Secured electrocardiograph (ECG) signal using partially homomorphic encryption technique–RSA algorithm
ECG signal differs from individual to individual, making it hard to be emulated and copied. In recent times ECG is being used for identifying the person. Hence, there is a requirement for a system that involves digital signal processing and signal security so that the saved data are secured at one p...
| Main Authors: | Shaikh, Muhammad Umair, Wan Adnan, Wan Azizun, Ahmad, Siti Anom |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Universiti Putra Malaysia Press
2020
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/73390/ http://psasir.upm.edu.my/id/eprint/73390/1/ECG.pdf |
Similar Items
Secured electrocardiograph (ECG) signal using fully homomorphic encryption technique
by: Shaikh, Muhammad Umair, et al.
Published: (2020)
by: Shaikh, Muhammad Umair, et al.
Published: (2020)
Investigation of data encryption algorithm for secured transmission of electrocardiograph (ECG) signal
by: Shaikh, Muhammad Umair, et al.
Published: (2018)
by: Shaikh, Muhammad Umair, et al.
Published: (2018)
Electrocardiographic (ECG) characteristics among Malaysian athletes
by: Mohamad Shariff A Hamid,, et al.
Published: (2021)
by: Mohamad Shariff A Hamid,, et al.
Published: (2021)
Electrocardiographic ECG characteristics among Malaysian athletes
by: A. Hamid, Mohamad Shariff, et al.
Published: (2021)
by: A. Hamid, Mohamad Shariff, et al.
Published: (2021)
Data Integrity For Cloud Computing With Homomorphic Encryption
by: Awadallah, Ruba N S
Published: (2022)
by: Awadallah, Ruba N S
Published: (2022)
Design and implementation of wireless telemedicine system-electrocardiograph(ECG)
by: Ng, Eng Hui
Published: (2011)
by: Ng, Eng Hui
Published: (2011)
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
by: H. Belgassem, Seddeq
Published: (2004)
by: H. Belgassem, Seddeq
Published: (2004)
Improve cloud computing security using RSA encryption with Fermat's little theorem
by: Mohamed Shereek, Balkees, et al.
Published: (2014)
by: Mohamed Shereek, Balkees, et al.
Published: (2014)
Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing
by: Lim, Tsu Chean, et al.
Published: (2018)
by: Lim, Tsu Chean, et al.
Published: (2018)
Privacy Concerns due to Class Elements in Cloud Environments despite Full Homomorphic Encryption
by: Jaber, Aws Naser, et al.
by: Jaber, Aws Naser, et al.
Performance evaluation of time-frequency distributions for ECG signal analysis
by: Hussein, Ahmed Faeq, et al.
Published: (2018)
by: Hussein, Ahmed Faeq, et al.
Published: (2018)
FPGA implementation of RSA encryption engine with flexible key size
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2007)
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2007)
IoT data encryption algorithm for security
by: Kanaan Ismael, Marwan
Published: (2020)
by: Kanaan Ismael, Marwan
Published: (2020)
Analysis of transient using homomorphic deconvolution technique
by: Salami, Momoh Jimoh Eyiomika, et al.
Published: (2010)
by: Salami, Momoh Jimoh Eyiomika, et al.
Published: (2010)
Implementation of RSA algorithm
by: Rasid, Hafizul Azizi, et al.
Published: (2011)
by: Rasid, Hafizul Azizi, et al.
Published: (2011)
Flexible bio-signals channels acquisition system for ECG and EMG application
by: Jamaluddin, Nurul Fauzani, et al.
Published: (2014)
by: Jamaluddin, Nurul Fauzani, et al.
Published: (2014)
Measurable bundles of *-homomorphisms C*-algebras
by: Ganiev, Inomjon, et al.
Published: (2012)
by: Ganiev, Inomjon, et al.
Published: (2012)
DNA sequences compression by GP2R and selective encryption using modified RSA technique
by: Hossein, Syed Mahamud, et al.
Published: (2020)
by: Hossein, Syed Mahamud, et al.
Published: (2020)
Security issues of Novel RSA variant
by: Nitaj, Abderrahmane, et al.
Published: (2022)
by: Nitaj, Abderrahmane, et al.
Published: (2022)
Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms
by: -, Salma, et al.
Published: (2019)
by: -, Salma, et al.
Published: (2019)
Human identification based on ECG signal
by: Amiruddin, Ainunjariah, et al.
Published: (2015)
by: Amiruddin, Ainunjariah, et al.
Published: (2015)
A survey of partial key exposure attacks on RSA cryptosystem
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019)
An efficient secure ECG compression based on 2D-SPIHT and SIT algorithm
by: Jati, Grafika, et al.
Published: (2017)
by: Jati, Grafika, et al.
Published: (2017)
The block cipher algorithm–properties, encryption efficiency analysis and security evaluation
by: Rezaeipour, Davood, et al.
Published: (2010)
by: Rezaeipour, Davood, et al.
Published: (2010)
Comparison of ECC and RSA algorithms in IOT devices
by: Vahdati, Zeinab, et al.
Published: (2019)
by: Vahdati, Zeinab, et al.
Published: (2019)
Enhancement of Under-Exposed Image for Object Tracking Algorithm Through Homomorphic Filtering and Mean Histogram Matching
by: Mohd Fauzi, Abu Hassan, et al.
Published: (2017)
by: Mohd Fauzi, Abu Hassan, et al.
Published: (2017)
Partial key attack given MSBs of CRT-RSA private keys
by: Abd Ghafar, Amir Hamzah Abd, et al.
Published: (2020)
by: Abd Ghafar, Amir Hamzah Abd, et al.
Published: (2020)
Partial Encryption of Compressed Images Employing FPGA
by: Reaz, M.B.I., et al.
Published: (2005)
by: Reaz, M.B.I., et al.
Published: (2005)
Partial encryption of compressed images employing FPGA
by: Reaz, Mamun Bin Ibne Ibne, et al.
Published: (2005)
by: Reaz, Mamun Bin Ibne Ibne, et al.
Published: (2005)
Securing medical data transmission systems based on integrating algorithm of encryption and steganography
by: Hashim, Mohammed Mahdi, et al.
Published: (2020)
by: Hashim, Mohammed Mahdi, et al.
Published: (2020)
High performance of RSA simulation system based on modified montgomery algorithm
by: Liu, J., et al.
Published: (2016)
by: Liu, J., et al.
Published: (2016)
On the security defects of an image encryption scheme
by: C., Li, et al.
Published: (2009)
by: C., Li, et al.
Published: (2009)
Encryption method for SCADA security enhancement
by: Shahzad, Aamir, et al.
Published: (2014)
by: Shahzad, Aamir, et al.
Published: (2014)
Security Study and Encryption / Decryption Method
by: Al-Qdah, Majdi Taysir
Published: (2000)
by: Al-Qdah, Majdi Taysir
Published: (2000)
Analysis of the ECG signal using SVD-based parametric modelling technique
by: Baali, Hamza, et al.
Published: (2011)
by: Baali, Hamza, et al.
Published: (2011)
Trunk muscle onset detection technique for EMG signals with ECG artefact.
by: Allison, Garry
Published: (2003)
by: Allison, Garry
Published: (2003)
Performance evaluation of human identification based on ECG signal
by: Amiruddin, Ainunjariah, et al.
Published: (2015)
by: Amiruddin, Ainunjariah, et al.
Published: (2015)
Emotion detection using physiological signals EEG & ECG
by: AlzeerAlhouseini, Amjad M.R., et al.
Published: (2016)
by: AlzeerAlhouseini, Amjad M.R., et al.
Published: (2016)
Cryptanalysis of RSA
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Video streaming and encrypting algorithms
by: Abumuala, Muhammad, et al.
Published: (2011)
by: Abumuala, Muhammad, et al.
Published: (2011)
Similar Items
-
Secured electrocardiograph (ECG) signal using fully homomorphic encryption technique
by: Shaikh, Muhammad Umair, et al.
Published: (2020) -
Investigation of data encryption algorithm for secured transmission of electrocardiograph (ECG) signal
by: Shaikh, Muhammad Umair, et al.
Published: (2018) -
Electrocardiographic (ECG) characteristics among Malaysian athletes
by: Mohamad Shariff A Hamid,, et al.
Published: (2021) -
Electrocardiographic ECG characteristics among Malaysian athletes
by: A. Hamid, Mohamad Shariff, et al.
Published: (2021) -
Data Integrity For Cloud Computing With Homomorphic Encryption
by: Awadallah, Ruba N S
Published: (2022)