Secure and privacy in healthcare data using quaternion based neural network and encoder-elliptic curve deep neural network with blockchain on the cloud …

P Suganthi, R Kavitha - Sādhanā, 2023 - Springer
The security and privacy of healthcare data are crucial aspects within the healthcare
industry, as accurate diagnoses rely on medical professionals accessing patient healthcare …

Review of Image encryption techniques using neural network for optical security in the healthcare sector–PNO System

J Su, A Kankani, G Zajko, A Elchouemi… - … in Intelligent Systems …, 2020 - ieeexplore.ieee.org
Image encryption is used to encrypt patient images that contain diagnostic information about
patients in healthcare. The healthcare sector uses electronic media to support the …

Secure visual communication with advanced cryptographic and ımage processing techniques

V Sathananthavathi, K Ganesh Kumar… - Multimedia Tools and …, 2024 - Springer
Securing data during transmission is critical to prevent unauthorized access, interception, or
modification of the data. Data can be communicated securely while maintaining its …

Competitive Swarm Optimization with Encryption Based Steganography for Digital Image Security.

AA Eshmawi, SA Alsuhibany… - Computers …, 2022 - search.ebscohost.com
Digital image security is a fundamental and tedious process on shared communication
channels. Several methods have been employed for accomplishing security on digital image …

The Dichotomy of Crypto and NN: War and Peace

B Zolfaghari, H Nemati, N Yanai, K Bibak - Crypto and AI: From …, 2023 - Springer
In recent years, NNs, as the basic components in AI models and cryptographic schemes,
have come together in war and peace; a cross-impact forms a dichotomy deserving a …

Analysis of ECG image file encryption using ECDH and AES-GCM algorithm

P Oktivasari, M Agustin, REM Akbar… - … Workshop on Big …, 2022 - ieeexplore.ieee.org
Image data is used in various fields, including the health sector. One of the image data in the
health sector is an electrocardiogram (ECG). The ECG contains the identifying information of …

[图书][B] Cloud Computing in Medical Imaging

A El-Baz, JS Suri - 2023 - books.google.com
Today's healthcare organizations must focus on a lot more than just the health of their
clients. The infrastructure it takes to support clinical-care delivery continues to expand, with …

IS-DGM: an improved steganography method based on a deep generative model and hyper logistic map encryption via social media networks

MA Hameed, M Hassaballah, T Qiao - Multimedia Systems, 2024 - Springer
The exchange of information through social networking sites has become a major risk due to
the possibility of obtaining millions of subscribers' data at any time without the right …

A new method for locating data hiding in image steganography

S Pramanik - Multimedia Tools and Applications, 2024 - Springer
In the steganographic picture, it remains a challenging problem to determine the best place
for inserting the hidden message with a minimum distortion of the host medium. However …

[PDF][PDF] Neural cryptography based on quaternion-valued neural network

Y Zhang, WH Wang, HS Zhang - Int J Innov Comput Inf Control, 2022 - ijicic.org
Neural cryptography is a public key exchange protocol based on mutual learning of two
identically structured neural networks. After learning each other and eventually reaching full …