Neural soft computing based secured transmission of intraoral gingivitis image in e-health care

@article{Sarkar2019NeuralSC,
  title={Neural soft computing based secured transmission of intraoral gingivitis image in e-health care},
  author={A. Sarkar and Joydeep Dey and Minakshi Chatterjee and A. Bhowmik and Sunil Karforma},
  journal={Indonesian Journal of Electrical Engineering and Computer Science},
  year={2019},
  volume={14},
  pages={178-184}
}
In this paper, a key based soft computing transmission of intraoral gingivitis image has been proposed without the exchange of common key in between the nodes. Gingivitis has been a type of periodontal disease caused due to bacterial colonization inside the mouth, having the early signs of gum bleeding and inflammations in human beings. In E-health care strata, online transmission of such intraoral images with secured encryption technique is needed. Session key based neural soft computing… Expand
5 Citations

Figures, Tables, and Topics from this paper

Newer post-COVID perspective: Teledental encryption by de-multiplexed perceptrons
  • Joydeep Dey, A. Sarkar, Sunil Karforma
  • Medicine
  • International journal of information technology : an official journal of Bharati Vidyapeeth's Institute of Computer Applications and Management
  • 2021
  • 1
  • PDF
Artificial Neural Synchronization Using Nature Inspired Whale Optimization
  • PDF

References

SHOWING 1-10 OF 16 REFERENCES
Cryptanalysis on Privacy-Aware Two-factor Authentication Protocol for Wireless Sensor Networks
  • 7
  • PDF
Secure key-exchange protocol with an absence of injective functions.
  • 51
  • PDF
Association between periodontal disease and stroke.
  • 101
  • Highly Influential
Genetic attack on neural cryptography.
  • 52
  • PDF
Safeguarding cryptographic keys
  • 1,094
  • PDF
How to share a secret
  • 11,472
  • PDF
Neural cryptography
  • W. Kinzel, I. Kanter
  • Physics, Computer Science
  • Proceedings of the 9th International Conference on Neural Information Processing, 2002. ICONIP '02.
  • 2002
  • 59
  • PDF
Interacting Neural Networks and Cryptography
  • 62
  • PDF
...
1
2
...