An overview of hardware security and trust: Threats, countermeasures, and design tools

W Hu, CH Chang, A Sengupta, S Bhunia… - … on Computer-Aided …, 2020 - ieeexplore.ieee.org
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …

Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis

I Haverkamp, DK Sarmah - International Journal of Information Security, 2024 - Springer
In today's interconnected world, safeguarding digital data's confidentiality and security is
crucial. Cryptography and steganography are two primary methods used for information …

Securing hardware accelerators for CE systems using biometric fingerprinting

A Sengupta, M Rathor - IEEE Transactions on Very Large Scale …, 2020 - ieeexplore.ieee.org
This article presents a novel methodology to secure hardware accelerators (such as digital
signal processing (DSP) and multimedia intellectual property (IP) cores) against ownership …

Image encryption scheme using a new 4-D chaotic system with a cosinoidal nonlinear term in WMSNs

F Fan, V Verma, G Long, N Tsafack, D Jiang - Physica Scripta, 2024 - iopscience.iop.org
To protect the sensitive data captured in the wireless media sensor networks (WMSNs), this
paper propounds a novel data encryption scheme by employing a new chaotic system and …

Medical image encryption and compression by adaptive sigma filterized synorr certificateless signcryptive Levenshtein entropy-coding-based deep neural learning

CT Selvi, J Amudha, R Sudhakar - Multimedia Systems, 2021 - Springer
Pre-processing of medical images plays a vibrant part in the field of medicine to detect
patient's disease at an earlier stage. Hospitals and medical centers generate an enormous …

Medical images transmission over wireless multimedia sensor networks with high data rate

H Kasban, S Nassar, MAM El-Bendary - Analog Integrated Circuits and …, 2021 - Springer
This paper presents several proposed scenarios for medical image transmission over
Wireless Multimedia Sensor Networks with multi-level security tools and Unequal Error …

Obfuscated AES cryptosystem for secure medical imaging systems in IoMT edge devices

S Chhabra, K Lata - Health and Technology, 2022 - Springer
Abstract Internet of Medical Things (IoMT) driven health is the most advantageous aspect of
technology in the global healthcare industry. Incorporating personalized health data into the …

A high‐efficient imprecise discrete cosine transform block based on a novel full adder and Wallace multiplier for bioimages compression

E Esmaeili, F Pesaran, N Shiri - International Journal of Circuit …, 2023 - Wiley Online Library
Sophisticated systems take advantage of approximate circuits for energy management. A
gate‐level structure is introduced to make a novel imprecise full adder (FA) cell by the gate …

[PDF][PDF] Medical Image Transmission Using Novel Crypto-Compression Scheme.

A Mashat, S Bhatia, A Kumar, P Dadheech… - … Automation & Soft …, 2022 - academia.edu
The transmission of medical records over indiscrete and open networks has caused an
increase in fraud involving stealing patients' information, owing to a lack of security over …

Advancement of digital image steganography using deep convolutional neural networks

AG Devi, A Thota, G Nithya, S Majji… - 2022 International …, 2022 - ieeexplore.ieee.org
Steganography is a means of secretly concealing information in which the act of
steganography itself is hidden in plain sight. Steganography is also known as “stealth …