2020
DOI: 10.11591/ijeecs.v19.i3.pp1316-1324
|View full text |Cite
|
Sign up to set email alerts
|

A chaos-based medical image encryption method

Abstract: <span lang="EN-US">The information in the e-health system involves the patient’s privacy which is extremely sensitive. For instance, these information record social security numbers and detailed medical history.  When the breach happens, there are illegal, or disclosure behaviors taken to privacy that should be compromised security. In this paper, the medical digital images are protected by the proposed chaos-based encryption method in the process of transmission and utilization. Then the authentication … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 23 publications
0
4
0
Order By: Relevance
“…Recently, many image encryption techniques have been proposed to verify interactive media data before transmission over insecure channels. We will list the most recent ones; in 2018 and 2020, [12] and [13] respectively have been are involved Hill [14] and Elliptic Curve cryptosystem [4], [15] in technique to encrypt and decrypt, they have been proved that it was more hard for the interloper attackers Wang and Tu [16] in 2020, involved concepts of chaotic system [17] to do encryption for medical image, they protected them in the process of transmission and utilization. Concepts of chaotic system was also involved in image encryption in 2020 [18], image encryption was applied with numbers were generated in LabVIEW software [19], Depending on the metrics used, the proposed method was acceptable.…”
Section: Image Encryptionmentioning
confidence: 99%
“…Recently, many image encryption techniques have been proposed to verify interactive media data before transmission over insecure channels. We will list the most recent ones; in 2018 and 2020, [12] and [13] respectively have been are involved Hill [14] and Elliptic Curve cryptosystem [4], [15] in technique to encrypt and decrypt, they have been proved that it was more hard for the interloper attackers Wang and Tu [16] in 2020, involved concepts of chaotic system [17] to do encryption for medical image, they protected them in the process of transmission and utilization. Concepts of chaotic system was also involved in image encryption in 2020 [18], image encryption was applied with numbers were generated in LabVIEW software [19], Depending on the metrics used, the proposed method was acceptable.…”
Section: Image Encryptionmentioning
confidence: 99%
“…So, it modifies a 2D-LSCM that generates a sequence of random keys to improve a permutation and substitution for encryption a color image. The original 2D-LSCM is described in (1) as [28]:…”
Section: Random Chaotic Mapmentioning
confidence: 99%
“…These characteristics are deterministic, nonlinear and highly sensitive to any change in the initial value. So, it is suitable for image encryption [26][27][28][29]. However, the researchers still defect and try finding a novel method to encrypt the R, G, B components in mixing not independently by using appropriate confusion-diffusion architecture [25].…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, several image encryption techniques have been designed over years. Some of these techniques include optical encryption [1] block-based encryption [2], [3] decomposition encryption [4], public key and distributive key encryption [5], [6] deoxyribonucleic acid (DNA) and genetic encryption [7], digital image encryption [8], [9] and others.…”
Section: Introductionmentioning
confidence: 99%