Found: 59
Select item for more details and to access through your institution.
Con(dif)fused voice to convey secret: a dual-domain approach.
- Published in:
- Multimedia Systems, 2020, v. 26, n. 3, p. 301, doi. 10.1007/s00530-019-00644-6
- By:
- Publication type:
- Article
A Systematic Review of Artificial Intelligence (AI) Based Approaches for the Diagnosis of Parkinson's Disease.
- Published in:
- Archives of Computational Methods in Engineering, 2022, v. 29, n. 6, p. 3639, doi. 10.1007/s11831-022-09710-1
- By:
- Publication type:
- Article
SLAKA_CPS: Secured lightweight authentication and key agreement protocol for reliable communication among heterogenous devices in cyber-physical system framework.
- Published in:
- Peer-to-Peer Networking & Applications, 2024, v. 17, n. 5, p. 2675, doi. 10.1007/s12083-024-01719-6
- By:
- Publication type:
- Article
A simple embed over encryption scheme for DICOM images using Bülban Map.
- Published in:
- Medical & Biological Engineering & Computing, 2022, v. 60, n. 3, p. 701, doi. 10.1007/s11517-021-02499-4
- By:
- Publication type:
- Article
ROI-based medical image watermarking for accurate tamper detection, localisation and recovery.
- Published in:
- 2021
- By:
- Publication type:
- journal article
An efficient medical image encryption using hybrid DNA computing and chaos in transform domain.
- Published in:
- Medical & Biological Engineering & Computing, 2021, v. 59, n. 3, p. 589, doi. 10.1007/s11517-021-02328-8
- By:
- Publication type:
- Article
A robust medical image encryption in dual domain: chaos-DNA-IWT combined approach.
- Published in:
- 2020
- By:
- Publication type:
- journal article
Healthcare with datacare—a triangular DNA security.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 7, p. 21153, doi. 10.1007/s11042-023-16303-y
- By:
- Publication type:
- Article
Cartesian coordinated adaptive hiding for payload peaking.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 6, p. 17135, doi. 10.1007/s11042-023-16208-w
- By:
- Publication type:
- Article
Design and development of reversible data hiding- homomorphic encryption & rhombus pattern prediction approach.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 30, p. 46269, doi. 10.1007/s11042-023-15455-1
- By:
- Publication type:
- Article
Pullikolam assisted medical image watermarking on reconfigurable hardware.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 14, p. 21193, doi. 10.1007/s11042-023-14725-2
- By:
- Publication type:
- Article
A novel colour image encryption scheme using dynamic DNA coding, chaotic maps, and SHA-2.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 26, p. 37873, doi. 10.1007/s11042-022-13095-5
- By:
- Publication type:
- Article
On Chaos based duo confusion duo diffusion for colour images.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 12, p. 16987, doi. 10.1007/s11042-022-12471-5
- By:
- Publication type:
- Article
Design of tri-layer image encryption scheme using Calendar Month Vowel Count (CMVC) approach.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 7, p. 10337, doi. 10.1007/s11042-022-11930-3
- By:
- Publication type:
- Article
Misconstrued voice on SC-FDMA for secured comprehension - a cooperative influence of DWT and ECC.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 5, p. 7201, doi. 10.1007/s11042-022-11996-z
- By:
- Publication type:
- Article
On dual encryption with RC6 and combined logistic tent map for grayscale and DICOM.
- Published in:
- Multimedia Tools & Applications, 2021, v. 80, n. 15, p. 23511, doi. 10.1007/s11042-021-10943-8
- By:
- Publication type:
- Article
A new method for producing 320-bit modified hash towards tamper detection and restoration in colour images.
- Published in:
- Multimedia Tools & Applications, 2021, v. 80, n. 15, p. 23359, doi. 10.1007/s11042-020-10210-2
- By:
- Publication type:
- Article
Uncover the cover to recover the hidden secret - A separable reversible data hiding framework.
- Published in:
- Multimedia Tools & Applications, 2021, v. 80, n. 13, p. 19695, doi. 10.1007/s11042-021-10729-y
- By:
- Publication type:
- Article
Genetic and chaotic signatures in offspring – an encrypted generation of image family.
- Published in:
- Multimedia Tools & Applications, 2021, v. 80, n. 6, p. 8581, doi. 10.1007/s11042-020-09978-0
- By:
- Publication type:
- Article
Tri-level scrambling and enhanced diffusion for DICOM image cipher- DNA and chaotic fused approach.
- Published in:
- Multimedia Tools & Applications, 2020, v. 79, n. 39/40, p. 28807, doi. 10.1007/s11042-020-09501-5
- By:
- Publication type:
- Article
ECC joins first time with SC-FDMA for Mission "security".
- Published in:
- Multimedia Tools & Applications, 2020, v. 79, n. 25/26, p. 17945, doi. 10.1007/s11042-020-08610-5
- By:
- Publication type:
- Article
FPGA based generic RO TRNG architecture for image confusion.
- Published in:
- Multimedia Tools & Applications, 2020, v. 79, n. 19/20, p. 13841, doi. 10.1007/s11042-019-08592-z
- By:
- Publication type:
- Article
Image encryption through RNA approach assisted with neural key sequences.
- Published in:
- Multimedia Tools & Applications, 2020, v. 79, n. 17/18, p. 12093, doi. 10.1007/s11042-019-08562-5
- By:
- Publication type:
- Article
A cloud compatible DNA coded security solution for multimedia file sharing & storage.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 23, p. 33837, doi. 10.1007/s11042-019-08166-z
- By:
- Publication type:
- Article
Indicator-based lightweight steganography on 32-bit RISC architectures for IoT security.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 22, p. 31485, doi. 10.1007/s11042-019-07960-z
- By:
- Publication type:
- Article
YRBS coding with logistic map – a novel Sanskrit aphorism and chaos for image encryption.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 8, p. 10513, doi. 10.1007/s11042-018-6574-4
- By:
- Publication type:
- Article
Open hiding for truncating hackers - a block truncation and wavelet approach.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 8, p. 9951, doi. 10.1007/s11042-018-6549-5
- By:
- Publication type:
- Article
Networked hardware assisted key image and chaotic attractors for secure RGB image communication.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 18, p. 23449, doi. 10.1007/s11042-017-5566-0
- By:
- Publication type:
- Article
Chaos triggered image encryption - a reconfigurable security solution.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 10, p. 11669, doi. 10.1007/s11042-017-4811-x
- By:
- Publication type:
- Article
Transreceiving of encrypted medical image - a cognitive approach.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 7, p. 8393, doi. 10.1007/s11042-017-4741-7
- By:
- Publication type:
- Article
Design, Simulation and Hardware Implementation of Shunt Hybrid Compensator Using Synchronous Rotating Reference Frame (SRRF)-Based Control Technique.
- Published in:
- Electronics (2079-9292), 2019, v. 8, n. 1, p. 42, doi. 10.3390/electronics8010042
- By:
- Publication type:
- Article
A novel exploratory hybrid deep neural network to predict breast cancer for mammography based on wavelet features.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 24, p. 65441, doi. 10.1007/s11042-023-18012-y
- By:
- Publication type:
- Article
Neural Attractor-Based Adaptive Key Generator with DNA-Coded Security and Privacy Framework for Multimedia Data in Cloud Environments.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 8, p. 1769, doi. 10.3390/math11081769
- By:
- Publication type:
- Article
Non-Identical Inverter Rings as an Entropy Source: NIST-90B-Verified TRNG Architecture on FPGAs for IoT Device Integrity.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 4, p. 1049, doi. 10.3390/math11041049
- By:
- Publication type:
- Article
Dual-Domain Image Encryption in Unsecure Medium—A Secure Communication Perspective.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 2, p. 457, doi. 10.3390/math11020457
- By:
- Publication type:
- Article
Reconfigurable Metasurface: Enabling Tunable Reflection in 6G Wireless Communications.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 22, p. 9166, doi. 10.3390/s23229166
- By:
- Publication type:
- Article
Entropy Influenced RNA Diffused Quantum Chaos to Conserve Medical Data Privacy.
- Published in:
- International Journal of Theoretical Physics, 2019, v. 58, n. 6, p. 1937, doi. 10.1007/s10773-019-04088-6
- By:
- Publication type:
- Article
LAPE<sup>2</sup>D: Lightweight Authentication Protocol to Secure End and Edge Devices in Iot Framework.
- Published in:
- Wireless Personal Communications, 2023, v. 131, n. 3, p. 2217, doi. 10.1007/s11277-023-10539-5
- By:
- Publication type:
- Article
Chaos and DNA Blended Hybrid Encryption Algorithm for Secure Image Transmission over DCT Pre-coded OFDM.
- Published in:
- Wireless Personal Communications, 2023, v. 129, n. 1, p. 703, doi. 10.1007/s11277-022-10152-y
- By:
- Publication type:
- Article
Telugu DNA for Safe Delivery: A Secured Text Communication.
- Published in:
- Wireless Personal Communications, 2022, v. 127, n. 4, p. 2873, doi. 10.1007/s11277-022-09901-w
- By:
- Publication type:
- Article
Real Time Authenticated Spectrum Access and Encrypted Image Transmission via Cloud Enabled Fusion centre.
- Published in:
- Wireless Personal Communications, 2020, v. 115, n. 3, p. 2127, doi. 10.1007/s11277-020-07674-8
- By:
- Publication type:
- Article
Hybrid Random Number Generation Architecture for Mobile Registration Controller: A Reconfigurable Hardware Realization.
- Published in:
- Wireless Personal Communications, 2020, v. 115, n. 1, p. 239, doi. 10.1007/s11277-020-07569-8
- By:
- Publication type:
- Article
Tamper Proofing Identification and Authenticated DICOM Image Transmission Using Wireless Channels and CR Network.
- Published in:
- Wireless Personal Communications, 2017, v. 97, n. 4, p. 5573, doi. 10.1007/s11277-017-4795-x
- By:
- Publication type:
- Article
Enhancing pneumonia detection with masked neural networks: a deep learning approach.
- Published in:
- Neural Computing & Applications, 2024, v. 36, n. 29, p. 18433, doi. 10.1007/s00521-024-10185-3
- By:
- Publication type:
- Article
Robust respiratory disease classification using breathing sounds (RRDCBS) multiple features and models.
- Published in:
- Neural Computing & Applications, 2022, v. 34, n. 10, p. 8155, doi. 10.1007/s00521-022-06915-0
- By:
- Publication type:
- Article
Neural-assisted image-dependent encryption scheme for medical image cloud storage.
- Published in:
- Neural Computing & Applications, 2021, v. 33, n. 12, p. 6671, doi. 10.1007/s00521-020-05447-9
- By:
- Publication type:
- Article
Let wavelet authenticate and tent-map encrypt: a sacred connect against a secret nexus.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2024, v. 28, n. 9/10, p. 6839, doi. 10.1007/s00500-023-09580-0
- By:
- Publication type:
- Article
Advanced framework for highly secure and cloud‐based storage of colour images.
- Published in:
- IET Image Processing (Wiley-Blackwell), 2020, v. 14, n. 13, p. 3143, doi. 10.1049/iet-ipr.2018.5654
- By:
- Publication type:
- Article
Ring oscillator as confusion – diffusion agent: a complete TRNG drove image security.
- Published in:
- IET Image Processing (Wiley-Blackwell), 2020, v. 14, n. 13, p. 2987, doi. 10.1049/iet-ipr.2019.0168
- By:
- Publication type:
- Article
Chua's diode and strange attractor: a three‐layer hardware–software co‐design for medical image confidentiality.
- Published in:
- IET Image Processing (Wiley-Blackwell), 2020, v. 14, n. 7, p. 1354, doi. 10.1049/iet-ipr.2019.0562
- By:
- Publication type:
- Article