Energy efficient and secure healthcare data transmission in the internet of medical things network

S Mondal, I Ghosh, A Das - Microsystem Technologies, 2023 - Springer
Abstract The Internet of Things (IoT) gains myriad admiration in wide applications including
medical and healthcare monitoring due to its low cost and its self-operating activities …

An efficient two-level image encryption system using chaotic maps

KAK Patro, B Acharya - International Journal of Information …, 2023 - inderscienceonline.com
This paper proposes an image securing technique that aims to provide two-level security on
two images in terms of encryption at the same time. In this technique, both bit and pixel-level …

Metaheuristic-supported image encryption framework based on binary search tree and DNA encoding

M Roy, S Chakraborty, K Mali - Multimedia Tools and Applications, 2024 - Springer
Rapid evolution in digital communication increases the risk of unauthorized access to
sensitive data. Digital images are one of the most popular types and are frequently used to …

Neural perceptron & strict lossless secret sharing oriented cryptographic science: fostering patients' security in the “new normal” COVID-19 E-Health

J Dey, A Bhowmik, S Karforma - Multimedia Tools and Applications, 2022 - Springer
Patients' data security is an open challenge on any telemedicine system. The challenge has
been extended enough in this unprecedented corona virus led pandemic. COVID-19 has …

Unique Video Encryption Technique Intended for Smart City Application

HN Khan, A Das, A Chaudhuri - IETE Journal of Research, 2023 - Taylor & Francis
The internet has become an integral part of our modern life, and the protection of secret data
over the internet of multimedia things is the fundamental concern for Smart City applications …

[PDF][PDF] COVID-19 paediatric cavity telecare system: a novel chain key generation and encryption scheme

J Dey - International Journal of Reconfigurable and Embedded …, 2022 - academia.edu
In this unprecedented coronavirus crisis, telehealth had emerged as a substitute way of
treatment. More specifically, paediatric children are at high risk of outside exposure now …

Border Collie Shuffled Shepherd optimization-based image reconstruction using visual cryptography

S AS, S Sridevi Sathya Priya, S VS - The Imaging Science Journal, 2023 - Taylor & Francis
The visual secret sharing (VSS) technique is an encryption model to conceal secret
messages into two or more meaningless images, called shares. Information loss is a huge …

Session Key Based an Efficient Cryptographic Scheme of Images for Securing Internet of Things

A Vidwans, M Ramaiya - SN Computer Science, 2023 - Springer
Nowadays, the majority of mobile phone conversations take the form of photos. A strong
encryption mechanism is required to shield the photographs from hackers. The novel …

Establishment of Neural Series Transmission Keys (NSTKs) and Security in the Field of COVID-19 Telepediatric Oral Health

J Dey, S Ahmad, S Karforma - Wireless Personal Communications, 2023 - Springer
In this exceptional COVID-19 crisis, telemedicine had arisen as a substitute technique for
medicines. Even more unequivocally, pediatric children were at high risk to outside homes …

Episode of Dual Neural Genetic Firefly (DNGF) Transmission Key Generation in New Normal Mode of COVID-19 Second Wave Telepsychiatry

J Dey, S Karforma, B Chowdhury - Journal of The Institution of Engineers …, 2022 - Springer
The volume of E-commerce transactions had accelerated on huge scale due to COVID-19.
Telemedicine comes under the segment of E-commerce, where the patients can get their …