ScienceDirect
Download 0.73 Mb. Pdf ko'rish
|
An Efficient Homomorphic Medical Image Encryption
References [1] Jitender Madarkar, Anuradha D, Sachendra Waghmare .Security Issues of Patient Health Records in E-hospital Management in cloud International Journal of Emerging Research in Management and technology; 3 (6): 46-51. [2] Naveen Islam,WilliamPuech, Khizar Hayat, Robert Brouzet,. Application of Homomorphism to Secure Image Sharing. Elsevier 2011; 284 4412-4429. [3] Diana-stefania MAIMUT, Alecsandru PATRASCU, Emil SIMION. Homomorphic Encryption Scheme And Application for a Secure Digital World. Journal of Mobile, Embedded and Digital System 2012; 4 (4): 224-232. [4] OvuncKocabas, Tolga Soyata. Medical Data Analytics in the Cloud Using Homomorphic Encryption. IGI Global book series Advances in Data Mining and Database Management (ADMDM) 2014; 471-488. [5] Li Li , Ahmed A.Abd El-Latif , XiamuNiu . Elliptic Curve Elgamal Based Homomorphic Image Encryption Scheme For Sharing Secret Images. Elsevier 2012; 92 : 1069-1078. [6] Lichun Li, Rongxing Lu, Kim-Kwang Raymond choo, AnwitamanDatta, Jun shao . Privacy-Preserving-Outsourced-Associated Rule Mining on Vertically Partitioned Databases. IEEE Transaction on Information Forensics and Security 2016; 11(8):1847-1861. [7] Maha TEBAA, Said EL HAJII . Secure Cloud Computing Through Homomorphic Encryption. International Journal of Advancements in Computing Technology(IJACT) 2013; 5 (16) : 29-38. [8] Kun Peng, Colin Boyd, and Ed Dawson . A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption. Springer-Verlag Berlin Heidelberg 2005; 374–388. [9] Rabi Prasad Padhy, ManasRanjanPatra ,Suresh Chandra Satapathy. Cloud Computing: Security Issues and Research Challenges . IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS).2011; 1(2): 136-148. [10] Iram Ahmad and ArchanaKhandekar . Homomorphic Encryption Method Applied to Cloud Computing. International Journal of Information & Computation Technology.2014; 4(15): 1519-1530. [11] Narendra K Pareek . Design and Analysis of a Novel Digital Encryption Scheme. International Journal of Network Security and Its Application 2012; 4(2): 95-108. [12] IsmetOzturk and IbraSogukpinar . Analysis and Comparison of Image Encryption Algorithm .International Journal of Information Technology; 1(2): 64-67. [13] Mayank Mishra , Prashantsingh, ChinmayGarg. A New Algorithm of Encryption and Decryption of Images using Chaotic Mapping.International Journal of Information and computation Technology 2014; 4(7):741-746. [14] J. Katz and Y. Lindell. Introduction to Modern Cryptography. Chapman & Hall/CRC Press 2008; [15] SigrunGoluch. The Development of Homomorphic cryptography. Institute of Discrete Mathematics and Geometry Vienna University of Technology;1-108. [16] Pinki , Rajesh Mehra . Estimation of the Image Quality Under Different Distortions. International Journal of Engineering and Computer Science 2016; 5 (7): 17291-17296. [17] NirMenachemi and Taleah H collum. Benefits and Drawbacks of electronic health record system. DovePress-Risk management and Health policy.2011; 4 : 47-55. [18] Schneier, B. Applied Cryptography : Protocols, Algorithms and Source Code in C, John Wiley & Sons 1996. [19] Stinson, D.R.Cryptography: Theory and Practice. CRC press.2007. [20] C.K. Huang, H. Nien. Multi chaotic systems based pixel shuffle for image encryption. Elsevier Opt. Communication. 2009; 282 (11): 2123– 2127. [21] Sara Tedmori , Nijad Al Najdawi . Image Cryptographic algorithm based on the Haar wavelet transform.Information Sciences-Elsevier 2014; 269; 21-34. [22] A. Saffor, A.R. bin Ramli, K.H. Ng, D. Dowsett. Objective and subjective evaluation of compressed computed tomography (CT) images. Int. J. Mech. Simul.technol 2002; 1(1). [23] C. Samson, V. Sastry. A novel image encryption supported by compression using multilevel wavelet transform. Int. J. Adv. Comput. Sci. Appl 2012; 3 (9) : 178–183. Download 0.73 Mb. Do'stlaringiz bilan baham: |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling