Security of End-to-End medical images encryption system using trained deep learning encryption and decryption network

被引:0
|
作者
Inam, Saba [1 ]
Kanwal, Shamsa [1 ]
Anwar, Anousha [1 ]
Fatima Mirza, Noor [1 ]
Alfraihi, Hessa [2 ]
机构
[1] Department of Mathematical Sciences, Fatima Jinnah Women University, Rawalpindi, Pakistan
[2] Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh,11671, Saudi Arabia
关键词
D O I
10.1016/j.eij.2024.100541
中图分类号
学科分类号
摘要
33
引用
收藏
相关论文
共 50 条
  • [31] Deep Learning for Detecting Network Attacks: An End-to-End Approach
    Zou, Qingtian
    Singhal, Anoop
    Sun, Xiaoyan
    Liu, Peng
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXV, 2021, 12840 : 221 - 234
  • [32] End-to-End Confidentiality for a Message Warehousing Service Using Identity-Based Encryption
    Karabulut, Yuecel
    Weppner, Harald
    Nassi, Ike
    Nagarajan, Anusha
    Shroff, Yash
    Dubey, Nishant
    Shields, Tyelisa
    2010 IEEE 26TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING WORKSHOPS (ICDE 2010), 2010, : 33 - 40
  • [33] Automated Classification Using End-to-End Deep Learning
    Jaipurkar, Shobhit Sandeep
    Jie, Wang
    Zeng, Zeng
    Gee, Teo Sin
    Veeravalli, Bharadwaj
    Chua, Matthew
    2018 40TH ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY (EMBC), 2018, : 706 - 709
  • [34] Deep End-to-end Imitation Learning for Missile Guidance With Infrared Images
    Lee, Seungjae
    Shin, Jongho
    Kim, Hyeong-Geun
    Cho, Daesol
    Kim, H. Jin
    INTERNATIONAL JOURNAL OF CONTROL AUTOMATION AND SYSTEMS, 2023, 21 (10) : 3419 - 3429
  • [35] Deep End-to-end Imitation Learning for Missile Guidance With Infrared Images
    Seungjae Lee
    Jongho Shin
    Hyeong-Geun Kim
    Daesol Cho
    H. Jin Kim
    International Journal of Control, Automation and Systems, 2023, 21 : 3419 - 3429
  • [36] An end-to-end deep learning system for medieval writer identification
    Cilia, N. D.
    De Stefano, C.
    Fontanella, F.
    Marrocco, C.
    Molinara, M.
    Di Freca, A. Scotto
    PATTERN RECOGNITION LETTERS, 2020, 129 : 137 - 143
  • [37] End-to-End Deep Learning Applied in Autonomous Navigation using Multi-Cameras System with RGB and Depth Images
    Diaz Amado, Jose A.
    Gomes, Iago Pacheco
    Amaro, Jean
    Wolf, Denis Fernando
    Osorio, Fernando S.
    2019 30TH IEEE INTELLIGENT VEHICLES SYMPOSIUM (IV19), 2019, : 1626 - 1631
  • [38] A lifetime-optimized end-to-end encryption scheme for sensor networks allowing in-network processing
    Armknecht, Frederik
    Westhoff, Dirk
    Girao, Joao
    Hessler, Alban
    COMPUTER COMMUNICATIONS, 2008, 31 (04) : 734 - 749
  • [39] End-to-end Encryption based Biometric SaaS Using Raspberry Pi as a Remote Authentication Node
    Shah, Dhvani K.
    Bharadi, Vinayak A.
    Kaul, V. J.
    Amrutia, Sameer
    1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015, 2015, : 52 - 59
  • [40] DeepChess :End-to-End Deep Neural Network for Automatic Learning in Chess
    David, Omid E.
    Netanyahu, Nathan S.
    Wolf, Lior
    ARTIFICIAL NEURAL NETWORKS AND MACHINE LEARNING - ICANN 2016, PT II, 2016, 9887 : 88 - 96