An Efficient Medical Image Protection Scheme with Parallel Chaotic Key Stream Generation

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cyclic-Shift Chaotic Medical Image Encryption Algorithm Based on Plain Text Key-Stream

With the growing popularity of the Internet and the fast expanding to a variety of medical equipment, medical imaging technology has become increasingly sophisticated, especially the telemedicine is increasing rapidly. Therefore, in the process of transmission and storage of medical image, it is very important to encrypt it. However, compared with ordinary images, medical images contain patient...

متن کامل

An Efficient Medical Image Cryptosystem Based on Chaotic Maps

With the growing applications of digital images in medical health system and the development of computer networks, medical image encryption has become an important technology to protect patients’ privacy when it is transmitted over open networks. Recently, chaos-based encryption approaches have been proven to be more effective for image encryption than other traditional methods (e.g. IDEA and A...

متن کامل

Efficient Key Generation for Dynamic Blom's Scheme

The need for secure communication between the nodes in a network has led to the development of various key distribution schemes. Blom’s scheme is a prominent key exchange protocol used for sensor and wireless networks, but its shortcomings include large computation overhead and memory cost. In this paper, we propose an efficient key management scheme by generating new public and private keys. W...

متن کامل

A Novel Medical Image Protection Scheme Using a 3-Dimensional Chaotic System

Recently, great concerns have been raised regarding the issue of medical image protection due to the increasing demand for telemedicine services, especially the teleradiology service. To meet this challenge, a novel chaos-based approach is suggested in this paper. To address the security and efficiency problems encountered by many existing permutation-diffusion type image ciphers, the new schem...

متن کامل

An Efficient Software Protection Scheme

Software piracy has been considered one of the biggest problems of this industry since computers became popular. Solutions for this problem based in tamperproof hardware tokens have been introduced in the literature. All these solutions depend on two premises: (a) the physical security of the tamperproof device and (b) the difficulty to analyze and modify the software in order to bypass the che...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Information Technology Journal

سال: 2014

ISSN: 1812-5638

DOI: 10.3923/itj.2014.1602.1611