Securing E-Healthcare Images Using an Efficient Image Encryption Model

نویسندگان

چکیده

With the advancements in e-healthcare services, it is possible to provide remote medical services patients and swifter first aid. Medical images play an essential role applications for providing quick better diagnosis treatment patients. generally comprise secret details about are therefore prone various security threats during their transmission over public networks. Thus, required secure these prior communication But due distinctive properties of images, like higher correlation redundancy among pixels, larger size, design efficient encryption model resist against threats. In this paper, proposed. To obtain keys, six-dimensional hyperchaotic map (SDHM) Firstly, plain image divided into three channels such as red, green, blue. Secret keys used diffuse channels. Lastly, encrypted concatenated final obtained. Extensive experiments drawn by considering benchmark images. Also, comparisons performed proposed SDHM competitive techniques performance metrics. Comparative analysis reveals that achieves remarkably good than existing models.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing Medical Images by Image Encryption using Key Image

This paper presents two methods for encryption and decryption of images using XOR operation. In the first method the original image is encrypted by the key image using XOR operation and decryption process also uses the same key image with XOR operation. In the second method one of the bit planes of the key image is used for encrypting the bit planes of the original image and shuffling is done f...

متن کامل

Securing Healthcare Records in the Cloud Using Attribute-Based Encryption

Cloud Computing has attracted interest as an efficient system for storing and access of data. Sharing of personal electronic health record is an arising concept of exchanging health information for research and other purposes. Cconfidentiality except for authorized users, and access auditability are strong security requirements for health record. This study will examine these requirements and p...

متن کامل

Securing Healthcare Records Using Proxy Re-Encryption Scheme in Cloud

The advent of semi-conductors emerged day to day and lead us to the current trend of Cloud computing, which brings the information required to our life at our finger tips. The technology of today is getting expanded every day, especially in the management of EHR’s. In order to provide high security for health care data we need a strong security mechanism for EHR, Proxy re-encryption schemes are...

متن کامل

An Efficient Smart Card Based Authentication Scheme Using Image Encryption

CHIN-CHEN CHANG, HSIAO-LING WU, ZHI-HUI WANG AND QIAN MAO Department of Information Engineering and Computer Science Feng Chia University Taichung, 407 Taiwan Department of Computer Science and Information Engineering Asia University Taichung, 413 Taiwan School of Software Dalian University of Technology Dalian City, 116 P.R. China Department of Optical-Electrical and Computer Engineering Unive...

متن کامل

Efficient Image Encryption Using Mrf and Ecc

In this era, network security has become an issue of importance, on which lot of research is going on. We have proposed a two level image encryption method using elliptic curve cryptography (ECC) which has been made more efficient by Markov random field (MRF). In this method a texture image generated using seed by MRF. This seed is use as secrete key that generated by elliptic curve method. XOR...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Scientific Programming

سال: 2022

ISSN: ['1058-9244', '1875-919X']

DOI: https://doi.org/10.1155/2022/6438331