2022
DOI: 10.1007/s11042-022-13744-9
|View full text |Cite
|
Sign up to set email alerts
|

A plain-image correlative semi-selective medical image encryption algorithm using enhanced 2D-logistic map

Abstract: Modern medical examinations have produced a large number of medical images. It is a great challenge to transmit and store them quickly and securely. Existing solutions mainly use medical image encryption algorithms, but these encryption algorithms, which were developed for ordinary images, are time-consuming and must cope with insufficient security considerations when encrypting medical images. Compared with ordinary images, medical images can be divided into the region of interest and the region of background… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 72 publications
0
2
0
Order By: Relevance
“…In addition, the image encryption step, pixel permutation, and diffusion are both linear operations in which the time complexity of permutation is and the time complexity of diffusion is the time complexity of permutation. Finally, the total time complexity of the image encryption step is [ 67 , 68 ].…”
Section: Simulation Results and Security Analysismentioning
confidence: 99%
“…In addition, the image encryption step, pixel permutation, and diffusion are both linear operations in which the time complexity of permutation is and the time complexity of diffusion is the time complexity of permutation. Finally, the total time complexity of the image encryption step is [ 67 , 68 ].…”
Section: Simulation Results and Security Analysismentioning
confidence: 99%
“…Some of the chaotic maps that are commonly utilized in image encryption methods are as follows: logistic map [9,10], Baker map [11,12], Arnold map [13,14], tent map [15,16], hyperchaotic maps [17,18], etc. Researchers have proposed a plethora of image encryption algorithms based on chaotic systems; the following is a brief overview of some of the proposed algorithms for each chaotic system.…”
Section: Chaotic Systemsmentioning
confidence: 99%