149 related articles for article (PubMed ID: 35571336)
1. Data Confidentiality in Healthcare Monitoring Systems Based on Image Steganography to Improve the Exchange of Patient Information Using the Internet of Things.
AlEisa HN
J Healthc Eng; 2022; 2022():7528583. PubMed ID: 35571336
[TBL] [Abstract][Full Text] [Related]
2. Quality optimized medical image information hiding algorithm that employs edge detection and data coding.
Al-Dmour H; Al-Ani A
Comput Methods Programs Biomed; 2016 Apr; 127():24-43. PubMed ID: 27000287
[TBL] [Abstract][Full Text] [Related]
3. Sensitive Patient Data Hiding using a ROI Reversible Steganography Scheme for DICOM Images.
Mantos PL; Maglogiannis I
J Med Syst; 2016 Jun; 40(6):156. PubMed ID: 27167526
[TBL] [Abstract][Full Text] [Related]
4. A novel fuzzy logic-based image steganography method to ensure medical data security.
Karakış R; Güler I; Çapraz I; Bilir E
Comput Biol Med; 2015 Dec; 67():172-83. PubMed ID: 26555746
[TBL] [Abstract][Full Text] [Related]
5. SABMIS: sparse approximation based blind multi-image steganography scheme.
Agrawal R; Ahuja K; Steinbach MC; Wick T
PeerJ Comput Sci; 2022; 8():e1080. PubMed ID: 36532802
[TBL] [Abstract][Full Text] [Related]
6. A review: a new authentication protocol for real-time healthcare monitoring system.
Dewangan K; Mishra M; Dewangan NK
Ir J Med Sci; 2021 Aug; 190(3):927-932. PubMed ID: 33145637
[TBL] [Abstract][Full Text] [Related]
7. Discrete wavelet transform and singular value decomposition based ECG steganography for secured patient information transmission.
Edward Jero S; Ramu P; Ramakrishnan S
J Med Syst; 2014 Oct; 38(10):132. PubMed ID: 25187409
[TBL] [Abstract][Full Text] [Related]
8. An Integrated Approach Using Chaotic Map & Sample Value Difference Method for Electrocardiogram Steganography and OFDM Based Secured Patient Information Transmission.
Pandey A; Saini BS; Singh B; Sood N
J Med Syst; 2017 Oct; 41(12):187. PubMed ID: 29043502
[TBL] [Abstract][Full Text] [Related]
9. Diagonal queue medical image steganography with Rabin cryptosystem.
Jain M; Lenka SK
Brain Inform; 2016 Mar; 3(1):39-51. PubMed ID: 27747599
[TBL] [Abstract][Full Text] [Related]
10. A morphologically robust chaotic map based approach to embed patient's confidential data securely in non-QRS regions of ECG signal.
Soni N; Saini I; Singh B
Australas Phys Eng Sci Med; 2019 Mar; 42(1):111-135. PubMed ID: 30617778
[TBL] [Abstract][Full Text] [Related]
11. Confidentiality in medical images through a genetic-based steganography algorithm in artificial intelligence.
Vazquez E; Torres S; Sanchez G; Avalos JG; Abarca M; Frias T; Juarez E; Trejo C; Hernandez D
Front Robot AI; 2022; 9():1031299. PubMed ID: 36274913
[TBL] [Abstract][Full Text] [Related]
12. A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices.
Almomani I; Alkhayer A; El-Shafai W
Sensors (Basel); 2022 Mar; 22(6):. PubMed ID: 35336452
[TBL] [Abstract][Full Text] [Related]
13. Lossless Image Steganography Based on Invertible Neural Networks.
Liu L; Tang L; Zheng W
Entropy (Basel); 2022 Dec; 24(12):. PubMed ID: 36554167
[TBL] [Abstract][Full Text] [Related]
14. A Robust Quasi-Quantum Walks-Based Steganography Protocol for Secure Transmission of Images on Cloud-Based E-healthcare Platforms.
Abd-El-Atty B; Iliyasu AM; Alaskar H; Abd El-Latif AA
Sensors (Basel); 2020 May; 20(11):. PubMed ID: 32486383
[TBL] [Abstract][Full Text] [Related]
15. Double layer steganography technique using DNA sequences and images.
Aljahdali AO; Al-Harbi OA
PeerJ Comput Sci; 2023; 9():e1379. PubMed ID: 37346596
[TBL] [Abstract][Full Text] [Related]
16. An efficient steganography method for hiding patient confidential information.
Al-Dmour H; Al-Ani A; Nguyen H
Annu Int Conf IEEE Eng Med Biol Soc; 2014; 2014():222-5. PubMed ID: 25569937
[TBL] [Abstract][Full Text] [Related]
17. Double layer security using crypto-stego techniques: a comprehensive review.
Jan A; Parah SA; Hussan M; Malik BA
Health Technol (Berl); 2022; 12(1):9-31. PubMed ID: 34660167
[TBL] [Abstract][Full Text] [Related]
18. A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image.
Rahman S; Uddin J; Hussain H; Ahmed A; Khan AA; Zakarya M; Rahman A; Haleem M
Sci Rep; 2023 Aug; 13(1):14183. PubMed ID: 37648738
[TBL] [Abstract][Full Text] [Related]
19. An Efficient and Provable Secure Certificate-Based Combined Signature, Encryption and Signcryption Scheme for Internet of Things (IoT) in Mobile Health (M-Health) System.
Ullah I; Amin NU; Khan MA; Khattak H; Kumari S
J Med Syst; 2020 Nov; 45(1):4. PubMed ID: 33247388
[TBL] [Abstract][Full Text] [Related]
20. Accelerating Health Data Sharing: A Solution Based on the Internet of Things and Distributed Ledger Technologies.
Zheng X; Sun S; Mukkamala RR; Vatrapu R; Ordieres-Meré J
J Med Internet Res; 2019 Jun; 21(6):e13583. PubMed ID: 31172963
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]