Neural soft computing based secured transmission of intraoral gingivitis image in e-health care
@article{Sarkar2019NeuralSC, title={Neural soft computing based secured transmission of intraoral gingivitis image in e-health care}, author={A. Sarkar and Joydeep Dey and Minakshi Chatterjee and A. Bhowmik and Sunil Karforma}, journal={Indonesian Journal of Electrical Engineering and Computer Science}, year={2019}, volume={14}, pages={178-184} }
In this paper, a key based soft computing transmission of intraoral gingivitis image has been proposed without the exchange of common key in between the nodes. Gingivitis has been a type of periodontal disease caused due to bacterial colonization inside the mouth, having the early signs of gum bleeding and inflammations in human beings. In E-health care strata, online transmission of such intraoral images with secured encryption technique is needed. Session key based neural soft computing… Expand
5 Citations
Secured Session Key-Based E-Health: Biometric Blended with Salp Swarm Protocol in Telecare Portals
- Computer Science
- 2020
- 1
Newer post-COVID perspective: Teledental encryption by de-multiplexed perceptrons
- Medicine
- International journal of information technology : an official journal of Bharati Vidyapeeth's Institute of Computer Applications and Management
- 2021
- 1
- PDF
Artificial Neural Synchronization Using Nature Inspired Whale Optimization
- Computer Science
- IEEE Access
- 2021
- PDF
References
SHOWING 1-10 OF 16 REFERENCES
Cryptanalysis on Privacy-Aware Two-factor Authentication Protocol for Wireless Sensor Networks
- Computer Science
- 2018
- 7
- PDF
An Efficient Schema of a Special Permutation Inside of Each Pixel of an Image for its Encryption
- Computer Science
- 2018
- 5
- PDF
Secure key-exchange protocol with an absence of injective functions.
- Computer Science, Medicine
- Physical review. E, Statistical, nonlinear, and soft matter physics
- 2002
- 51
- PDF
Association between periodontal disease and stroke.
- Medicine
- Journal of vascular surgery
- 2012
- 101
- Highly Influential
Genetic attack on neural cryptography.
- Mathematics, Medicine
- Physical review. E, Statistical, nonlinear, and soft matter physics
- 2006
- 52
- PDF
Neural cryptography
- Physics, Computer Science
- Proceedings of the 9th International Conference on Neural Information Processing, 2002. ICONIP '02.
- 2002
- 59
- PDF