References
- Lou, D.C., Hu, M.C. and Liu, J.L., 2009. Multiple layer data hiding scheme for medical images. Computer Standards & Interfaces, 31 (2), pp.329-335. https://doi.org/10.1016/j.csi.2008.05.009
- United States Department of Health and Human Services, HIPPA: medical privacy-national standards to protect the privacy of personal health information, http://www.hhs.gov/ocr/ privacy/.
- Zhang, L.B., Zhu, Z.L., Yang, B.Q., Liu, W.Y., Zhu, H.F. and Zou, M.Y., 2015. Cryptanalysis and improvement of an efficient and secure medical image protection scheme. Mathematical Problems in Engineering, 2015.
- Chen, J.X., Zhu, Z.L., Fu, C. and Yu, H., 2013. An improved permutation-diffusion type image cipher with a chaotic orbit perturbing mechanism. Optics Express, 21 (23), pp.27873- 27890. https://doi.org/10.1364/OE.21.027873
- Chen, J.X., Zhu, Z.L., Fu, C., Yu, H. and Zhang, L.B., 2015. A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism. Communications in Nonlinear Science and Numerical Simulation, 20 (3), pp.846-860. https://doi.org/10.1016/j.cnsns.2014.06.032
- Fridrich, J., 1998. Symmetric ciphers based on twodimensional chaotic maps. International Journal of Bifurcation and chaos, 8 (06), pp.1259-1284. https://doi.org/10.1142/S021812749800098X
- Zhang, Y. and Xiao, D., 2014. Self-adaptive permutation and combined global diffusion for chaotic color image encryption. AEU-International Journal of Electronics and Communications, 68 (4), pp.361-368. https://doi.org/10.1016/j.aeue.2013.10.002
- Lin, C.F., Chung, C.H. and Lin, J.H., 2009. A chaos-based visual encryption mechanism for clinical EEG signals. Medical & biological engineering & computing, 47 (7), pp.757-762. https://doi.org/10.1007/s11517-009-0458-8
- Fu, C., Meng, W.H., Zhan, Y.F., Zhu, Z.L., Lau, F.C., Chi, K.T. and Ma, H.F., 2013. An efficient and secure medical image protection scheme based on chaotic maps. Computers in biology and medicine, 43 (8), pp.1000-1010. https://doi.org/10.1016/j.compbiomed.2013.05.005
- Mansour, R.F. and Abdelrahim, E.M., 2019. An evolutionary computing enriched RS attack resilient medical image steganography model for telemedicine applications. Multidimensional Systems and Signal Processing, 30 (2), pp.791-814. https://doi.org/10.1007/s11045-018-0575-3
- Zhou, N., Zhang, A., Zheng, F. and Gong, L., 2014. Novel image compression-encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing. Optics & Laser Technology, 62, pp.152-160. https://doi.org/10.1016/j.optlastec.2014.02.015
- Zhang, L.Y., Wong, K.W., Zhang, Y. and Lin, Q., 2015, May. Joint quantization and diffusion for compressed sensing measurements of natural images. In 2015 IEEE International Symposium on Circuits and Systems (ISCAS) (pp. 2744-2747). IEEE.
- Bairagi, A.K., Khondoker, R. and Islam, R., 2016. An efficient steganographic approach for protecting communication in the Internet of Things (IoT) critical infrastructures. Information Security Journal: A Global Perspective, 25 (4-6), pp.197-212. https://doi.org/10.1080/19393555.2016.1206640
- Anwar, A.S., Ghany, K.K.A. and Mahdy, H.E., 2015. Improving the security of images transmission. International Journal, 3 (4), pp.7-13.
- Yu, L., Wang, Z. and Wang, W., 2012, November. The application of hybrid encryption algorithm in software security. In 2012 Fourth International Conference on Computational Intelligence and Communication Networks (pp. 762-765). IEEE.
- Goldberg, D.E. and Holland, J.H., 1988. Genetic algorithms and machine learning. Machine Learning.
- Razzaq, M.A., Sheikh, R.A., Baig, A. and Ahmad, A., 2017. Digital image security: Fusion of encryption, steganography and watermarking. International Journal of Advanced Computer Science and Applications (IJACSA), 8 (5).
- Jain, M., Choudhary, R.C. and Kumar, A., 2016, December. Secure medical image steganography with RSA cryptography using decision tree. In 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) (pp. 291-295). IEEE.
- Zaw, Z.M. and Phyo, S.W., 2015. Security enhancement system based on the integration of cryptography and steganography. International Journal of Computer (IJC), 19 (1), pp.26-39.
- Sreekutty, M.S. and Baiju, P.S., 2017, April. Security enhancement in image steganography for medical integrity verification system. In 2017 International Conference on Circuit, Power and Computing Technologies (ICCPCT) (pp. 1-5). IEEE.
- Bashir, A., Hasan, A.S.B. and Almangush, H., 2012. A new image encryption approach using the integration of a shifting technique and the AES algorithm. International Journal of Computers and Applications, 42 (9), pp.38-45.
- Muhammad, K., Ahmad, J., Farman, H., Jan, Z., Sajjad, M. and Baik, S.W., 2015. A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption. TIIS, 9 (5), pp.1938-1962.
- Ambika, Biradar, R.L. and Burkpalli, V., 2019. Encryption-based steganography of images by multiobjective whale optimal pixel selection. International Journal of Computers and Applications, pp.1-10.
- Zhao, W., Zhang, Z. and Wang, L., 2020. Manta ray foraging optimization: An effective bio-inspired optimizer for engineering applications. Engineering Applications of Artificial Intelligence, 87, p.103300. https://doi.org/10.1016/j.engappai.2019.103300
- Pan, H., Lei, Y. and Jian, C., 2018. Research on digital image encryption algorithm based on double logistic chaotic map. EURASIP Journal on Image and Video Processing, 2018 (1), pp.1-10. https://doi.org/10.1186/s13640-017-0240-z
- Dansana, D., Kumar, R., Bhattacharjee, A., Hemanth, D.J., Gupta, D., Khanna, A. and Castillo, O., 2020. Early diagnosis of COVID-19-affected patients based on X-ray and computed tomography images using deep learning algorithm. Soft Computing, pp.1-9.
- Waheed, A., Goyal, M., Gupta, D., Khanna, A., Al-Turjman, F. and Pinheiro, P.R., 2020. Covidgan: data augmentation using auxiliary classifier gan for improved covid-19 detection. Ieee Access, 8, pp.91916-91923. https://doi.org/10.1109/ACCESS.2020.2994762
- Shankar, K. and Eswaran, P., 2017. RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Communications, 14 (2), pp.118-130. https://doi.org/10.1109/CC.2017.7868160
- Shankar, K. and Eswaran, P., 2016. RGB-based secure share creation in visual cryptography using optimal elliptic curve cryptography technique. Journal of Circuits, Systems and Computers, 25 (11), p.1650138. https://doi.org/10.1142/S0218126616501383