2021
DOI: 10.1109/access.2021.3061710
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight Encryption Technique to Enhance Medical Image Security on Internet of Medical Things Applications

Abstract: The importance of image security in the field of medical imaging is challenging. Several research works have been conducted to secure medical healthcare images. Encryption, not risking loss of data, is the right solution for image confidentiality. Due to data size limitations, redundancy, and capacity, traditional encryption techniques cannot be applied directly to e-health data, especially when patient data are transferred over the open channels. Therefore, patients may lose the privacy of data contents since… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
44
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4

Relationship

3
5

Authors

Journals

citations
Cited by 129 publications
(44 citation statements)
references
References 48 publications
(63 reference statements)
0
44
0
Order By: Relevance
“…is section examines earlier work in data encryption in terms of power consumption, processing speed, data type, throughput, avalanche effect, and packet size. is section reviews the literature in cryptography algorithms [18][19][20][26][27][28][29][30][31][32][33][34][35][36][37][38][39][40][41][42][43]. Internet of ings (IoT) has made it imperative to have several devices on a network.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…is section examines earlier work in data encryption in terms of power consumption, processing speed, data type, throughput, avalanche effect, and packet size. is section reviews the literature in cryptography algorithms [18][19][20][26][27][28][29][30][31][32][33][34][35][36][37][38][39][40][41][42][43]. Internet of ings (IoT) has made it imperative to have several devices on a network.…”
Section: Related Workmentioning
confidence: 99%
“…e large size of the network of devices and anonymous or uncontrolled Internet structure is imperative to consider. Protecting data and communication systems is essential in IoT security [26][27][28][29][30][31][32][33][34][35][36][37][38][39][40][41][42][43].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors mention that it is fair to build a new model that uses multiple queries or tail queries, taking in the position, local time, user agent, etc. (35)(36)(37)(38)(39)(40).…”
Section: Literature Reviewmentioning
confidence: 99%
“…Certain research has also been done to determine alterations occurring in Parahippocampal Cigumul bundle (PhC) and Posterior Cingulum bundle (PoC) in patients suffering from Mild Cognitive Impairment (MCI) (21,22). This was done through diffusion tensor imaging (23)(24)(25)(26)(27)(28). An atlas-based Region-Of-Interest (ROI) was used to calculate the fractional anisotropy, mean diffusivity, axial diffusivity, and radial diffusivity.…”
Section: Introductionmentioning
confidence: 99%