2022
DOI: 10.36909/jer.17853
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic smart random preference for higher medical image confidentiality

Abstract: It is essential to secure the information to store or transfer medical digital files without destruction. Currently, all used e-health files requests to be utilized in well-controlled, protected, and dependable style avoiding breaches and hacking. This research focuses on medical confidentiality encrypting grayscale health images for comfortable safe utilization. The work depends on resilience randomization and XOR operations for its medical-image cryptography. It tests performance of some random generators co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(5 citation statements)
references
References 25 publications
0
5
0
Order By: Relevance
“…The architecture is designed with both available resources and the specific characteristics of a group of people with a different perspective 25–28 . Most of the consumer utilizes IoT application with intellectual ability to form their life more comfortable, and they typically intercommunicate with IoT devices via experiential interfaces offered by the edge or cloud instead of interacting with IoT devices.…”
Section: Edge Computing Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…The architecture is designed with both available resources and the specific characteristics of a group of people with a different perspective 25–28 . Most of the consumer utilizes IoT application with intellectual ability to form their life more comfortable, and they typically intercommunicate with IoT devices via experiential interfaces offered by the edge or cloud instead of interacting with IoT devices.…”
Section: Edge Computing Architecturementioning
confidence: 99%
“…The architecture is designed with both available resources and the specific characteristics of a group of people with a different perspective. [25][26][27][28] Most of the consumer utilizes IoT application with intellectual ability to form their life more comfortable, and they typically…”
Section: Edge-centric Iot Architecturementioning
confidence: 99%
“…The work enjoyed high capacity on the price of speed, needing to check all the watermarked text. These watermarking analyses need to be tested further in future studies, as their performance tuned to utilizing both strategies of image watermarking semi-authentication (Gutub, 2022a) and dynamic smart preference for medical image confidentiality (Gutub, 2022b) which can innovate enhancement attractive opportunities.…”
Section: Remarks and Conclusionmentioning
confidence: 99%
“…Among the primary responsibilities of the healthcare sector collection of patient data is keeping the collected data confidential, used lawfully and sensitively secure. After data collection, the next step is the simultaneous sharing of sensitive data with the patients and the intended staff of the hospital caring (Gutub, 2022b). As the information is confidential and private needing information sharing, the security of private materials is considered basic requirement in the healthcare systems, which implies that medical systems must use up-to-date confidentiality technologies (Gutub, 2022c).…”
Section: Introductionmentioning
confidence: 99%
“…Steganography has become one the most popular methods for information hiding because of its simplicity and easy communication through already existing technology and communication channels like IP cameras, smartphones, and social media apps like WeChat, WhatsApp, Telegram, Signal, etc. without any extra cost of additional infrastructures like private key sharing or private communication channels, etc. There have been various works which have not included deep learning in their work, however, have contributed in the field of watermarking and steganography (Hassaballah et al, 2020;Gutub and Al-Ghamdi, 2020;Gutub and Al-Roithy, 2021;Hassan and Gutub, 2021;Al-Roithy and Gutub, 2021;AlKhodaidi and Gutub, 2021;Hameed, Abdel-Aleem and Hassaballah, 2022;Gutub, 2022aGutub, , 2022b.…”
Section: Introductionmentioning
confidence: 99%