Hybrid optimization with cryptography encryption for medical image security in Internet of Things
Published 2018 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Hybrid optimization with cryptography encryption for medical image security in Internet of Things
Authors
Keywords
-
Journal
NEURAL COMPUTING & APPLICATIONS
Volume -, Issue -, Pages -
Publisher
Springer Nature America, Inc
Online
2018-10-10
DOI
10.1007/s00521-018-3801-x
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- On the protection of consumer genomic data in the Internet of Living Things
- (2018) Raffaele Pizzolante et al. COMPUTERS & SECURITY
- Internet of Things (IoT) in high-risk Environment, Health and Safety (EHS) industries: A comprehensive review
- (2018) Montbel Thibaud et al. DECISION SUPPORT SYSTEMS
- Improved grasshopper optimization algorithm using opposition-based learning
- (2018) Ahmed A. Ewees et al. EXPERT SYSTEMS WITH APPLICATIONS
- A hybrid model of Internet of Things and cloud computing to manage big data in health services applications
- (2018) Mohamed Elhoseny et al. Future Generation Computer Systems-The International Journal of eScience
- Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: A fog computing approach
- (2018) Amir M. Rahmani et al. Future Generation Computer Systems-The International Journal of eScience
- Unassisted thresholding based on multi-objective evolutionary algorithms
- (2018) Salvador Hinojosa et al. KNOWLEDGE-BASED SYSTEMS
- A machine learning model for improving healthcare services on cloud computing environment
- (2018) Ahmed Abdelaziz et al. MEASUREMENT
- Advances in Photopletysmography Signal Analysis for Biomedical Applications
- (2018) Jermana Moraes et al. SENSORS
- Enabling Technologies for the Internet of Health Things
- (2018) Joel J. P. C. Rodrigues et al. IEEE Access
- Secure and Robust Fragile Watermarking Scheme for Medical Images
- (2018) Abdulaziz Shehab et al. IEEE Access
- Effective Features to Classify Big Data Using Social Internet of Things
- (2018) S. K. Lakshmanaprabu et al. IEEE Access
- Enabling Technologies on Cloud of Things for Smart Healthcare
- (2018) Mukhtar M. E. Mahmoud et al. IEEE Access
- Secure Medical Data Transmission Model for IoT-Based Healthcare Systems
- (2018) Mohamed Elhoseny et al. IEEE Access
- A Reference Model for Internet of Things Middleware
- (2018) Mauro A. A. da Cruz et al. IEEE Internet of Things Journal
- Trust-based secure clustering in WSN-based intelligent transportation systems
- (2018) Tarek Gaber et al. Computer Networks
- A multi-level thresholding method for breast thermograms analysis using Dragonfly algorithm
- (2018) Margarita-Arimatea Díaz-Cortés et al. INFRARED PHYSICS & TECHNOLOGY
- Medical Image Security Using Dual Encryption with Oppositional Based Optimization Algorithm
- (2018) T. Avudaiappan et al. JOURNAL OF MEDICAL SYSTEMS
- Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview
- (2017) Junqing Zhang et al. Entropy
- Cross entropy based thresholding for magnetic resonance brain images using Crow Search Algorithm
- (2017) Diego Oliva et al. EXPERT SYSTEMS WITH APPLICATIONS
- Novel and powerful 3D adaptive crisp active contour method applied in the segmentation of CT lung images
- (2017) Pedro Pedrosa Rebouças Filho et al. MEDICAL IMAGE ANALYSIS
- Image segmentation by minimum cross entropy using evolutionary methods
- (2017) Diego Oliva et al. SOFT COMPUTING
- The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: opportunities, challenges, and open problems
- (2017) Ashraf Darwish et al. Journal of Ambient Intelligence and Humanized Computing
- RGB-Based Secure Share Creation in Visual Cryptography Using Optimal Elliptic Curve Cryptography Technique
- (2016) K. Shankar et al. JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS
- The Internet of Things for Health Care: A Comprehensive Survey
- (2015) S. M. Riazul Islam et al. IEEE Access
- DTLS based security and two-way authentication for the Internet of Things
- (2013) Thomas Kothmayr et al. Ad Hoc Networks
Add your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload NowCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now