Medical images can be intentionally or unintentionally manipulated both within the secure medical system environment and outside, as images are viewed, extracted and transmitted …
In this paper, we introduce a novel scheme for encryption of medical images. The technique is based on the cosine number transform, a mathematical tool whose application requires …
M Essaid, I Akharraz, A Saaidi - Journal of Information Security and …, 2019 - Elsevier
This article suggests a new image encryption algorithm based on a secure variant of Hill Cipher (HC) and three improved one-dimensional (1D) chaotic maps. The proposed scheme …
Smart healthcare systems play a vital role in the current era of Internet of Things (IoT) and Cyber-Physical Systems (CPS); ie Industry 4.0. Medical data security has become the …
Wireless mesh networks consist of various mesh clients that are organized in an unfixed infrastructure and packets are forwarded using a multi-hop model. Routing protocols have a …
Booming telemedicine applications makes it deemed necessary to provide security services for such applications. The algorithms proposed in this field can be grouped into three …
Digital imaging is a technology that is extensively employed in diverse diagnostic examinations such as magnetic resonance imaging (MRI), computed tomography (CT), and …
A Al-Haj, A Amer - Journal of digital imaging, 2014 - Springer
Medical images exchanged over public networks require a methodology to provide confidentiality for the image, authenticity of the image ownership and source of origin, and …
C Sekar, VR Falmari, M Brindha - Internet of Things, 2023 - Elsevier
In the digitizing medical field, secure sharing of patients' medical records over the Internet while preserving privacy is critical. Medical image encryption safeguards healthcare, IoMT …