2017
DOI: 10.1155/2017/6729896
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid Chaotic and Number Theoretic Approach for Securing DICOM Images

Abstract: The advancements in telecommunication and networking technologies have led to the increased popularity and widespread usage of telemedicine. Telemedicine involves storage and exchange of large volume of medical records for remote diagnosis and improved health care services. Images in medical records are characterized by huge volume, high redundancy, and strong correlation among adjacent pixels. This research work proposes a novel idea of integrating number theoretic approach with Henon map for secure and effic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
26
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 46 publications
(26 citation statements)
references
References 27 publications
0
26
0
Order By: Relevance
“…We compare both images to detect a correlation between the plain image and the encrypted image. Using a practical algorithm, -0.0012 0.0099 -0.0032 [24] 0.0027 0.0015 0.0019 [25] 0.0023 -0.0010 0.0009 [26] 0.0944 0.0057 0.0067 [15] 0.0098 -0.0078 0.0181…”
Section: Analysis Of Differential Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…We compare both images to detect a correlation between the plain image and the encrypted image. Using a practical algorithm, -0.0012 0.0099 -0.0032 [24] 0.0027 0.0015 0.0019 [25] 0.0023 -0.0010 0.0009 [26] 0.0944 0.0057 0.0067 [15] 0.0098 -0.0078 0.0181…”
Section: Analysis Of Differential Attackmentioning
confidence: 99%
“…The results show that our proposed algorithm is highly capable of resisting differential attacks. [23] 99.610 33.261 [24] 99.532 33.450 [25] 99.51 33.39 [26] 99.79 33.16 [15] 99.6067 33.4954…”
Section: Analysis Of Differential Attackmentioning
confidence: 99%
“…This CS based image security method offers good security features because of chaos properties such as sensitivity to an initial state and pseudo-randomness [4]. However, such CS has certain drawbacks for providing security because of its simplicity and smaller key space [5,15]. ECDH (Elliptic Curve Diffie-Hellman) management methodology used in numerous applications.…”
Section: Introductionmentioning
confidence: 99%
“…In this approach, a 2D Key matrix was generated through modular exponentiation of the primitive roots of the prime which was derived from the number theory. Further, the key matrix was controlled and confused by the henon map through which subkeys were generated for performing the encryption [9]. One another chaotic map has been employed by Arun Fera and Suresh Jaganathan in which a dual process has been carried out to accomplish the encryption.…”
Section: Introductionmentioning
confidence: 99%