In order to enhance the security of exchanged medical images in telemedicine, we propose in this paper a blind and robust approach for medical image protection. This approach …
In recent years, we face an increasing interest in protecting multimedia data and copyrights due to the high exchange of information. Attackers are trying to get confidential information …
The Internet of Things (IoT) is becoming a pervasive technology entangled in everyday life. The objective of IoT is to provide ubiquitous access to numerous devices and machines on …
N Sharma, R Shanker - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
Ransomware is a type of malicious software. Computers infected with ransomware have restricted access to the system. It is a malicious program, and money must be provided to the …
H Al‐Balasmeh, M Singh… - … and Computation: Practice …, 2022 - Wiley Online Library
The leakage of sensitive data of users and global positioning system location trajectories from different cloud computation sources have increased in daily lives. This critical problem …
This paper proposes a joint encryption and screen-cam robust watermarking scheme. This method combines the advantages of smartphone, encryption and watermarking …
Reversible data hiding (RDH) is a recently emerged research domain in the field of information security domain with broad applications in medical images and meta-data …
T Kaiser, R Siddiqua, MMU Hasan - 2022 - dspace.bracu.ac.bd
Multi-Factor-Authentication is one of the most used services nowadays by all kinds of people, especially by many organizations. People use this service to authorize their stored …
M Amrutha, A Kannammal - Physica Scripta, 2023 - iopscience.iop.org
In recent years the combination of medical image watermarking and encryption is becoming popular due to a better trade-off between authenticity and security, since, each of these …