2015
DOI: 10.1016/j.image.2015.03.005
|View full text |Cite
|
Sign up to set email alerts
|

Encryption of medical images based on the cosine number transform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
34
0
3

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 97 publications
(46 citation statements)
references
References 27 publications
0
34
0
3
Order By: Relevance
“…The cosine transform over a finite field is known as the finite field cosine transform (FFCT), which is defined in [16]. This FFCT has been used in image encryption [17][18][19] with a high level security over the encrypted image. The decrypted images obtained for the decryption system based on the use of FFCT have a high level of image quality in comparison to the image quality of the resulting decrypted images in several optical decryption systems, because the FFCT over a finite field have no rounding and overflow problems [20][21][22].…”
Section: Introductionmentioning
confidence: 99%
“…The cosine transform over a finite field is known as the finite field cosine transform (FFCT), which is defined in [16]. This FFCT has been used in image encryption [17][18][19] with a high level security over the encrypted image. The decrypted images obtained for the decryption system based on the use of FFCT have a high level of image quality in comparison to the image quality of the resulting decrypted images in several optical decryption systems, because the FFCT over a finite field have no rounding and overflow problems [20][21][22].…”
Section: Introductionmentioning
confidence: 99%
“…The normalized entropy [6] of the ciphered image is defined aswhere P is the number of different values that the pixels of the ciphered image can assume, is the amount of pixels of the ciphered image that assume value i , and N is the total amount of pixels of the ciphered image. During the experiments, we found that the ciphered pixels’ intensity of all the algorithms mentioned in the paper are almost equiprobable, so their normalized entropy are all approximate to 1.…”
Section: Numerical Simulation Resultsmentioning
confidence: 99%
“…In recent years, numerous studies on encryption of medical images, such as computed tomography (CT) and magnetic resonance imaging (MRI), have been reported [16], although most of them did not consider compression during encryption. The storage, transmission, and retrieval of massive bio-information should meet several compulsory requirements [7]: (1) high efficiency for rapid transmission and prompt retrieval; (2) strict information security to guarantee users’ privacy; and (3) high data fidelity to preserve the pathological information.…”
Section: Introductionmentioning
confidence: 99%
“…Nonetheless, a number of approaches, based on conventional encryption schemes such as AES, has been proposed to protect medical records in the DICOM system (31) and in many other research papers (32)- (34). However, traditional cryptographic algorithms are defined mainly to protect textual data.…”
Section: Problem Definitionmentioning
confidence: 99%