Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    ARTICLE

    Wind Driven Optimization-Based Medical Image Encryption for Blockchain-Enabled Internet of Things Environment

    C. S. S. Anupama1, Raed Alsini2, N. Supriya3, E. Laxmi Lydia4, Seifedine Kadry5, Sang-Soo Yeo6, Yongsung Kim7,*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3219-3233, 2022, DOI:10.32604/cmc.2022.030267

    Abstract Internet of Things (IoT) and blockchain receive significant interest owing to their applicability in different application areas such as healthcare, finance, transportation, etc. Medical image security and privacy become a critical part of the healthcare sector where digital images and related patient details are communicated over the public networks. This paper presents a new wind driven optimization algorithm based medical image encryption (WDOA-MIE) technique for blockchain enabled IoT environments. The WDOA-MIE model involves three major processes namely data collection, image encryption, optimal key generation, and data transmission. Initially, the medical images were captured from the patient using IoT devices. Then,… More >

  • Open Access

    ARTICLE

    Efficient Medical Image Encryption Framework against Occlusion Attack

    May A. Al-Otaibi1,*, Hesham Alhumyani1, Saleh Ibrahim2, Alaa M. Abbas2

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1523-1536, 2022, DOI:10.32604/iasc.2022.026161

    Abstract Image encryption has attracted a lot of interest as an important security application for protecting confidential image data against unauthorized access. An adversary with the power to manipulate cipher image data can crop part of the image out to prevent decryption or render the decrypted image useless. This is known as the occlusion attack. In this paper, we address a vulnerability to the occlusion attack identified in the medical image encryption framework recently proposed in []. We propose adding a pixel scrambling phase to the framework and show through simulation that the extended framework effectively mitigates the occlusion attack while… More >

  • Open Access

    ARTICLE

    A Novel Medical Image Encryption Using Rössler System

    K. Sundara Krishnan1,*, Syed Suhaila1, S. P. Raja2

    Intelligent Automation & Soft Computing, Vol.33, No.2, pp. 1081-1101, 2022, DOI:10.32604/iasc.2022.024023

    Abstract The technological advances made possible by the Internet, coupled with the unforeseen critical circumstances set in motion by the Covid-19 pandemic, have greatly increased the generation and transmission of medical images every day. Medical image transmission over an unsecured public network threatens the privacy of sensitive patient information. We have, in this paper, designed a new secure color medical image encryption algorithm based on binary plane decomposition, DNA (deoxyribonucleic acid) computing, and the chaotic Rössler dynamical system. At first, a bit-by-bit swap is performed on twenty four binary planes of the input image and encoded using DNA encoding rules. Thereafter,… More >

  • Open Access

    ARTICLE

    ALCencryption: A Secure and Efficient Algorithm for Medical Image Encryption

    Jiao Ge1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.125, No.3, pp. 1083-1100, 2020, DOI:10.32604/cmes.2021.013039

    Abstract With the rapid development of medical informatization and the popularization of digital imaging equipment, DICOM images contain the personal privacy of patients, and there are security risks in the process of storage and transmission, so it needs to be encrypted. In order to solve the security problem of medical images on mobile devices, a safe and efficient medical image encryption algorithm called ALCencryption is designed. The algorithm first analyzes the medical image and distinguishes the color image from the gray image. For gray images, the improved Arnold map is used to scramble them according to the optimal number of iterations,… More >

Displaying 1-10 on page 1 of 4. Per Page