Analysis of security problems in a medical image encryption system
نویسندگان
چکیده
منابع مشابه
Analysis of security problems in a medical image encryption system
Recently, a new system for the secure transmission and efficient storage of medical images interleaved with patient information has been proposed in 2003 by Rajendra Acharya et al. In this paper, we analyse the security of this system, showing how to improve it to obtain a truly secure system.
متن کاملJoint Fingerprinting/Encryption for Medical Image Security
Electronic health records (EHRs) facilitates the healthcare process. However, it can also cause serious security and privacy problems. While various conventional encryption mechanisms can solve some aspects of these problems, they cannot address the illegal distribution of decrypted medical images. To protect decrypted medical images from being illegally distributed by an authorized staff membe...
متن کاملa swot analysis of the english program of a bilingual school in iran
با توجه به جایگاه زبان انگلیسی به عنوان زبانی بین المللی و با در نظر گرفتن این واقعیت که دولت ها و مسئولان آموزش و پرورش در سراسر جهان در حال حاضر احساس نیاز به ایجاد موقعیتی برای کودکان جهت یاد گیری زبان انگلیسی درسنین پایین در مدارس دو زبانه می کنند، تحقیق حاضر با استفاده از مدل swot (قوت ها، ضعف ها، فرصتها و تهدیدها) سعی در ارزیابی مدرسه ای دو زبانه در ایران را دارد. جهت انجام این تحقیق در م...
15 صفحه اولSecurity Analysis of A Chaos-based Image Encryption Algorithm
The security of Fridrich’s algorithm against brute-force attack, statistical attack, known-plaintext attack and selectplaintext attack is analyzed by investigating the properties of the involved chaotic maps and diffusion functions. Based on the given analyses, some means are proposed to strengthen the overall performance of the focused cryptosystem. PACS: 47.52.+j; 89.70.+c
متن کاملDouble Layer Image Security System using Encryption and Steganography
The image security on internet transfers is the concern of the hour as the breaching attacks into the image databases are rising every year. The hackers take advantage of the stolen personal and important images to fulfill their dangerous and unethical intentions. The image data theft can be used to defame a person on the internet by posting the illegal and unacceptable images of that person (i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers in Biology and Medicine
سال: 2007
ISSN: 0010-4825
DOI: 10.1016/j.compbiomed.2006.04.002