2018
DOI: 10.1007/s10916-018-1053-z
|View full text |Cite
|
Sign up to set email alerts
|

Medical Image Security Using Dual Encryption with Oppositional Based Optimization Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 74 publications
(19 citation statements)
references
References 27 publications
0
19
0
Order By: Relevance
“…During the key generation stage, the important domain parameters namely private/public keys are generated and a certificate for the public key for each client is created, in addition, consider a prime number PN. The elements of the system are divided into a pair of fields namely prime and binary fields [13]. The proper field is considered for the cryptographic processes with maximum attention.…”
Section: Key Generation Processmentioning
confidence: 99%
“…During the key generation stage, the important domain parameters namely private/public keys are generated and a certificate for the public key for each client is created, in addition, consider a prime number PN. The elements of the system are divided into a pair of fields namely prime and binary fields [13]. The proper field is considered for the cryptographic processes with maximum attention.…”
Section: Key Generation Processmentioning
confidence: 99%
“…1 Qilu University of Technology (Shandong Academy of Science), Shandong Provincial Key Laboratory of Computer Networks Jinan, Jinan, China. 2 School of Computing, University of South Alabama, Mobile, AL 36688, USA. 3 College of Allied Health Professions, University of South Alabama, Mobile, AL 36608, USA.…”
Section: Fundingmentioning
confidence: 99%
“…Unfortunately, the quickest (and generally efficient) means of sharing medical images typically is via open networks, such as file share and/or emails. These types of transmissions expose the images to activities such as content tampering, illegal copying, and copyright loss [2]. As a result, research in medical image security has grown, with some foci emphasis in the areas of image encryption and information hiding [3].…”
Section: Introductionmentioning
confidence: 99%
“…Performing the secure hash function on Capture ID by SHA-160, the output block size has 160 bit (Message Digest Length = 160). With initial input Key was "acef" and initial hash value were: (11), then the output will be:…”
Section: Indonesian J Elec Eng and Comp Sci Issn: 2502-4752 mentioning
confidence: 99%
“…In T. Avudaiappan [11], the dual encryption procedure such as signcryption algorithms and blowfish are used to implement the security model for medical images. In the encryption process, using OFP based signcryption technique the Public key and the private key are optimized.…”
Section: Introductionmentioning
confidence: 99%