A prediction based encryption approach for telemedicine applications
G Vallathan, T Rajani, E Kumaraswamy… - IOP Conference Series …, 2020 - iopscience.iop.org
The rapid progression of health care technologies systems and transmission strategies
makes it reliable to gain, dispense and manage data over medical devices and as well …
makes it reliable to gain, dispense and manage data over medical devices and as well …
Chua's diode and strange attractor: a three‐layer hardware–software co‐design for medical image confidentiality
S Rajagopalan, S Poori, M Narasimhan… - IET Image …, 2020 - Wiley Online Library
Medical image security relies upon the arrival of improved techniques for enhancing the
confusion as well as diffusion processes in the pixel level manipulations. Non‐linear circuits …
confusion as well as diffusion processes in the pixel level manipulations. Non‐linear circuits …
[PDF][PDF] Review on secured data capabilities of cryptography, steganography, and watermarking domain
FQA Al-Yousuf, R Din - Indonesian Journal of Electrical …, 2020 - researchgate.net
Due to the increment of using Internet to transfer the critical and secret data, many studies
interested in secured data and investigated many ways to secure the transferred information …
interested in secured data and investigated many ways to secure the transferred information …
Initial states-induced complex behaviors in a memristive coupled Hopfield neural network model and its application in biomedical image encryption
ALM Biamou, VK Tamba, GCG Kuate, FK Tagne… - Physica …, 2023 - iopscience.iop.org
The multi-stable memristor is a type of memristor that can store multiple conductance states,
optimizing information management and improving the efficiency of artificial neural networks …
optimizing information management and improving the efficiency of artificial neural networks …
Triple layer image security using bit-shift, chaos, and stream encryption
A Susanto, EH Rachmawanto, IUW Mulyono… - Bulletin of Electrical …, 2020 - beei.org
One popular image security technique is image encryption. This research proposes an
image encryption technique that consists of three encryption layers, ie bit-shift encryption …
image encryption technique that consists of three encryption layers, ie bit-shift encryption …
An encryption based on DNA and AES algorithms for hiding a compressed text in colored Image
QS Alsaffar, HN Mohaisen… - IOP Conference Series …, 2021 - iopscience.iop.org
The vast serious security challenges has created new secured ways of transmitting
information and reduce the chance of hackers to use their methods to analyse the …
information and reduce the chance of hackers to use their methods to analyse the …
DNA sequence based medical image encryption scheme
Medical consultants and doctors store and update patients confidential information on
Internet cloud computing platforms. These days, securing medical images from …
Internet cloud computing platforms. These days, securing medical images from …
Divide and Scramble-A Recursive Image Scrambling algorithm utilizing Rubik's Cube
R Patanwadia, R Mangrulkar - 2021 International Conference …, 2021 - ieeexplore.ieee.org
Divide and Scramble-An image scrambling algorithm based on the Rubik's cube is
presented in this paper. The strength and robustness of the algorithm are based on the …
presented in this paper. The strength and robustness of the algorithm are based on the …
A simple image encryption based on binary image affine transformation and zigzag process
AN Kengnou Telem, C Feudjio, B Ramakrishnan… - …, 2022 - Wiley Online Library
In this paper, we propose a new and simple method for image encryption. It uses an external
secret key of 128 bits long and an internal secret key. The novelties of the proposed …
secret key of 128 bits long and an internal secret key. The novelties of the proposed …
[PDF][PDF] Implementation of a bit permutation-based advanced encryption standard for securing text and image files
HV Gamido - Indonesian Journal of Electrical Engineering and …, 2020 - researchgate.net
The paper proposes a modification of the Advanced Encryption Standard (AES) to address
its high computational requirement steaming from the complex mathematical operations in …
its high computational requirement steaming from the complex mathematical operations in …