Secure data storage and sharing techniques for data protection in cloud environments: A systematic review, analysis, and future directions

I Gupta, AK Singh, CN Lee, R Buyya - IEEE Access, 2022 - ieeexplore.ieee.org
A large number of researchers, academia, government sectors, and business enterprises
are adopting the cloud environment due to the least upfront capital investment, maximum …

Digital watermarking: Applicability for developing trust in medical imaging workflows state of the art review

AF Qasim, F Meziane, R Aspin - Computer Science Review, 2018 - Elsevier
Medical images can be intentionally or unintentionally manipulated both within the secure
medical system environment and outside, as images are viewed, extracted and transmitted …

Encryption of medical images based on the cosine number transform

JB Lima, F Madeiro, FJR Sales - Signal Processing: Image Communication, 2015 - Elsevier
In this paper, we introduce a novel scheme for encryption of medical images. The technique
is based on the cosine number transform, a mathematical tool whose application requires …

Image encryption scheme based on a new secure variant of Hill cipher and 1D chaotic maps

M Essaid, I Akharraz, A Saaidi - Journal of Information Security and …, 2019 - Elsevier
This article suggests a new image encryption algorithm based on a secure variant of Hill
Cipher (HC) and three improved one-dimensional (1D) chaotic maps. The proposed scheme …

ROI-based medical image watermarking for accurate tamper detection, localisation and recovery

D Ravichandran, P Praveenkumar… - Medical & Biological …, 2021 - Springer
Smart healthcare systems play a vital role in the current era of Internet of Things (IoT) and
Cyber-Physical Systems (CPS); ie Industry 4.0. Medical data security has become the …

RTS: A robust and trusted scheme for IoT-based mobile wireless mesh networks

K Haseeb, IU Din, A Almogren, N Islam… - IEEE Access, 2020 - ieeexplore.ieee.org
Wireless mesh networks consist of various mesh clients that are organized in an unfixed
infrastructure and packets are forwarded using a multi-hop model. Routing protocols have a …

Crypto‐based algorithms for secured medical image transmission

A Al‐Haj, G Abandah, N Hussein - IET Information Security, 2015 - Wiley Online Library
Booming telemedicine applications makes it deemed necessary to provide security services
for such applications. The algorithms proposed in this field can be grouped into three …

Robust medical image watermarking scheme using pso, lwt, and hessenberg decomposition

L Kumar, KU Singh, I Kumar, A Kumar, T Singh - Applied Sciences, 2023 - mdpi.com
Digital imaging is a technology that is extensively employed in diverse diagnostic
examinations such as magnetic resonance imaging (MRI), computed tomography (CT), and …

Secured telemedicine using region-based watermarking with tamper localization

A Al-Haj, A Amer - Journal of digital imaging, 2014 - Springer
Medical images exchanged over public networks require a methodology to provide
confidentiality for the image, authenticity of the image ownership and source of origin, and …

Secure IoT-enabled sharing of digital medical records: An integrated approach with reversible data hiding, symmetric cryptosystem, and IPFS

C Sekar, VR Falmari, M Brindha - Internet of Things, 2023 - Elsevier
In the digitizing medical field, secure sharing of patients' medical records over the Internet
while preserving privacy is critical. Medical image encryption safeguards healthcare, IoMT …