Security of medical images for telemedicine: a systematic review

M Magdy, KM Hosny, NI Ghali, S Ghoniemy - Multimedia Tools and …, 2022 - Springer
Recently, there has been a rapid growth in the utilization of medical images in telemedicine
applications. The authors in this paper presented a detailed discussion of different types of …

Survey on deep learning applications in digital image security

Z Bao, R Xue - Optical Engineering, 2021 - spiedigitallibrary.org
In the digital era, sharing pictures on social media has become a common privacy issue. To
prevent private images from being eavesdropped on and destroyed, develo** secure and …

Biomedical image security

QA Al-Haija - Advances in Artificial Intelligence, 2024 - Elsevier
Biomedical image security is necessary for securing sensitive information and files when
computerized images and their appropriate patient records are communicated throughout …

Unsymmetric image encryption using lower-upper decomposition and structured phase mask in the fractional Fourier domain

S Yadav, H Singh - Recent Advances in Computer Science and …, 2021 - ingentaconnect.com
Background: An asymmetric cryptosystem using Structured Phase Mask (SPM) and Random
Phase Mask (RPM) in fractional Fourier transform (FrFT) using Lower-Upper decomposition …

[HTML][HTML] A hybrid encryption scheme based on optical scanning cryptography and Fibonacci–Lucas transformation

AM Cyriac, BS MK - AIP Advances, 2021 - pubs.aip.org
This paper describes a new opto-hybrid technique of two-stage encryption for the secure
transmission and reception of sensitive information contained in the form of images and …

Towards a Novel Generalized Chinese Remainder Algorithm for Extended Rabin Cryptosystem

J Zhan, PJ Shiue, SC Huang, BJ Lowe - IEEE Access, 2020 - ieeexplore.ieee.org
This paper proposes a number of theorems and algorithms for the Chinese Remainder
Theorem, which is used to solve a system of linear congruences, and the extended Rabin …