+

Demla et al., 2024 - Google Patents

MieWC: medical image encryption using wavelet transform and multiple chaotic maps

Demla et al., 2024

Document ID
12487156325417390055
Author
Demla K
Anand A
Publication year
Publication venue
Security and Privacy

External Links

Snippet

Recently, digital images have been widely used in several applications through advanced wearable devices and networks. Despite several benefits of digital images, such as easy distribution, storage, and reproduction, it is difficult to prevent the issue of identity theft …
Continue reading at onlinelibrary.wiley.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • G06F7/582Pseudo-random number generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/08Randomization, e.g. dummy operations or using noise
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking

Similar Documents

Publication Publication Date Title
Kumar et al. IEHC: An efficient image encryption technique using hybrid chaotic map
Al-Roithy et al. Remodeling randomness prioritization to boost-up security of RGB image encryption
Doss et al. Memetic optimization with cryptographic encryption for secure medical data transmission in IoT-based distributed systems
Li et al. [Retracted] Medical Image Encryption Based on 2D Zigzag Confusion and Dynamic Diffusion
Koppu et al. A fast enhanced secure image chaotic cryptosystem based on hybrid chaotic magic transform
Gafsi et al. Efficient encryption system for numerical image safe transmission
Abdul-Kareem et al. An image encryption algorithm using hybrid sea lion optimization and chaos theory in the hartley domain
Abdul-Kareem et al. Hybrid image encryption algorithm based on compressive sensing, gray wolf optimization, and chaos
Demla et al. MieWC: medical image encryption using wavelet transform and multiple chaotic maps
Mohamed et al. Fast and robust image encryption scheme based on quantum logistic map and hyperchaotic system
Hazzazi et al. Enhancing image security via chaotic maps, Fibonacci, Tribonacci transformations, and DWT diffusion: a robust data encryption approach
Maiti et al. An efficient and secure method of plaintext-based image encryption using Fibonacci and Tribonacci transformations
Amrit et al. Deep learning-based segmentation for medical data hiding with Galois field
Shafique et al. A hybrid encryption framework leveraging quantum and classical cryptography for secure transmission of medical images in IoT-based telemedicine networks
Geetha et al. Multiple share creation based visual cryptographic scheme using diffusion method with a combination of chaotic maps for multimedia applications
Zhang et al. A variable dimensional chaotic map-based medical image encryption algorithm with multi-mode
Shankar et al. A novel hybrid encryption method using S-box and Henon maps for multidimensional 3D medical images
Demla et al. RISE: Rubik’s cube and image segmentation based secure medical images encryption
Alenizi et al. A Review of Image Steganography Based on Multiple Hashing Algorithm.
Alharbi et al. A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos‐Based Quantum Map
CN118509152B (en) A quantum classical hybrid image encryption method and system
Ge ALCencryption: A secure and efficient algorithm for medical image encryption
Das et al. A metamorphic cryptography approach towards securing medical data using chaotic sequences and Ramanujan conjecture
Chen et al. A region-selective anti-compression image encryption algorithm based on deep networks
Dawood et al. A comprehensive review of color image encryption technology
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载