<?xml version="1.0" encoding="UTF-8"?>
<item xmlns="http://omeka.org/schemas/omeka-xml/v5" itemId="18986" public="1" featured="0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://omeka.org/schemas/omeka-xml/v5 http://omeka.org/schemas/omeka-xml/v5/omeka-xml-5-0.xsd" uri="https://archives.christuniversity.in/items/show/18986?output=omeka-xml" accessDate="2026-04-23T02:29:04+00:00">
  <collection collectionId="16">
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="51377">
                <text>Conference Papers</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </collection>
  <itemType itemTypeId="28">
    <name>Conference Paper</name>
    <description>Faculty Publications- Conference Papers</description>
  </itemType>
  <elementSetContainer>
    <elementSet elementSetId="1">
      <name>Dublin Core</name>
      <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
      <elementContainer>
        <element elementId="50">
          <name>Title</name>
          <description>A name given to the resource</description>
          <elementTextContainer>
            <elementText elementTextId="161438">
              <text>Advancing Image Security Through Deep Learning and Cryptography in Healthcare and Industry</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="49">
          <name>Subject</name>
          <description>The topic of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="161439">
              <text>Cryptography; Deep Learning; Image Encryption; Medical Image Security</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="41">
          <name>Description</name>
          <description>An account of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="161440">
              <text>Securing electronic health records (EHRs) in the Internet of Medical Things (IoMT) ecosystem is a key concern in healthcare due to the sector's differed environment. As the evolution of technology continues, ensuring the confidentiality, integrity, and accessibility of EHRs becomes more and more challenging. To enhance the confidentiality of healthcare picture data, this study explores the combined use of deep learning and cryptography methods. Through the utilization of weight analysis for improving encryption strength and the combination of chaotic systems to generate undetectable encryption patterns, it explores how deep neural networks can be modified for use in encryption. It also provides a survey of the present scenario of deep learning-based image detection of anomalies methods in working environments, such as network typologies, supervision levels, and assessment norms. Techniques in cryptography provide an effective means to protect confidential medical picture data while it's being transmitted and stored. Deep learning, on the other hand, has the ability to entirely change cryptography by providing robust encryption, resolution augmentation, and detection capabilities for medical image security. The paper outlines future research approaches to overcome these problems and tackles the opportunities and obstacles in medical image cryptography and industrial picture anomaly detection. Through this work, picture privacy in the healthcare and industrial sectors is advanced, opening the door to enhanced privacy, integrity, and availability of vital image data by overcoming the gap between deep learning and cryptography.   2024 IEEE.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="39">
          <name>Creator</name>
          <description>An entity primarily responsible for making the resource</description>
          <elementTextContainer>
            <elementText elementTextId="161441">
              <text>Kumar P.; Laroia A.; Kumar M.; Laroia A.; Upreti K.; Parashar J.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="48">
          <name>Source</name>
          <description>A related resource from which the described resource is derived</description>
          <elementTextContainer>
            <elementText elementTextId="161442">
              <text>2024 International Conference on Emerging Trends in Networks and Computer Communications, ETNCC 2024 - Proceedings, pp. 436-441.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="45">
          <name>Publisher</name>
          <description>An entity responsible for making the resource available</description>
          <elementTextContainer>
            <elementText elementTextId="161443">
              <text>Institute of Electrical and Electronics Engineers Inc.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="40">
          <name>Date</name>
          <description>A point or period of time associated with an event in the lifecycle of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="161444">
              <text>2024-01-01</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="43">
          <name>Identifier</name>
          <description>An unambiguous reference to the resource within a given context</description>
          <elementTextContainer>
            <elementText elementTextId="161445">
              <text>&lt;a href="https://doi.org/10.1109/ETNCC63262.2024.10767450" target="_blank" rel="noreferrer noopener"&gt;https://doi.org/10.1109/ETNCC63262.2024.10767450&lt;/a&gt;
&lt;br /&gt;&lt;br /&gt;&lt;a href="https://www.scopus.com/inward/record.uri?eid=2-s2.0-85214688553&amp;amp;doi=10.1109%2FETNCC63262.2024.10767450&amp;amp;partnerID=40&amp;amp;md5=a2c9020001e93dc12593dcd4bc081352" target="_blank" rel="noreferrer noopener"&gt;https://www.scopus.com/inward/record.uri?eid=2-s2.0-85214688553&amp;amp;doi=10.1109%2fETNCC63262.2024.10767450&amp;amp;partnerID=40&amp;amp;md5=a2c9020001e93dc12593dcd4bc081352&lt;/a&gt;</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="47">
          <name>Rights</name>
          <description>Information about rights held in and over the resource</description>
          <elementTextContainer>
            <elementText elementTextId="161446">
              <text>Restricted Access</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="46">
          <name>Relation</name>
          <description>A related resource</description>
          <elementTextContainer>
            <elementText elementTextId="161447">
              <text>ISBN: 979-835035326-6</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="42">
          <name>Format</name>
          <description>The file format, physical medium, or dimensions of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="161448">
              <text>Online</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="44">
          <name>Language</name>
          <description>A language of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="161449">
              <text>English</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="51">
          <name>Type</name>
          <description>The nature or genre of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="161450">
              <text>Conference paper</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="38">
          <name>Coverage</name>
          <description>The spatial or temporal topic of the resource, the spatial applicability of the resource, or the jurisdiction under which the resource is relevant</description>
          <elementTextContainer>
            <elementText elementTextId="161451">
              <text>Kumar P., Maharshi Dayanand University Computer Science Engineering, Haryana, India; Laroia A., University of Texas at Dallas Ms in Business Analytics, TX, United States; Kumar M., Amity University Computer Science Engineering, Uttar Pradesh, India; Laroia A., Birla Institute of Technology, Civil Engineering, Pilani, India; Upreti K., Christ University, Dept. of Computer Science, Delhi NCR Campus, India; Parashar J., Dept. of Computer Science and Engineering, Delhi, India</text>
            </elementText>
          </elementTextContainer>
        </element>
      </elementContainer>
    </elementSet>
  </elementSetContainer>
</item>
