2019 16th International Computer Conference on Wavelet Active Media Technology and Information Processing 2019
DOI: 10.1109/iccwamtip47768.2019.9067592
|View full text |Cite
|
Sign up to set email alerts
|

Medical Image Encryption Into Smart Healthcare IOT System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 13 publications
0
5
0
Order By: Relevance
“…Khan et al [21] proposed medical image encryption in smart healthcare IoT systems. This project aims to secure medical data via image encryption.…”
Section: Literature Surveymentioning
confidence: 99%
“…Khan et al [21] proposed medical image encryption in smart healthcare IoT systems. This project aims to secure medical data via image encryption.…”
Section: Literature Surveymentioning
confidence: 99%
“…UAV communication link [35] The wireless networking technology called MAVLink (short for Micro Air Vehicle Link) enables entities to communicate with one another. Bidirectional communication between a ground control station and a drone is possible through the use of this technology [36]. The GCS instructs and controls the drone, while the drone feeds telemetry and status data back to the GCS.…”
Section: Fig 1 Mavlink Security Attacks [31] Security Of Drone Commun...mentioning
confidence: 99%
“…There is a limit to how far an unmanned aerial vehicle can fly if there is a high packet loss rate. Figure 3 [36]depicts the overall process.…”
Section: Fig 1 Mavlink Security Attacks [31] Security Of Drone Commun...mentioning
confidence: 99%
“…This rapid advancement in IoT technology facilitates the patients to get consulted by clinicians worldwide. Patient information like X-rays, scan report, clinical test reports etc., can be forwarded via internet while most of the clinical data remain in image format [1]. In general, information communicated via internet is prone to attacks and vulnerabilities.…”
Section: Introductionmentioning
confidence: 99%