An Efficient Medical Image Protection Scheme with Parallel Chaotic Key Stream Generation
نویسندگان
چکیده
منابع مشابه
Cyclic-Shift Chaotic Medical Image Encryption Algorithm Based on Plain Text Key-Stream
With the growing popularity of the Internet and the fast expanding to a variety of medical equipment, medical imaging technology has become increasingly sophisticated, especially the telemedicine is increasing rapidly. Therefore, in the process of transmission and storage of medical image, it is very important to encrypt it. However, compared with ordinary images, medical images contain patient...
متن کاملAn Efficient Medical Image Cryptosystem Based on Chaotic Maps
With the growing applications of digital images in medical health system and the development of computer networks, medical image encryption has become an important technology to protect patients’ privacy when it is transmitted over open networks. Recently, chaos-based encryption approaches have been proven to be more effective for image encryption than other traditional methods (e.g. IDEA and A...
متن کاملEfficient Key Generation for Dynamic Blom's Scheme
The need for secure communication between the nodes in a network has led to the development of various key distribution schemes. Blom’s scheme is a prominent key exchange protocol used for sensor and wireless networks, but its shortcomings include large computation overhead and memory cost. In this paper, we propose an efficient key management scheme by generating new public and private keys. W...
متن کاملA Novel Medical Image Protection Scheme Using a 3-Dimensional Chaotic System
Recently, great concerns have been raised regarding the issue of medical image protection due to the increasing demand for telemedicine services, especially the teleradiology service. To meet this challenge, a novel chaos-based approach is suggested in this paper. To address the security and efficiency problems encountered by many existing permutation-diffusion type image ciphers, the new schem...
متن کاملAn Efficient Software Protection Scheme
Software piracy has been considered one of the biggest problems of this industry since computers became popular. Solutions for this problem based in tamperproof hardware tokens have been introduced in the literature. All these solutions depend on two premises: (a) the physical security of the tamperproof device and (b) the difficulty to analyze and modify the software in order to bypass the che...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information Technology Journal
سال: 2014
ISSN: 1812-5638
DOI: 10.3923/itj.2014.1602.1611