Ge, 2020 - Google Patents
ALCencryption: A secure and efficient algorithm for medical image encryptionGe, 2020
View PDF- Document ID
- 8130261883195137023
- Author
- Ge J
- Publication year
- Publication venue
- Computer Modeling in Engineering & Sciences
External Links
Snippet
With the rapid development of medical informatization and the popularization of digital imaging equipment, DICOM images contain the personal privacy of patients, and there are security risks in the process of storage and transmission, so it needs to be encrypted. In …
- 238000009792 diffusion process 0 abstract description 7
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
- G06F17/16—Matrix or vector computation, e.g. matrix-matrix or matrix-vector multiplication, matrix factorization
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/28—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication using particular encryption algorithm
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Kumar et al. | IEHC: An efficient image encryption technique using hybrid chaotic map | |
| Yasser et al. | A new image encryption scheme based on hybrid chaotic maps | |
| Lima et al. | Encryption of medical images based on the cosine number transform | |
| Zhou et al. | Quantum image encryption based on generalized Arnold transform and double random-phase encoding | |
| Masood et al. | A novel image encryption scheme based on Arnold cat map, Newton-Leipnik system and Logistic Gaussian map | |
| Alrubaie et al. | Image encryption based on 2DNA encoding and chaotic 2D logistic map | |
| Rezaei et al. | An image encryption approach using tuned Henon chaotic map and evolutionary algorithm | |
| Zhang et al. | Privacy-preserving feature extraction for medical images based on fully homomorphic encryption | |
| Verma et al. | Quantum image encryption algorithm based on 3D-BNM chaotic map | |
| Elrefaey et al. | Parallel approaches to improve the speed of chaotic-maps-based encryption using GPU | |
| Jiang et al. | Image encryption algorithm based on 2D‐CLICM chaotic system | |
| Hu et al. | Quantum color image encryption based on a novel 3D chaotic system | |
| Abdul-Kareem et al. | An image encryption algorithm using hybrid sea lion optimization and chaos theory in the hartley domain | |
| Devi et al. | Entropy influenced RNA diffused quantum chaos to conserve medical data privacy | |
| Gao et al. | New image encryption algorithm based on hyperchaotic 3D-IHAL and a hybrid cryptosystem | |
| Mohamed et al. | Fast and robust image encryption scheme based on quantum logistic map and hyperchaotic system | |
| Alexan et al. | A new fast multiple color image encryption algorithm | |
| Yepdia et al. | Secure transmission of medical image for telemedicine | |
| Ge | ALCencryption: A secure and efficient algorithm for medical image encryption | |
| Long et al. | A LE-controlled 4D non-degenerate hyperchaotic system and STP-CS model based efficient image encryption algorithm | |
| Qin et al. | Image encryption algorithm based on COA and hyperchaotic Lorenz system | |
| Amaithi Rajan et al. | QMedShield: a novel quantum chaos-based image encryption scheme for secure medical image storage in the cloud | |
| Shafique et al. | A hybrid encryption framework leveraging quantum and classical cryptography for secure transmission of medical images in IoT-based telemedicine networks | |
| Shankar et al. | A novel hybrid encryption method using S-box and Henon maps for multidimensional 3D medical images | |
| Agarwal et al. | Secure chaotic image encryption method using random graph traversal and three step diffusion |