[PDF][PDF] Neural soft computing based secured transmission of intraoral gingivitis image in e-health care

A Sarkar, J Dey, M Chatterjee, A Bhowmik… - Indonesian Journal of …, 2019 - academia.edu
In this paper, a key based soft computing transmission of intraoral gingivitis image has been
proposed without the exchange of common key in between the nodes. Gingivitis has been a …

Newer post-COVID perspective: Teledental encryption by de-multiplexed perceptrons

J Dey, A Sarkar, S Karforma - International Journal of Information …, 2021 - Springer
This paper presents an efficient mechanism for secured encryption of intraoral information in
the emerging field of Teledental. Due to global rapid surge in the (Coronavirus Disease) …

Energy efficient secured sharing of intraoral gingival information in digital way (EESS-IGI)

A Sarkar, J Dey, A Bhowmik, JK Mandal… - Annual Convention of the …, 2018 - Springer
This paper presents a novel cryptographic scheme for sharing intraoral information secretly
where key is used to encrypt the secret Gingivitis image and then the secret is shared …

[PDF][PDF] Computational intelligence based lossless regeneration (CILR) of blocked gingivitis intraoral image transportation

A Bhowmik, J Dey, A Sarkar, S Karforma - IAES International Journal …, 2019 - academia.edu
The proposed technique dealt with the generation of n number of partial shares by creating
a unique frame structure by the dentist/physician. Additional feature has been proposed on …

Computational intelligence based neural session key generation on e-health system for ischemic heart disease information sharing

A Sarkar, J Dey, A Bhowmik, JK Mandal… - … Advances in Innovative …, 2019 - Springer
In this paper, session key exchange and authentication technique executing in parallel
fashion using the fine tuning of Two Tier Neural Network in wireless communication has …

Neural perceptron & strict lossless secret sharing oriented cryptographic science: fostering patients' security in the “new normal” COVID-19 E-Health

J Dey, A Bhowmik, S Karforma - Multimedia Tools and Applications, 2022 - Springer
Patients' data security is an open challenge on any telemedicine system. The challenge has
been extended enough in this unprecedented corona virus led pandemic. COVID-19 has …

Secure medical image transmission using deep neural network in e‐health applications

AA Alarood, M Faheem… - Healthcare …, 2023 - Wiley Online Library
Recently, medical technologies have developed, and the diagnosis of diseases through
medical images has become very important. Medical images often pass through the …

Tree parity machine guided patients' privileged based secure sharing of electronic medical record: cybersecurity for telehealth during COVID-19

A Sarkar, M Sarkar - Multimedia Tools and Applications, 2021 - Springer
In the COVID-19 pandemic, telehealth plays a significant role in the e-healthcare. E-health
security risks have also risen significantly with the rise in the use of telehealth. This paper …

A review on security and privacy of internet of medical things

MK Kagita, N Thilakarathne, TR Gadekallu… - Intelligent internet of …, 2022 - Springer
Abstract The Internet of Medical Things (IoMT) is increasing the accuracy, the reliability, and
the production capability of electronic devices by playing a very important part in the industry …

Secured session key-based e-health: Biometric blended with salp swarm protocol in telecare portals

A Sarkar, J Dey, S Karforma - Proceedings of the Global AI Congress 2019, 2020 - Springer
Technological emergence-based user-friendly systems have emerged to cope up the
security issues in online medical portals. The Government of India is doing loads of works on …