2019
DOI: 10.1109/access.2019.2910563
|View full text |Cite
|
Sign up to set email alerts
|

Galois Field-Based Image Encryption for Remote Transmission of Tumor Ultrasound Images

Abstract: The remote transmission of tumor ultrasound images is an important link in telemedicine. Based on the Galois field (GF), this paper proposes an encryption algorithm that ensures the security of tumor ultrasound images (TUIs) during the transmission. First, the grayscale image of the TUI was generated by the secure hash algorithm 1 (SHA-1) algorithm, and the resulting hash value was taken as the medical record summary, which was used to monitor the transmission of the TUI. Second, the 2D ciphertext image was ex… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…The medical domain and image search face critical issues that must be addressed in the proposed work. The implementation of the desired technique, the performance and classification of SVM 31 with the various kernel functions implemented in the system are evaluated, and the results are summarized. The brain tumor dataset was gathered at the Institute of Oncology, University Medical Centre Ljubljana, Yugoslavia.…”
Section: Proposed Solutionmentioning
confidence: 99%
“…The medical domain and image search face critical issues that must be addressed in the proposed work. The implementation of the desired technique, the performance and classification of SVM 31 with the various kernel functions implemented in the system are evaluated, and the results are summarized. The brain tumor dataset was gathered at the Institute of Oncology, University Medical Centre Ljubljana, Yugoslavia.…”
Section: Proposed Solutionmentioning
confidence: 99%
“…In [15], the secure transmission of medical records through a community network is managed effectively. To improve protection and confirmation of medical proceedings, a watermark method is used for identification and reference.…”
Section: Summary Of Related Workmentioning
confidence: 99%
“…SHA-256 was also used to obtain the initial values for secret keys. In [42], Wang et al encrypted the medical images based on Galois field. In [43], Shankar et al used adaptive grasshopper optimization algorithm to select the optimal secret key to encrypt the medical images.…”
Section: Literature Reviewmentioning
confidence: 99%