2020
DOI: 10.1364/ao.410329
|View full text |Cite
|
Sign up to set email alerts
|

Medical image encryption based on biometric keys and lower–upper decomposition with partial pivoting

Abstract: The security of medical image transmission in telemedicine is very important to patients’ privacy and health. A new asymmetric medical image encryption scheme is proposed. The medical image is encrypted by two spiral phase masks (SPM) and the lower–upper decomposition with partial pivoting, where the SPM is generated from the iris, chaotic random phase mask, and amplitude truncated spiral phase transformation. The proposed scheme has the following advantages: First, the iris is used for medical image encryptio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 46 publications
0
4
0
Order By: Relevance
“…Additionally, the secret key is usually meaningless and has nothing to do with the user. If the secret key is lost or stolen, anyone can use the key for decryption [30]. In order to address these issues, this paper proposes the use of biometric images, such as face, iris, fingerprint and palmprint (i.e., figures 1(a)-(d)), as secret keys.…”
Section: Biometric Key and Its Equivalent Keystreammentioning
confidence: 99%
“…Additionally, the secret key is usually meaningless and has nothing to do with the user. If the secret key is lost or stolen, anyone can use the key for decryption [30]. In order to address these issues, this paper proposes the use of biometric images, such as face, iris, fingerprint and palmprint (i.e., figures 1(a)-(d)), as secret keys.…”
Section: Biometric Key and Its Equivalent Keystreammentioning
confidence: 99%
“…The author proposed a new encryption technique based on the parameterized all-phase orthogonal transformation. In [32], the iris is used to generate two spiral phase masks. They are used with the lower-upper decomposition with partial pivoting to encrypt the medical image.…”
Section: Related Workmentioning
confidence: 99%
“…However, once the image is decrypted, the image is no longer protected [15][16][17]. Although current medical image encryption algorithms play strong roles in protecting the security of medical images, the security level of medical images is still limited because medical images may involve the privacy of many patients, some of which are confidential and sensitive [18]. In [19], a medical image encryption algorithm based on the Goldreich-Goldwasser-Halevi encryption scheme was studied.…”
Section: Introductionmentioning
confidence: 99%
“…That algorithm exhibits strong robustness and the ability to resist statistical and differential attacks. In [18], an asymmetric medical image encryption scheme was proposed with an iris for medical image encryption to improve the security of the encryption scheme. Second, asymmetric optical encryption technology was combined with three-dimensional Lorenz chaos technology to improve the key space and solve the linear problem based on double random phase coding.…”
Section: Introductionmentioning
confidence: 99%