2021
DOI: 10.1049/ipr2.12263
|View full text |Cite
|
Sign up to set email alerts
|

Medical image encryption scheme based on self‐verification matrix

Abstract: To mitigate the shortcomings of existing medical image encryption algorithms, including a lack of anti-tampering methods and security, this report presents an anti-tampering encryption algorithm for medical images that is based on a self-verification matrix. First, chaotic coordinates generated by chaos are used to traverse all pixels in a plain image to generate a two-dimensional matrix (a self-verification matrix) with positioning information. The accurate location of illegally altered image pixels can be de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 57 publications
0
4
0
Order By: Relevance
“…Compared with the correlation coefficient of the medical image in Table 14 , the correlation coefficient of the encrypted image obtained by this algorithm is slightly lower than the [ 47 , 48 ], and slightly higher than the [ 49 ]. Compared with the correlation coefficient of ordinary images in Table 15 , the correlation coefficient of the encrypted image obtained by this algorithm is slightly lower than that of [ 1 ], and slightly higher than that of [ 33 , 54 ].…”
Section: Simulation Results and Security Analysismentioning
confidence: 79%
See 1 more Smart Citation
“…Compared with the correlation coefficient of the medical image in Table 14 , the correlation coefficient of the encrypted image obtained by this algorithm is slightly lower than the [ 47 , 48 ], and slightly higher than the [ 49 ]. Compared with the correlation coefficient of ordinary images in Table 15 , the correlation coefficient of the encrypted image obtained by this algorithm is slightly lower than that of [ 1 ], and slightly higher than that of [ 33 , 54 ].…”
Section: Simulation Results and Security Analysismentioning
confidence: 79%
“…In the Table 18 , use MI instead of medical image. It can be seen from Table 18 that the encryption and decryption time of this algorithm is slightly longer than that of [ 48 ], which is slightly shorter than the other 3 references. The encryption and decryption time can be controlled at about 1 second.…”
Section: Simulation Results and Security Analysismentioning
confidence: 87%
“…In recent years, researchers have facilitated the transmission of images through image encryption [6][7][8], image watermarking [9] and data hiding [10] methods. Among them, image encryption is the most direct and effective way to protect images.…”
Section: Introductionmentioning
confidence: 99%
“…With the rapid generation of voluminous data from diverse smart information sources, private and public corporations face the challenge of effectively managing big data throughout its life cycle to extract value from it [9,10]. Data security is also an essential part of its life cycle, and machine-learning-based encryption algorithms have been presented as well to safeguard data from security breaches and threats [11,12]. In recent years, data-driven organizations in the public and private sectors have developed data strategies and policies aligned with their goals and mission.…”
Section: Introductionmentioning
confidence: 99%