The importance of image security in the field of medical imaging is challenging. Several research works have been conducted to secure medical healthcare images. Encryption, not …
Image encryption protects the sensitive and confidential information of images. This protection comes from the combination of secret keys, encryption, and decryption algorithms …
H Miriam, D Doreen, D Dahiya… - … Automation & Soft …, 2023 - search.ebscohost.com
Blockchain technology is critical in cyber security. The most recent cryptographic strategies may be hacked as efforts are made to build massive electronic circuits. Because of the …
SK Mousavi, A Ghaffari - Journal of Information Security and Applications, 2021 - Elsevier
Abstract The Internet of Things (IoT) includes various technologies, including sensing devices, Radio-Frequency Identification (RFID), and Microelectromechanical Systems …
Recently, massive research works have been accomplished for augmenting privacy and security requirements for cybersecurity applications in wireless communication networks …
W Li, GG Wang - Journal of Ambient Intelligence and Humanized …, 2023 - Springer
Elephant herding optimization (EHO) algorithm which is a new swarm intelligence optimization algorithm was proposed in 2015. Its cores are clan updating operator and …
Transmission of multimedia data such as images, videos, and audio over the Internet is risky due to cyberattacks. To overcome the security issues, several encryption schemes are …
The real world is bounded by people, hospitals, industries, buildings, businesses, vehicles, cognitive cities, and billions of devices that offer various services and interact with the world …
S Kaul, Y Kumar - Constraint handling in metaheuristics and applications, 2021 - Springer
Because of getting the efficient and accurate results in the field of optimization problem solving, researchers are taking much attentiveness in heuristic and metaheuristic …