Securing E-Healthcare Images Using an Efficient Image Encryption Model
نویسندگان
چکیده
With the advancements in e-healthcare services, it is possible to provide remote medical services patients and swifter first aid. Medical images play an essential role applications for providing quick better diagnosis treatment patients. generally comprise secret details about are therefore prone various security threats during their transmission over public networks. Thus, required secure these prior communication But due distinctive properties of images, like higher correlation redundancy among pixels, larger size, design efficient encryption model resist against threats. In this paper, proposed. To obtain keys, six-dimensional hyperchaotic map (SDHM) Firstly, plain image divided into three channels such as red, green, blue. Secret keys used diffuse channels. Lastly, encrypted concatenated final obtained. Extensive experiments drawn by considering benchmark images. Also, comparisons performed proposed SDHM competitive techniques performance metrics. Comparative analysis reveals that achieves remarkably good than existing models.
منابع مشابه
Securing Medical Images by Image Encryption using Key Image
This paper presents two methods for encryption and decryption of images using XOR operation. In the first method the original image is encrypted by the key image using XOR operation and decryption process also uses the same key image with XOR operation. In the second method one of the bit planes of the key image is used for encrypting the bit planes of the original image and shuffling is done f...
متن کاملSecuring Healthcare Records in the Cloud Using Attribute-Based Encryption
Cloud Computing has attracted interest as an efficient system for storing and access of data. Sharing of personal electronic health record is an arising concept of exchanging health information for research and other purposes. Cconfidentiality except for authorized users, and access auditability are strong security requirements for health record. This study will examine these requirements and p...
متن کاملSecuring Healthcare Records Using Proxy Re-Encryption Scheme in Cloud
The advent of semi-conductors emerged day to day and lead us to the current trend of Cloud computing, which brings the information required to our life at our finger tips. The technology of today is getting expanded every day, especially in the management of EHR’s. In order to provide high security for health care data we need a strong security mechanism for EHR, Proxy re-encryption schemes are...
متن کاملAn Efficient Smart Card Based Authentication Scheme Using Image Encryption
CHIN-CHEN CHANG, HSIAO-LING WU, ZHI-HUI WANG AND QIAN MAO Department of Information Engineering and Computer Science Feng Chia University Taichung, 407 Taiwan Department of Computer Science and Information Engineering Asia University Taichung, 413 Taiwan School of Software Dalian University of Technology Dalian City, 116 P.R. China Department of Optical-Electrical and Computer Engineering Unive...
متن کاملEfficient Image Encryption Using Mrf and Ecc
In this era, network security has become an issue of importance, on which lot of research is going on. We have proposed a two level image encryption method using elliptic curve cryptography (ECC) which has been made more efficient by Markov random field (MRF). In this method a texture image generated using seed by MRF. This seed is use as secrete key that generated by elliptic curve method. XOR...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Scientific Programming
سال: 2022
ISSN: ['1058-9244', '1875-919X']
DOI: https://doi.org/10.1155/2022/6438331