2019
DOI: 10.11591/ijeecs.v14.i1.pp178-184
|View full text |Cite
|
Sign up to set email alerts
|

Neural soft computing based secured transmission of intraoral gingivitis image in e-health care

Abstract: <p><em> </em>In this paper, a key based soft computing transmission of intraoral<strong> </strong>gingivitis image has been proposed without the exchange of common key in between the nodes. Gingivitis has been a type of periodontal disease caused due to bacterial colonization inside the mouth, having the early signs of gum bleeding and inflammations in human beings. In E-health care strata, online transmission of such intraoral images with secured encryption technique is needed. S… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
1
1

Relationship

4
5

Authors

Journals

citations
Cited by 31 publications
(22 citation statements)
references
References 9 publications
(11 reference statements)
0
22
0
Order By: Relevance
“…The key issue as stated in the earlier section has been addressed in this proposed paper. Structurally similar perceptrons are taken at the patient’s and the dentist’s Telecare system [ 8 , 9 ]. The input set and the random weight vectors are same at both ends to achieve the synchronization.…”
Section: Proposed Methodologymentioning
confidence: 99%
See 1 more Smart Citation
“…The key issue as stated in the earlier section has been addressed in this proposed paper. Structurally similar perceptrons are taken at the patient’s and the dentist’s Telecare system [ 8 , 9 ]. The input set and the random weight vectors are same at both ends to achieve the synchronization.…”
Section: Proposed Methodologymentioning
confidence: 99%
“…If the symmetric key used for encryption is somehow compromised by the attackers then the entire patients’ data will be leaked to the unauthorized agents. The implementation of artificial neural networks (ANN) [ 6 , 7 ] is a secure option for data transmission inside the Telecare E-Health system [ 8 , 9 ]. A perceptron is a type of artificial neural network which has been considered in this proposed technique.…”
Section: Introductionmentioning
confidence: 99%
“…Their technique seems to be very powerful on linear configurations. Sarkar A. et al [33] had proposed soft computing on neural networks for the intraoral information sharing in the electronic medical field. Bhowmik A. et al [34] had proposed a symmetric key based secret sharing of information.…”
Section: Secret Sharingmentioning
confidence: 99%
“…Kinzel and Kanter [26] and Ruttor et al [42] described that a chance of an attack is declining if the network's weight range get increases and the assailant's calculation cost increases, as its effort increases exponentially, as users' effort becomes polynomial. Sarkar and Mandal [44], Sarkar et al [48], Sarkar et al [46], Sarkar and Mandal [45], Sarkar et al [47] proposed schemes which enhanced the security of the protocol by enhancing the synaptic depths of TPM and henceforth counteracting the attacks of the brute power of the attacker. It is found that the amount of security provided by the TPM synchronization also can be improved by introducing a large set of neurons and entries of each neuron in the hidden layers.…”
Section: Related Workmentioning
confidence: 99%