Skip to content
VuFind
Advanced
  • Securing medical data transmis...
  • Cite this
  • Print
  • Export Record
    • Export to RefWorks
    • Export to EndNoteWeb
    • Export to EndNote
Securing medical data transmission systems based on integrating algorithm of encryption and steganography
QR Code

Securing medical data transmission systems based on integrating algorithm of encryption and steganography

The awareness to secure medical data has significantly increased. Steganographic has binged an important topic especially in this area since it has the capability to avoid medical data breach. This paper proposes a new steganography scheme based on Bit Invert System (BIS) using three control ra...

Full description

Bibliographic Details
Main Authors: Hashim, Mohammed Mahdi, Taha, Mustafa Sabah, Mohd Aman, Azana Hafizah, Hassan Abdalla Hashim, Aisha, Mohd Rahim, Mohd Shafry, Islam, Shayla
Format: Proceeding Paper
Language:English
English
Published: Institute of Electrical and Electronics Engineers Inc. 2020
Subjects:
T Technology (General)
TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices
TK7885 Computer engineering
Online Access:http://irep.iium.edu.my/79615/
http://irep.iium.edu.my/79615/2/79615%20%20%20%20Securing%20Medical%20Data%20Transmission.pdf
http://irep.iium.edu.my/79615/3/79615%20%20%20%20Securing%20Medical%20Data%20Transmission%20SCOPUS.pdf
  • Holdings
  • Description
  • Similar Items
  • Staff View

Internet

http://irep.iium.edu.my/79615/
http://irep.iium.edu.my/79615/2/79615%20%20%20%20Securing%20Medical%20Data%20Transmission.pdf
http://irep.iium.edu.my/79615/3/79615%20%20%20%20Securing%20Medical%20Data%20Transmission%20SCOPUS.pdf

Similar Items

  • Parametric comparison of multicast support for network mobility management: A qualitative analysis
    by: Mohd Aman, Azana Hafizah, et al.
    Published: (2016)
  • The study of multicast hierarchical mobile IPV6
    by: Mohd Aman, Azana Hafizah, et al.
    Published: (2011)
  • Performance analysis for cloud query encryption
    by: Ali Raheem, Zainalabideen, et al.
    Published: (2019)
  • Video encryption using computation between H.264/AVC and AES encryption algorithm
    by: Omar zakaria, Mohamed Abomhara, et al.
    Published: (2011)
  • Cost investigation of multihoming-based scheme to support mobility management in NEMO
    by: Islam, Shayla, et al.
    Published: (2016)

Search Options

  • Advanced Search

Find More

  • Browse the Catalog

Need Help?

  • Search Tips