2016
DOI: 10.3233/thc-161166
|View full text |Cite
|
Sign up to set email alerts
|

Research on medical image encryption in telemedicine systems

Abstract: Abstract. Recently, advances in computers and high-speed communication tools have led to enhancements in remote medical consultation research. Laws in some localities require hospitals to encrypt patient information (including images of the patient) before transferring the data over a network. Therefore, developing suitable encryption algorithms is quite important for modern medicine. This paper demonstrates a digital image encryption algorithm based on chaotic mapping, which uses the no-period and no-converge… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(14 citation statements)
references
References 9 publications
0
14
0
Order By: Relevance
“…In this situation, one way of protecting the medical images is through encryption schemes where the images are encrypted in such a way that they become useless for the users with no encryption information in hand. Some of the security solution for telemedicine applications are discussed in [13,32].…”
Section: Introductionmentioning
confidence: 99%
“…In this situation, one way of protecting the medical images is through encryption schemes where the images are encrypted in such a way that they become useless for the users with no encryption information in hand. Some of the security solution for telemedicine applications are discussed in [13,32].…”
Section: Introductionmentioning
confidence: 99%
“…The Logistic map, also known as the insect population model in ecology [ 21 ], is a typical nonlinear chaotic system, which is highly sensitive to the initial state [ 1 ] and can produce complex chaotic behaviors [ 33 ]. This system has been widely used in the research field of medical image encryption [ 1 , 7 , 8 , 10 , 12 , 17 , 20 22 , 24 , 27 , 28 , 33 , 37 , 39 , 40 , 43 , 47 , 53 , 54 , 62 , 65 , 68 , 73 , 74 , 76 , 77 ]. The original 1-D Logistic chaotic map can be defined by the following Eq.…”
Section: Preliminariesmentioning
confidence: 99%
“…82,83 For image transfer, specific algorithms have been developed, like the Joint Watermarking-Encryption, which offers confidentiality, integrity, authenticity, and traceability functionalities, 84 and newer algorithms that combine traditional image encryption and image hiding with chaos theory, with improved processing. 85 Nonrepudiation implies that a person cannot deny responsibility for a certain transaction. This principle is important to maintain in audits because a person implicated by an audit should not be able to repudiate responsibility.…”
Section: Privacy Concerns and Confidentialitymentioning
confidence: 99%