A privacy-preserving cryptosystem for IoT E-healthcare
暂无分享,去创建一个
Paolo Bellavista | Zheng Yan | Khan Muhammad | Rafik Hamza | Faiza Titouna | P. Bellavista | Zheng Yan | Rafik Hamza | Faiza Titouna | Khandan Muhammad
[1] Khan Muhammad,et al. CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method , 2017, Multimedia Tools and Applications.
[2] Yicong Zhou,et al. Cascade Chaotic System With Applications , 2015, IEEE Transactions on Cybernetics.
[3] Saudi Arabia,et al. Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority , 2014 .
[4] Claude E. Shannon,et al. The mathematical theory of communication , 1950 .
[5] Sung Wook Baik,et al. Dual-Level Security based Cyclic18 Steganographic Method and its Application for Secure Transmission of Keyframes during Wireless Capsule Endoscopy , 2016, Journal of Medical Systems.
[6] Zhihan Lv,et al. Secure video summarization framework for personalized wireless capsule endoscopy , 2017, Pervasive Mob. Comput..
[7] Sung Wook Baik,et al. Image steganography using uncorrelated color space and its application for security of visual contents in online social networks , 2016, Future Gener. Comput. Syst..
[8] Yue Wu,et al. Image encryption using the two-dimensional logistic chaotic map , 2012, J. Electronic Imaging.
[9] Robert H. Deng,et al. Encrypted data processing with Homomorphic Re-Encryption , 2017, Inf. Sci..
[10] Robert H. Deng,et al. Trustworthy Authentication on Scalable Surveillance Video with Background Model Support , 2016, ACM Trans. Multim. Comput. Commun. Appl..
[11] Lingfeng Liu,et al. Pseudorandom sequence generator based on the Chen chaotic system , 2013, Comput. Phys. Commun..
[12] David H. Bailey,et al. High-precision floating-point arithmetic in scientific computation , 2004, Computing in Science & Engineering.
[13] Adnan Abdul-Aziz Gutub,et al. Counting-based secret sharing technique for multimedia applications , 2019, Multimedia Tools and Applications.
[14] L. Cardoza-Avendaño,et al. A novel pseudorandom number generator based on pseudorandomly enhanced logistic map , 2016, Nonlinear Dynamics.
[15] Khan Muhammad,et al. Hash Based Encryption for Keyframes of Diagnostic Hysteroscopy , 2018, IEEE Access.
[16] A. A-A Gutub,et al. Hybrid Crypto Hardware Utilizing Symmetric-Key and Public-Key Cryptosystems , 2012, 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT).
[17] Yicong Zhou,et al. Image encryption using 2D Logistic-adjusted-Sine map , 2016, Inf. Sci..
[18] Jim Harkin,et al. Cryptanalysis and Improvement of a Chaotic Map-Control-Based and the Plain Image-Related Cryptosystem , 2019 .
[19] Hong Zhao,et al. Multi-layer assignment steganography using graph-theoretic approach , 2014, Multimedia Tools and Applications.
[20] Jim Harkin,et al. Counteracting Dynamical Degradation of Digital Chaotic Chebyshev Map via Perturbation , 2017, Int. J. Bifurc. Chaos.
[21] Robert H. Deng,et al. Privacy-Preserving Data Processing with Flexible Access Control , 2020, IEEE Transactions on Dependable and Secure Computing.
[22] Chuan-Kuei Huang,et al. Multi chaotic systems based pixel shuffle for image encryption , 2009 .
[23] Wenhua Wang,et al. A Fast Color Image Encryption Algorithm Using 4-Pixel Feistel Structure , 2016, PloS one.
[24] Guanrong Chen,et al. On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps , 2005, Int. J. Bifurc. Chaos.
[25] Chin-Chen Chang,et al. Reversible Steganographic Method with High Payload for JPEG Images , 2008, IEICE Trans. Inf. Syst..
[26] Zhi-Hong Mao,et al. High-Throughput Finite Field Multipliers Using Redundant Basis for FPGA and ASIC Implementations , 2015, IEEE Transactions on Circuits and Systems I: Regular Papers.
[27] Junbeom Hur,et al. Scalable and efficient approach for secure group communication using proxy cryptography , 2012, Wirel. Networks.
[28] Afshan Mulla,et al. Probabilistic triangular shuffling approach in DWT based image compression scheme , 2015, 2015 International Conference on Communication, Information & Computing Technology (ICCICT).
[29] V. Konda,et al. Wireless Capsule Endoscopy , 2020, Geriatric Gastroenterology.
[30] Sung Wook Baik,et al. Visual saliency models for summarization of diagnostic hysteroscopy videos in healthcare systems , 2016, SpringerPlus.
[31] S. Agaian,et al. NPCR and UACI Randomness Tests for Image Encryption , 2011 .
[32] Rafik Hamza,et al. A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map , 2016, Inf. Secur. J. A Glob. Perspect..
[33] Adnan Abdul-Aziz Gutub,et al. Enhancing PC Data Security via Combining RSA Cryptography and Video Based Steganography , 2018 .
[34] Sung Wook Baik,et al. Secure Surveillance Framework for IoT Systems Using Probabilistic Image Encryption , 2018, IEEE Transactions on Industrial Informatics.
[35] Jian Weng,et al. AutoPrivacy: Automatic privacy protection and tagging suggestion for mobile social photo , 2018, Comput. Secur..
[36] Shiguo Lian,et al. A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system , 2012, J. Syst. Softw..
[37] Safya Belghith,et al. A novel image encryption scheme based on substitution-permutation network and chaos , 2016, Signal Process..
[38] Sirma Yavuz,et al. Security problems for a pseudorandom sequence generator based on the Chen chaotic system , 2013, Comput. Phys. Commun..
[39] Dawei Wang,et al. A novel lossless color image encryption scheme using 2 D DWT and 6 D hyperchaotic system , 2016 .
[40] Rafik Hamza,et al. A novel pseudo random sequence generator for image-cryptographic applications , 2017, J. Inf. Secur. Appl..
[41] Bin Wang,et al. Encryption Method Based on a New Secret Key Algorithm for Color Images , 2016 .
[42] Safya Belghith,et al. Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption , 2016, Nonlinear Dynamics.
[43] Sung Wook Baik,et al. A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image , 2015, Multimedia Tools and Applications.
[44] Kamlesh Gupta,et al. Novel Approach for fast Compressed Hybrid color image Cryptosystem , 2012, Adv. Eng. Softw..
[45] Vinod Patidar,et al. Image encryption using chaotic logistic map , 2006, Image Vis. Comput..