transmission of this information requires …

[PDF][PDF] Hybrid Dynamic Optimization forMultilevel Security System in Disseminating Confidential Information.

S Anwarul, S Kumar, A Bhansali… - … Systems Science & …, 2023 - cdn.techscience.cn
Security systems are the need of the hour to protect data from unauthorized access. The
dissemination of confidential information over the public network requires a high level of …

Secure transmission of DICOM images by comparing different cryptographic algorithms

TM Navamani, A Bharadwaj, R Agrawal… - Materials Today …, 2019 - Elsevier
This paper aims to implement the concept of preserving the Confidentiality and Integrity of
DICOM Images Using Cryptographic Algorithms. This work uses two types of cryptographic …

Performance Evaluation of AES, DES, RSA, and Paillier Homomorphic for Image Security

M Bhavitha, K Rakshitha… - 2024 IEEE 9th …, 2024 - ieeexplore.ieee.org
In the current digital era, it is crucial to preserve sensitive data, particularly when it comes to
images. Encrypting images is essential for ensuring the confidentiality and integrity of image …

Cascade ciphering technique for confidential, authenticated and integrity preserved transmission of images over a network

H Tejaswini, R Dodmane - 2017 International Conference On …, 2017 - ieeexplore.ieee.org
Rapid growth in the internet usage has contributed to large amount of data or images that
are getting transmitted via network. With the purpose of faster delivery of data, especially …

[PDF][PDF] A Comparative Study of Testing Parameters of Medical Images Processing

F Qamar, M Sirshar - … Journal of Signal Processing, Image Processing …, 2017 - academia.edu
Medical imaging is a technique or a process that is used in the visualization of body tissues,
parts or organs for the usage in clinical analysis, treatment and disease monitoring. As …