Y Wu, L Zhang, S Berretti, S Wan - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
There exists a rising concern on security of healthcare data and service. Even small lost, stolen, displaced, hacked, or communicated in personal health data could bring huge …
M Elhoseny, K Shankar, SK Lakshmanaprabu… - Neural computing and …, 2020 - Springer
The development of the Internet of Things (IoT) is predicted to change the healthcare industry and might lead to the rise of the Internet of Medical Things. The IoT revolution is …
M Elhoseny, K Shankar - IEEE transactions on reliability, 2019 - ieeexplore.ieee.org
In recent years, the need for high security with reliability in the wireless network has tremendously been increased. To provide high security in reliable networks, mobile ad hoc …
A cloud data center consumes more energy for computation and switching servers between modes. Virtual Machine (VM) migration enhances the execution of cloud server farm in terms …
With the rapid development in the field of medical image encryption, researchers analyzed a number of encryption algorithms based on chaotic systems. But there is a difficulty lies, ie …
In the field of vehicle communication networks, vehicular ad hoc network (VANET) is established with the help of road side unit (RSU). Each vehicle in the traffic system is …
Security is the most critical issue amid transmission of medical images because it contains sensitive information of patients. Medical image security is an essential method for secure …
K Shankar, M Elhoseny, RS Kumar… - Journal of Ambient …, 2020 - Springer
Abstract Secret Image Sharing (SIS) scheme is to encrypt a secret image into 'n'specious shadows. It is unable to reveal any data on the secret image if at least one of the shadows is …
The security of digital images is an essential and challenging task on shared communication Model. Generally, high secure working environment and data are also secured with an …