• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4598979)   Today's Articles (1)   Subscriber (49356)
For: Muhammad K, Sajjad M, Baik SW. Dual-Level Security based Cyclic18 Steganographic Method and its Application for Secure Transmission of Keyframes during Wireless Capsule Endoscopy. J Med Syst 2016;40:114. [PMID: 26995355 DOI: 10.1007/s10916-016-0473-x] [Citation(s) in RCA: 56] [Impact Index Per Article: 7.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/09/2016] [Accepted: 03/07/2016] [Indexed: 01/02/2023]
Number Cited by Other Article(s)
1
Makhdoom I, Abolhasan M, Lipman J. A comprehensive survey of covert communication techniques, limitations and future challenges. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102784] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/03/2022]
2
Image Data Security Mechanism Based on the Internet of Things Cardiac Catheterization Laboratory Information Management System Research and Design. JOURNAL OF HEALTHCARE ENGINEERING 2021;2021:5592185. [PMID: 33884159 PMCID: PMC8041532 DOI: 10.1155/2021/5592185] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/11/2021] [Revised: 02/24/2021] [Accepted: 03/12/2021] [Indexed: 11/29/2022]
3
Muhammad K, Khan S, Ser JD, Albuquerque VHCD. Deep Learning for Multigrade Brain Tumor Classification in Smart Healthcare Systems: A Prospective Survey. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS 2021;32:507-522. [PMID: 32603291 DOI: 10.1109/tnnls.2020.2995800] [Citation(s) in RCA: 81] [Impact Index Per Article: 27.0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/20/2023]
4
GSAPSO-MQC:medical image encryption based on genetic simulated annealing particle swarm optimization and modified quantum chaos system. EVOLUTIONARY INTELLIGENCE 2020. [DOI: 10.1007/s12065-020-00440-6] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
5
A privacy-preserving cryptosystem for IoT E-healthcare. Inf Sci (N Y) 2020. [DOI: 10.1016/j.ins.2019.01.070] [Citation(s) in RCA: 93] [Impact Index Per Article: 23.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/23/2022]
6
Efficient CNN based summarization of surveillance videos for resource-constrained devices. Pattern Recognit Lett 2020. [DOI: 10.1016/j.patrec.2018.08.003] [Citation(s) in RCA: 38] [Impact Index Per Article: 9.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
7
Bashir A, Mir AH. Secure Framework for Internet of Things Based e-Health System. INTERNATIONAL JOURNAL OF E-HEALTH AND MEDICAL COMMUNICATIONS 2019. [DOI: 10.4018/ijehmc.2019100102] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/08/2022]
8
Das S, Muhammad K, Bakshi S, Mukherjee I, K Sa P, Sangaiah AK, Bruno A. Lip biometric template security framework using spatial steganography. Pattern Recognit Lett 2019. [DOI: 10.1016/j.patrec.2018.06.026] [Citation(s) in RCA: 12] [Impact Index Per Article: 2.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/28/2022]
9
CNN-based anti-spoofing two-tier multi-factor authentication system. Pattern Recognit Lett 2019. [DOI: 10.1016/j.patrec.2018.02.015] [Citation(s) in RCA: 65] [Impact Index Per Article: 13.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/23/2022]
10
Dynamic improved pixel value ordering reversible data hiding. Inf Sci (N Y) 2019. [DOI: 10.1016/j.ins.2019.03.032] [Citation(s) in RCA: 81] [Impact Index Per Article: 16.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/19/2022]
11
A reversible and secure patient information hiding system for IoT driven e-health. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2019. [DOI: 10.1016/j.ijinfomgt.2018.09.008] [Citation(s) in RCA: 45] [Impact Index Per Article: 9.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
12
Rahman MS, Khalil I, Yi X. A lossless DNA data hiding approach for data authenticity in mobile cloud based healthcare systems. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2019. [DOI: 10.1016/j.ijinfomgt.2018.08.011] [Citation(s) in RCA: 8] [Impact Index Per Article: 1.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/28/2022]
13
Biometrics-Based RSA Cryptosystem for Securing Real-Time Communication. SUSTAINABILITY 2018. [DOI: 10.3390/su10103588] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
14
A novel pseudo random sequence generator for image-cryptographic applications. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2017. [DOI: 10.1016/j.jisa.2017.06.005] [Citation(s) in RCA: 21] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/23/2022]
15
Efficient visual attention driven framework for key frames extraction from hysteroscopy videos. Biomed Signal Process Control 2017. [DOI: 10.1016/j.bspc.2016.11.011] [Citation(s) in RCA: 34] [Impact Index Per Article: 4.9] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/19/2022]
16
Muhammad K, Ahmad J, Sajjad M, Baik SW. Visual saliency models for summarization of diagnostic hysteroscopy videos in healthcare systems. SPRINGERPLUS 2016;5:1495. [PMID: 27652068 PMCID: PMC5013008 DOI: 10.1186/s40064-016-3171-8] [Citation(s) in RCA: 28] [Impact Index Per Article: 3.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/26/2016] [Accepted: 08/30/2016] [Indexed: 11/10/2022]
17
Hamza R, Titouna F. A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map. INFORMATION SECURITY JOURNAL 2016. [DOI: 10.1080/19393555.2016.1212954] [Citation(s) in RCA: 14] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
18
Mantos PLK, Maglogiannis I. Sensitive Patient Data Hiding using a ROI Reversible Steganography Scheme for DICOM Images. J Med Syst 2016;40:156. [DOI: 10.1007/s10916-016-0514-5] [Citation(s) in RCA: 20] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/04/2016] [Accepted: 04/29/2016] [Indexed: 11/30/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA