2018
DOI: 10.1007/978-981-13-1343-1_49
|View full text |Cite
|
Sign up to set email alerts
|

Energy Efficient Secured Sharing of Intraoral Gingival Information in Digital Way (EESS-IGI)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
7
1

Relationship

8
0

Authors

Journals

citations
Cited by 9 publications
(12 citation statements)
references
References 13 publications
0
12
0
Order By: Relevance
“…The key issue as stated in the earlier section has been addressed in this proposed paper. Structurally similar perceptrons are taken at the patient’s and the dentist’s Telecare system [ 8 , 9 ]. The input set and the random weight vectors are same at both ends to achieve the synchronization.…”
Section: Proposed Methodologymentioning
confidence: 99%
See 1 more Smart Citation
“…The key issue as stated in the earlier section has been addressed in this proposed paper. Structurally similar perceptrons are taken at the patient’s and the dentist’s Telecare system [ 8 , 9 ]. The input set and the random weight vectors are same at both ends to achieve the synchronization.…”
Section: Proposed Methodologymentioning
confidence: 99%
“…If the symmetric key used for encryption is somehow compromised by the attackers then the entire patients’ data will be leaked to the unauthorized agents. The implementation of artificial neural networks (ANN) [ 6 , 7 ] is a secure option for data transmission inside the Telecare E-Health system [ 8 , 9 ]. A perceptron is a type of artificial neural network which has been considered in this proposed technique.…”
Section: Introductionmentioning
confidence: 99%
“…Csirmaz L. et al [35] had investigated the secret online sharing methods. Sarkar A. et al [36] had used the gingival data transmission through secret sharing in the teledental domain. Their scheme has the resistance against the malicious attackers.…”
Section: Secret Sharingmentioning
confidence: 99%
“…The primary task is to decompose the binary file of any size into number of shares. And on the reverse terminal end, if we perform bitwise OR operation upon number of shares then only the original data will be reconstructed, not even upon ( − 1) shares [13]. Every share must have some missing bits and hence those missing bits can be replaced by ( − 1) shares exactly.…”
Section: Proposed Mask Generationmentioning
confidence: 99%