Security of End-to-End medical images encryption system using trained deep learning encryption and decryption network

被引:0
|
作者
Inam, Saba [1 ]
Kanwal, Shamsa [1 ]
Anwar, Anousha [1 ]
Fatima Mirza, Noor [1 ]
Alfraihi, Hessa [2 ]
机构
[1] Department of Mathematical Sciences, Fatima Jinnah Women University, Rawalpindi, Pakistan
[2] Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh,11671, Saudi Arabia
关键词
D O I
10.1016/j.eij.2024.100541
中图分类号
学科分类号
摘要
33
引用
收藏
相关论文
共 50 条
  • [1] Security Analysis of End-to-End Encryption for Zoom Meetings
    Isobe, Takanori
    Ito, Ryoma
    IEEE ACCESS, 2021, 9 : 90677 - 90689
  • [2] Security Analysis of End-to-End Encryption for Zoom Meetings
    Isobe, Takanori
    Ito, Ryoma
    INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 234 - 253
  • [3] The Many Faces of End-to-End Encryption and Their Security Analysis
    Nabeel, Mohamed
    2017 IEEE 1ST INTERNATIONAL CONFERENCE ON EDGE COMPUTING (IEEE EDGE), 2017, : 252 - 259
  • [4] System of end-to-end symmetric database encryption
    Galushka, V. V.
    Aydinyan, A. R.
    Tsvetkova, O. L.
    Fathi, V. A.
    Fathi, D. V.
    INTERNATIONAL CONFERENCE INFORMATION TECHNOLOGIES IN BUSINESS AND INDUSTRY 2018, PTS 1-4, 2018, 1015
  • [5] Security Analysis and Countermeasures of an End-to-End Encryption Scheme of LINE
    Isobe, Takanori
    Minematsu, Kazuhiko
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 313 - 324
  • [6] Implementing end-to-end encryption strategist for strengthening data security across network communication
    Balpande, Vijaya Parag
    Aher, Ujjwala Bal
    Borkar, Pradnya
    Bhanarkar, Parul
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2A): : 465 - 476
  • [7] Encipher GAN: An End-to-End Color Image Encryption System Using a Deep Generative Model
    Panwar, Kirtee
    Singh, Akansha
    Kukreja, Sonal
    Singh, Krishna Kant
    Shakhovska, Nataliya
    Boichuk, Andrii
    SYSTEMS, 2023, 11 (01):
  • [8] Novel end-to-end voice encryption method in GSM system
    Qi, H. F.
    Yang, X. H.
    Jiang, R.
    Liang, B.
    Zhou, S. J.
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 217 - 220
  • [9] The Application of Public Communication Network Security Management Based on End-to-End Image Encryption Algorithm of LU Chaotic System
    Wang, Yao
    International Journal of Network Security, 2024, 26 (06) : 1071 - 1081
  • [10] Securing SCADA Applications Using OpenPLC With End-To-End Encryption
    Alves, Thiago
    Morris, Thomas
    Yoo, Seong-Moo
    3RD ANNUAL INDUSTRIAL CONTROL SYSTEM SECURITY WORKSHOP (ICSS 2017), 2017, : 1 - 6