2023
DOI: 10.1109/tii.2022.3194590
|View full text |Cite
|
Sign up to set email alerts
|

Medical Image Encryption by Content-Aware DNA Computing for Secure Healthcare

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
34
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 111 publications
(34 citation statements)
references
References 28 publications
0
34
0
Order By: Relevance
“…According to [40], 6G-based intelligent cybersecurity will lead to new techniques; some of these are given below. Finally, several studies have focused on detection performance in mobile environments [2], which is important for enhancing cybersecurity, encrypting medical images against various threats when transmitting data via wireless broadcasting [41], and using deep-learning algorithms in segmentation tasks with various kinds of networks [42].…”
Section: Literature Reviewmentioning
confidence: 99%
“…According to [40], 6G-based intelligent cybersecurity will lead to new techniques; some of these are given below. Finally, several studies have focused on detection performance in mobile environments [2], which is important for enhancing cybersecurity, encrypting medical images against various threats when transmitting data via wireless broadcasting [41], and using deep-learning algorithms in segmentation tasks with various kinds of networks [42].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Wu et al [21] proposed fast object recognition and picture enhancement tasks may be completed using an edge computing and multitask-driven architecture. To encrypt medical pictures and protect patient privacy and the healthcare environment, Wu et al [22] presented a unique content-aware deoxyribonucleic acid (DNA) computer system. A two-stage DL model for effective NIDS was proposed by Khan et al [23] using stacked autoencoder with softmax for classification.…”
Section: Literature Reviewmentioning
confidence: 99%
“…For example, chaotic sequences are generated by chaotic systems to provide pseudo-randomness for the encryption scheme, confusion and diffusion are realized by traditional Fridrich structures; [10][11][12][13] the content in medical images is discriminated to partially encrypt the visually effective part; [14] partial encryption of the part of interest is realized by combining with deep-learning encryption and decryption networks; [2] and a new content-aware DNA computing algorithm is designed to encrypt medical images and other algorithms. [15] All these schemes can protect the communication security of medical images, but in the realization of application scenarios, all users get the same visual level of decrypted images. The currently proposed schemes do not differentiate the decryption process for users with diverse security levels, which makes these users get the decrypted images with same visual levels.…”
Section: Introductionmentioning
confidence: 99%