Demla et al., 2024 - Google Patents
MieWC: medical image encryption using wavelet transform and multiple chaotic mapsDemla et al., 2024
- Document ID
- 12487156325417390055
- Author
- Demla K
- Anand A
- Publication year
- Publication venue
- Security and Privacy
External Links
Snippet
Recently, digital images have been widely used in several applications through advanced wearable devices and networks. Despite several benefits of digital images, such as easy distribution, storage, and reproduction, it is difficult to prevent the issue of identity theft …
- 230000000739 chaotic effect 0 title abstract description 20
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
- G06F7/582—Pseudo-random number generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Kumar et al. | IEHC: An efficient image encryption technique using hybrid chaotic map | |
| Al-Roithy et al. | Remodeling randomness prioritization to boost-up security of RGB image encryption | |
| Doss et al. | Memetic optimization with cryptographic encryption for secure medical data transmission in IoT-based distributed systems | |
| Li et al. | [Retracted] Medical Image Encryption Based on 2D Zigzag Confusion and Dynamic Diffusion | |
| Koppu et al. | A fast enhanced secure image chaotic cryptosystem based on hybrid chaotic magic transform | |
| Gafsi et al. | Efficient encryption system for numerical image safe transmission | |
| Abdul-Kareem et al. | An image encryption algorithm using hybrid sea lion optimization and chaos theory in the hartley domain | |
| Abdul-Kareem et al. | Hybrid image encryption algorithm based on compressive sensing, gray wolf optimization, and chaos | |
| Demla et al. | MieWC: medical image encryption using wavelet transform and multiple chaotic maps | |
| Mohamed et al. | Fast and robust image encryption scheme based on quantum logistic map and hyperchaotic system | |
| Hazzazi et al. | Enhancing image security via chaotic maps, Fibonacci, Tribonacci transformations, and DWT diffusion: a robust data encryption approach | |
| Maiti et al. | An efficient and secure method of plaintext-based image encryption using Fibonacci and Tribonacci transformations | |
| Amrit et al. | Deep learning-based segmentation for medical data hiding with Galois field | |
| Shafique et al. | A hybrid encryption framework leveraging quantum and classical cryptography for secure transmission of medical images in IoT-based telemedicine networks | |
| Geetha et al. | Multiple share creation based visual cryptographic scheme using diffusion method with a combination of chaotic maps for multimedia applications | |
| Zhang et al. | A variable dimensional chaotic map-based medical image encryption algorithm with multi-mode | |
| Shankar et al. | A novel hybrid encryption method using S-box and Henon maps for multidimensional 3D medical images | |
| Demla et al. | RISE: Rubik’s cube and image segmentation based secure medical images encryption | |
| Alenizi et al. | A Review of Image Steganography Based on Multiple Hashing Algorithm. | |
| Alharbi et al. | A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos‐Based Quantum Map | |
| CN118509152B (en) | A quantum classical hybrid image encryption method and system | |
| Ge | ALCencryption: A secure and efficient algorithm for medical image encryption | |
| Das et al. | A metamorphic cryptography approach towards securing medical data using chaotic sequences and Ramanujan conjecture | |
| Chen et al. | A region-selective anti-compression image encryption algorithm based on deep networks | |
| Dawood et al. | A comprehensive review of color image encryption technology |