2022
DOI: 10.1007/s11042-022-14093-3
|View full text |Cite
|
Sign up to set email alerts
|

An optical-based encryption and authentication algorithm for color and grayscale medical images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 51 publications
0
8
0
Order By: Relevance
“…For our proposed encryption algorithm, the precision of the initial values, which are used to generate the . Reproduced from [60], with permission from Springer Nature chaotic sequences for the encryption process, is set to 10 -15 . This precision allows for a significantly large number of variations in the initial conditions, leading to a correspondingly vast key space.…”
Section: • Key Space Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…For our proposed encryption algorithm, the precision of the initial values, which are used to generate the . Reproduced from [60], with permission from Springer Nature chaotic sequences for the encryption process, is set to 10 -15 . This precision allows for a significantly large number of variations in the initial conditions, leading to a correspondingly vast key space.…”
Section: • Key Space Analysismentioning
confidence: 99%
“…These attacks involve the removal of portions of the encrypted image, aiming to disrupt the content and complicate the decryption process. An effective encryption algorithm must ensure that the loss of any part of the image does not irreversibly damage the information, allowing for the restoration of the original image upon decryption [60].…”
Section: • Cropping Attack Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Following 8-bit conversion, the images are grayscaled, ensuring that they are represented in grayscale intensity levels [89]. Grayscaling simplifies the images by reducing them to a single channel, which eliminates color information.…”
Section: Grayscalingmentioning
confidence: 99%
“…Hash-based message authentication code (HMAC) was addressed in [20], in which the authors focused on the authentication of images from the healthcare domain. They proposed an optical algorithm that ensures the efficiency and security of medical image transmission.…”
Section: Cryptography-based Image Authenticationmentioning
confidence: 99%