Securing the future of IoT-healthcare systems: A meta-synthesis of mandatory security requirements

MZ Nezhad, AJJ Bojnordi, M Mehraeen… - International Journal of …, 2024 - Elsevier
Abstract Introduction Healthcare-based Internet of Things (Healthcare-IoT) is a turning point
in the development of health information systems. This emerging trend significantly …

A novel compression-based 2D-chaotic sine map for enhancing privacy and security of biometric identification systems

M Rahman, A Murmu, P Kumar, NR Moparthi… - Journal of Information …, 2024 - Elsevier
Human biometric images are utilized for cell phone authentication, airport security, and
biometric passports. To improve the biometric identification process, this should be protected …

FSR-SPD: an efficient chaotic multi-image encryption system based on flip-shift-rotate synchronous-permutation-diffusion operation

A Raghuvanshi, M Budhia, KAK Patro… - Multimedia Tools and …, 2024 - Springer
Images are a crucial component in contemporary data transmission. Numerous images are
transmitted daily through the open-source network. This paper presents a multi-image …

A secure VM live migration technique in a cloud computing environment using blowfish and blockchain technology

A Gupta, S Namasudra, P Kumar - The Journal of Supercomputing, 2024 - Springer
Data centres have become the backbone of infrastructure for delivering cloud services. In
the emerging cloud computing paradigm, virtual machine (VM) live migration involves …

Water-body detection in Sentinel-1 SAR images with DK-CO network

Y Xie, H Zeng, K Yang, Q Yuan, C Yang - Electronics, 2023 - mdpi.com
Synthetic Aperture Radar (SAR) is an active microwave sensor with all-day/night and all-
weather detection capability, which is crucial for detecting surface water resources. Surface …

Triple Layer RGB Image Encryption Algorithm Utilizing Three Hyperchaotic Systems and its FPGA Implementation

W Alexan, N Elabyad, M Khaled, R Osama… - IEEE …, 2024 - ieeexplore.ieee.org
Image encryption is essential for protecting sensitive visual data during transmission and
storage. This article introduces a novel image encryption technique that utilizes three …

GANs for Image Security Applications: A Literature Review

MY Mhawi, HN Abdullah, A Sikora - Iraqi Journal of Information and …, 2024 - ijict.edu.iq
Generative Adversarial Networks (GANs) have earned significant attention in various
domains due to their generative model's compelling ability to generate realistic examples …

Deep learning-based encryption scheme for medical images using DCGAN and virtual planet domain

M Kumar, AS Chivukula, G Barua - Scientific Reports, 2025 - nature.com
The motivation for this article stems from the fact that medical image security is crucial for
maintaining patient confidentiality and protecting against unauthorized access or …

An Image Double Encryption Based on Improved GAN and Hyper Chaotic System

L Dai, H Lei, L Chen, C Wang, L Feng - IEEE Access, 2024 - ieeexplore.ieee.org
In the current research field of digital image encryption technology, there are some key
challenges, including insufficient key space, the weak sensitivity of key parameters, and low …

Blockchain-Based Mutual Authentication Protocol for IoT-Enabled Decentralized Healthcare Environment

CM Chen, Z Chen, S Kumari… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
In the ever-evolving landscape of technology, healthcare continuously harnesses its
benefits, propelling advancements in medical practices. Within intelligent healthcare …