Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    Severity Based Light-Weight Encryption Model for Secure Medical Information System

    Firas Abedi1, Subhi R.M. Zeebaree2, Zainab Salih Ageed3, Hayder M.A. Ghanimi4, Ahmed Alkhayyat5,*, Mohammed A.M. Sadeeq6, Sarmad Nozad Mahmood7, Ali S. Abosinnee8, Zahraa H. Kareem9, Ali Hashim Abbas10, Waleed Khaild Al-Azzawi11, Mustafa Musa Jaber12,13, Mohammed Dauwed14

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5691-5704, 2023, DOI:10.32604/cmc.2023.034435 - 28 December 2022

    Abstract As the amount of medical images transmitted over networks and kept on online servers continues to rise, the need to protect those images digitally is becoming increasingly important. However, due to the massive amounts of multimedia and medical pictures being exchanged, low computational complexity techniques have been developed. Most commonly used algorithms offer very little security and require a great deal of communication, all of which add to the high processing costs associated with using them. First, a deep learning classifier is used to classify records according to the degree of concealment they require. Medical… More >

  • Open Access

    ARTICLE

    ExpressionHash: Securing Telecare Medical Information Systems Using BioHashing

    Ayesha Riaz1, Naveed Riaz1, Awais Mahmood2,*, Sajid Ali Khan3, Imran Mahmood1, Omar Almutiry2, Habib Dhahri2

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 2747-2764, 2021, DOI:10.32604/cmc.2021.014418 - 01 March 2021

    Abstract The COVID-19 outbreak and its medical distancing phenomenon have effectively turned the global healthcare challenge into an opportunity for Telecare Medical Information Systems. Such systems employ the latest mobile and digital technologies and provide several advantages like minimal physical contact between patient and healthcare provider, easy mobility, easy access, consistent patient engagement, and cost-effectiveness. Any leakage or unauthorized access to users’ medical data can have serious consequences for any medical information system. The majority of such systems thus rely on biometrics for authenticated access but biometric systems are also prone to a variety of attacks… More >

Displaying 1-10 on page 1 of 2. Per Page