IEHC: An efficient image encryption technique using hybrid chaotic map
Image encryption is essential for the transmission of the sensitive images through insecure
channels used in wired or wireless communication nowadays. With the advent of cloud …
channels used in wired or wireless communication nowadays. With the advent of cloud …
Analysis and computation of encryption technique to enhance security of medical images
BD Parameshachari, HT Panduranga… - IOP conference …, 2020 - iopscience.iop.org
Recently, there are many advanced techniques used in the medical fields, such as smart
health, e-health and telemedicine applications. These techniques rely on open source …
health, e-health and telemedicine applications. These techniques rely on open source …
Secure smart healthcare monitoring in industrial internet of things (iiot) ecosystem with cosine function hybrid chaotic map encryption
The technological progression is raised as a hybrid ecosystem with the industrial Internet of
Things (IIoT). Among them, healthcare is also broadly unified with the Internet of Things to …
Things (IIoT). Among them, healthcare is also broadly unified with the Internet of Things to …
Medical image encryption algorithm based on a new five-dimensional three-leaf chaotic system and genetic operation
Z Liang, Q Qin, C Zhou, N Wang, Y Xu, W Zhou - PloS one, 2021 - journals.plos.org
Current image encryption methods have many shortcomings for the medical image
encryption with high resolution, strong correlation and large storage space, and it is difficult …
encryption with high resolution, strong correlation and large storage space, and it is difficult …
A gray image encryption technique using the concept of water waves, chaos and hash function
In this article, an innovative encryption technique is developed by getting the inspiration from
the natural up-down water wave's phenomena that changes a reflection on pond's surface …
the natural up-down water wave's phenomena that changes a reflection on pond's surface …
A Review of Genome to Chaos: Exploring DNA Dynamics in Security
S Aashiq Banu, LK Rao, PS Priya… - Multimedia Tools and …, 2024 - Springer
One of the largest and fastest-growing industries globally is e-healthcare. Digital medical
imaging constantly evolves, advancing from standard computed tomography to powerful …
imaging constantly evolves, advancing from standard computed tomography to powerful …
Secured compression for 2D medical images through the manifold and fuzzy trapezoidal correlation function
In biomedical imaging, the imaging of secured storage and maintaining medical images like
MRI, CT, and ultrasound scans are challenging with ever-growing tremendous image data …
MRI, CT, and ultrasound scans are challenging with ever-growing tremendous image data …
A sensitive image encryption algorithm based on a higher-dimensional chaotic map and steganography
Chaotic maps have been widely used in image encryption due to their complexity,
pseudorandomness and high sensitivity to initial values. In this paper, an image encryption …
pseudorandomness and high sensitivity to initial values. In this paper, an image encryption …
Efficient secure surveillance on smart healthcare IoT system through cosine-transform encryption
The emerging technologies with IoT (Internet of Things) systems are elevated as a prototype
and combination of the smart connectivity ecosystem. These ecosystems are appropriately …
and combination of the smart connectivity ecosystem. These ecosystems are appropriately …
[PDF][PDF] Image encryption algorithm based on substitution principle and shuffling scheme
A Hamad, AK Farhan - Engineering and Technology Journal, 2020 - iasj.net
The dynamic progression in multimedia and communication industry attracted an increased
concern in regards to digital image security which are being sent via open or stored …
concern in regards to digital image security which are being sent via open or stored …