CryptoDL: Predicting dyslexia biomarkers from encrypted neuroimaging dataset using energy-efficient residue number system and deep convolutional neural network

OL Usman, RC Muniyandi - Symmetry, 2020 - mdpi.com
The increasing availability of medical images generated via different imaging techniques
necessitates the need for their remote analysis and diagnosis, especially when such …

A new image encryption and decryption technique using genetic algorithm and residual numbers

PAN Agbedemnab, EY Baagyere… - 2019 IEEE …, 2019 - ieeexplore.ieee.org
The security of digital images has attracted serious attention lately. In this paper, we present
a novel three-layered image encryption and decryption scheme capable of encrypting and …

A multi-layer data encryption and decryption mechanism employing cryptography and steganography

T Tabassum, MA Mahmood - 2020 Emerging Technology in …, 2020 - ieeexplore.ieee.org
Information protection is a significant matter for both oneself and companies involved in one
manner of communication or the other, particularly in cyberspace, due to the development of …

Pixel-based Homomorphic Residue Number System Scheme for Privacy-Preserving Neuroimaging Datasets Encryption and Decryption

MA Usman, OL Usman… - TASUED Journal of Pure …, 2023 - journals.tasued.edu.ng
Recently, there has been some interest in the development of a homomorphic privacy-
preserving classification method for neuroimages based on the residue number system …

Efficient Neuroimaging Data Security and Encryption Using Pixel-Based Homomorphic Residue Number System

LO Usman, RC Muniyandi, MA Usman - SN Computer Science, 2023 - Springer
In recent times, there has been an increasing attention in designing a homomorphic privacy-
preserving classification method for neuro-images based on the residue number system …

[PDF][PDF] Symmetric encryption using pre-shared public parameters for a secure TFTP protocol

NN Mohamed, YM Yussoff, MAM Isa… - J. Eng. Sci …, 2017 - jestec.taylors.edu.my
Advances in the communication technology of embedded systems have led to the situation
where nowadays almost all systems should implement security for data safety. Trivial File …

[PDF][PDF] Symmetric key cryptography using digital circuit based on one right shift

J Goswami, M Paul - Review of Computer Engineering Studies, 2017 - iieta.org
ABSTRACT A session based symmetric key cryptographic technique has been proposed in
this paper and it is termed as 1RS. The plain text is considered as a stream of bits and is …

An Enhanced Network Anomaly Intrusion Detection System Using Dimensionality Reduction Approach and Residue Number System

BF Balogun - 2023 - search.proquest.com
Abstract Intrusion Detection Systems (IDS) frequently employ Machine Learning (ML)
techniques for anomaly detection. Due to the time-consuming nature of detecting anomalies …

[HTML][HTML] Multiplier design utilizing tri valued logic for RLNS based DSP applications

SR Valliammal, S Palaniswami - Circuits and Systems, 2016 - scirp.org
Residue Number System (RNS) has proved shaping the Digital Signal Processing (DSP)
units into highly parallel, faster and secured entities. The computational complexity of the …

A novel approach for improving error detection and correction in wsn

D Kheirandish, A Safari, Y Kong - 2014 IEEE 27th Canadian …, 2014 - ieeexplore.ieee.org
In this paper, error detection and correction algorithms are studied and a novel approach is
proposed to increase the speed of computations using the polynomial residue number …