A comprehensive review on image encryption techniques

M Kaur, V Kumar - Archives of Computational Methods in Engineering, 2020 - Springer
Image encryption techniques play a significant role in multimedia applications to secure and
authenticate digital images. This paper presents a comprehensive study of various image …

A comprehensive survey of multi-view video summarization

T Hussain, K Muhammad, W Ding, J Lloret, SW Baik… - Pattern Recognition, 2021 - Elsevier
There has been an exponential growth in the amount of visual data on a daily basis
acquired from single or multi-view surveillance camera networks. This massive amount of …

Secure medical data transmission model for IoT-based healthcare systems

M Elhoseny, G Ramírez-González… - Ieee …, 2018 - ieeexplore.ieee.org
Due to the significant advancement of the Internet of Things (IoT) in the healthcare sector,
the security, and the integrity of the medical data became big challenges for healthcare …

A dynamic four-step data security model for data in cloud computing based on cryptography and steganography

R Adee, H Mouratidis - Sensors, 2022 - mdpi.com
Cloud computing is a rapidly expanding field. It allows users to access computer system
resources as needed, particularly data storage and computational power, without managing …

Secure and robust fragile watermarking scheme for medical images

A Shehab, M Elhoseny, K Muhammad… - IEEE …, 2018 - ieeexplore.ieee.org
Due to the advances in computer-based communication and health services over the past
decade, the need for image security becomes urgent to address the requirements of both …

Raspberry Pi assisted face recognition framework for enhanced law-enforcement services in smart cities

M Sajjad, M Nasir, K Muhammad, S Khan, Z Jan… - Future Generation …, 2020 - Elsevier
Similar to a fingerprint search system, face recognition technology can assist law
enforcement agencies in identifying suspects or finding missing persons. Face recognition …

PRMS: design and development of patients' E-healthcare records management system for privacy preservation in third party cloud platforms

K Zala, HK Thakkar, R Jadeja, P Singh… - IEEE …, 2022 - ieeexplore.ieee.org
In the current digital era, personal data storage on public platforms is a major cause of
concern with severe security and privacy ramifications. This is true especially in e-health …

Hybrid data encryption model integrating multi-objective adaptive genetic algorithm for secure medical data communication over cloud-based healthcare systems

R Denis, P Madhubala - Multimedia Tools and Applications, 2021 - Springer
The exponential rise in the development of cloud computing environments in the healthcare
field, the protection and confidentiality of the medical records become a primary concern for …

A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC

RJ Mstafa, KM Elleithy, E Abdelfattah - IEEE access, 2017 - ieeexplore.ieee.org
Over the past few decades, the art of secretly embedding and communicating digital data
has gained enormous attention because of the technological development in both digital …

Hash based encryption for keyframes of diagnostic hysteroscopy

R Hamza, K Muhammad, N Arunkumar… - IEEE …, 2017 - ieeexplore.ieee.org
In this paper, we address the problem of confidentiality of keyframes, which are extracted
from diagnostic hysteroscopy data using video summarization. We propose an image color …