The importance of image security in the field of medical imaging is challenging. Several research works have been conducted to secure medical healthcare images. Encryption, not risking loss of data, is the right solution for image confidentiality. Due to data size limitations, redundancy, and capacity, traditional encryption techniques cannot be applied directly to e-health data, especially when patient data are transferred over the open channels. Therefore, patients may lose the privacy of data contents since images are different from the text because of their two particular factors of loss of data and confidentiality.Researchers have identified such security threats and have proposed several image encryption techniques to mitigate the security problem. However, the study has found that the existing proposed techniques still face application-specific several security problems. Therefore, this paper presents an efficient, lightweight encryption algorithm to develop a secure image encryption technique for the healthcare industry. The proposed lightweight encryption technique employs two permutation techniques to secure medical images. The proposed technique is analyzed, evaluated, and then compared to conventionally encrypted ones in security and execution time. Numerous test images have been used to determine the performance of the proposed algorithm. Several experiments show that the proposed algorithm for image cryptosystems provides better efficiency than conventional techniques.INDEX TERMS Internet of Medical Things, medical image encryption, lightweight encryption.
The Industrial Internet of things (IIoT) helps several applications that require power control and low cost to achieve long life. The progress of IIoT communications, mainly based on cognitive radio (CR), has been guided to the robust network connectivity. The low power communication is achieved for IIoT sensors applying the Low Power Wide Area Network (LPWAN) with the Sigfox, NBIoT, and LoRaWAN technologies. This paper aims to review the various technologies and protocols for industrial IoT applications. A depth of assessment has been achieved by comparing various technologies considering the key terms such as frequency, data rate, power, coverage, mobility, costing, and QoS. This paper provides an assessment of 64 articles published on electricity control problems of IIoT between 2007 and 2020. That prepares a qualitative technique of answering the research questions (RQ): RQ1: “How cognitive radio engage with the industrial IoT?”, RQ2: “What are the Proposed architectures that Support Cognitive Radio LPWAN based IIOT?”, and RQ3: What key success factors need to comply for reliable CIIoT support in the industry?”. With the systematic literature assessment approach, the effects displayed on the cognitive radio in LPWAN can significantly revolute the commercial IIoT. Thus, researchers are more focused in this regard. The study suggests that the essential factors of design need to be considered to conquer the critical research gaps of the existing LPWAN cognitive-enabled IIoT. A cognitive low energy architecture is brought to ensure efficient and stable communications in a heterogeneous IIoT. It will protect the network layer from offering the customers an efficient platform to rent AI, and various LPWAN technology were explored and investigated.
E-commerce implies an electronic purchasing and marketing process online by using typical Web browsers. As e-commerce is quickly developing on the planet, particularly in recent years, many areas of life are affected, particularly the improvement in how individuals regulate themselves non-financially and financially in different transactions. In electronic payment or e-commerce payment, the gateway is a major component of the structure to assure that such exchanges occur without disputes, while maintaining the common security over such systems. Most Internet payment gateways in e-commerce provide monetary information to customers using trusted third parties directly to a payment gateway. Nonetheless, it is recognized that the cloud Web server is not considered a protected entity. This article aims to develop an efficient and secure electronic payment protocol for e-commerce where consumers can immediately connect with the merchant properly. Interestingly, the proposed system does not require the customer to input his/her identity in the merchant’s website even though the customer can hide his/her identity and make a temporary identity to perform the service. It has been found that our protocol has much improved security effectiveness in terms of confidentiality, integrity, non-repudiation, anonymity availability, authentication, and authorization.
Modern technology is turning into an essential element in the financial trade. We focus the emphasis of this review on the research on the E-wallet and online payment, which is an element of an electric payment system, to get the pattern of using this service. This research presents a review of 131 research articles published on electronic payment between 2010 and 2020 that uses a qualitative method of answering the research questions (RQ): RQ1: “What are the major security issues regarding using electronic payments”? and RQ2: “What security properties need to comply for secure electronic payments?” With the systematic literature review approach, the results show that interest in E-wallet and online payment has grown significantly during this period, and it was found that for the increasing uses of electronic payments, researchers are more focused on security issues. The results show that, to conquer the key gaps, electronic payment must have some protection properties, namely, availability, authorization, integrity, non-repudiation, authentication, and confidentiality. Nowadays, security problems in electronic payment are usually more demanding than the present security problems on the web. These findings can enable electric transaction providers to strengthen their security methods by boosting their security gaps, as required for relevant services.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.