Bibliometric Review on Healthcare Sustainability

S Singh, G Madaan, J Kaur, HR Swapna… - … of Research on Safe …, 2023 - igi-global.com
Abstract United Nations SDGs (sustainable development goals) have prompted health-care
organisations in and around this world to implement health care initiatives that aim to …

Transparent hashing in the encrypted domain for privacy preserving image retrieval

K Karthik, S Kashyap - Signal, Image and Video Processing, 2013 - Springer
Search through a database of encrypted images against a crumpled and encrypted query
will remain privacy preserving only if comparisons between selective features derived from …

[PDF][PDF] Chaotic Scheme for Image Encryption Based on Arnold Cat's Map

AO Abdul-Majeed - … ) International Journal of Computer Science and …, 2014 - academia.edu
Digital images are widely used media over the Internet for different purpose. Therefore,
security becomes important in the transmission. This paper presents spatial domain …

Chaotic based technique for partial image encryption

MM Elkady, MM Abd Elnaby… - … on Computer Theory …, 2016 - ieeexplore.ieee.org
Selective or partial encryption of images can greatly reduce the computational complexity
and execution time by encoding just a small amount of the image pixels. The selected image …

Securing DICOM format image archives using improved chaotic cat map method

M Arun Fera, S Jaganathan - … of the Second International Conference on …, 2013 - Springer
In healthcare industry, the patient's medical data plays a vital role because diagnosis of any
ailments is done by using those data. The high volume of medical data leads to scalability …

Key independent encrypted face clustering

K Karthik, H Balaraman - 2017 IEEE International Conference …, 2017 - ieeexplore.ieee.org
In a cloud environment to preserve privacy of the end user, there arises a need to match and
classify images in the encrypted domain. To impart granularity to image-data access it is …

[PDF][PDF] An Integrated Algorithm Supporting Confidentiality and Integrity for Secured Access and Storage of DICOM Images

S Jaganathan, A Fera - … Journal of Biometrics and Bioinformatics (IJBB), 2012 - Citeseer
In healthcare industry, the patient's medical data plays a vital role because diagnosis of any
ailments is done by using those data. The high volume of medical data leads to scalability …

[PDF][PDF] Secure Message Authentication

JR Rajput, P Kalyankar Pravin - Citeseer
Digital watermarks have recently been proposed for authentication of both video data and
still images and for integrity verification of visual multimedia. In such applications, the …

Linked Data とルールベースの統合に基づく食事療法支援サービスの開発と評価

多川勇介, 田中改, 森田武史, 南裕也, 並河大地… - 人工知能学会論文 …, 2016 - jstage.jst.go.jp
抄録 As Linked Data consumption has not yet been discussed from the points of information
services, we discuss here how to build web applications with function extendibility and …

[引用][C] IMPLEMENTATION OF ROBUST SYSTEM TO GENERATE AUTHENTICATED ENCRYPTION FOR SECURE MESSAGE

MS SI, MB PB, MK PR