Secure blockchain enabled Cyber–physical systems in healthcare using deep belief network with ResNet model

GN Nguyen, NH Le Viet, M Elhoseny, K Shankar… - Journal of parallel and …, 2021 - Elsevier
Cyber–physical system (CPS) is the incorporation of physical processes with processing
and data transmission. Cybersecurity is a primary and challenging issue in healthcare due …

Medical image encryption by content-aware DNA computing for secure healthcare

Y Wu, L Zhang, S Berretti, S Wan - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
There exists a rising concern on security of healthcare data and service. Even small lost,
stolen, displaced, hacked, or communicated in personal health data could bring huge …

Hybrid optimization with cryptography encryption for medical image security in Internet of Things

M Elhoseny, K Shankar, SK Lakshmanaprabu… - Neural computing and …, 2020 - Springer
The development of the Internet of Things (IoT) is predicted to change the healthcare
industry and might lead to the rise of the Internet of Medical Things. The IoT revolution is …

Reliable data transmission model for mobile ad hoc network using signcryption technique

M Elhoseny, K Shankar - IEEE transactions on reliability, 2019 - ieeexplore.ieee.org
In recent years, the need for high security with reliability in the wireless network has
tremendously been increased. To provide high security in reliable networks, mobile ad hoc …

Energy consumption analysis of Virtual Machine migration in cloud using hybrid swarm optimization (ABC–BA)

K Karthikeyan, R Sunder, K Shankar… - The Journal of …, 2020 - Springer
A cloud data center consumes more energy for computation and switching servers between
modes. Virtual Machine (VM) migration enhances the execution of cloud server farm in terms …

An efficient optimal key based chaos function for medical image security

K Shankar, M Elhoseny, ED Chelvi… - IEEE …, 2018 - ieeexplore.ieee.org
With the rapid development in the field of medical image encryption, researchers analyzed a
number of encryption algorithms based on chaotic systems. But there is a difficulty lies, ie …

An enhanced whale optimization algorithm for vehicular communication networks

SR Valayapalayam Kittusamy… - International Journal …, 2022 - Wiley Online Library
In the field of vehicle communication networks, vehicular ad hoc network (VANET) is
established with the help of road side unit (RSU). Each vehicle in the traffic system is …

Medical image security using dual encryption with oppositional based optimization algorithm

T Avudaiappan, R Balasubramanian… - Journal of medical …, 2018 - Springer
Security is the most critical issue amid transmission of medical images because it contains
sensitive information of patients. Medical image security is an essential method for secure …

RETRACTED ARTICLE: Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique

K Shankar, M Elhoseny, RS Kumar… - Journal of Ambient …, 2020 - Springer
Abstract Secret Image Sharing (SIS) scheme is to encrypt a secret image into 'n'specious
shadows. It is unable to reveal any data on the secret image if at least one of the shadows is …

Adaptive optimal multi key based encryption for digital image security

K Shankar, SK Lakshmanaprabu… - Concurrency and …, 2020 - Wiley Online Library
The security of digital images is an essential and challenging task on shared communication
Model. Generally, high secure working environment and data are also secured with an …