2020
DOI: 10.1049/iet-ipr.2019.0562
|View full text |Cite
|
Sign up to set email alerts
|

Chua's diode and strange attractor: a three‐layer hardware–software co‐design for medical image confidentiality

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 38 publications
(10 citation statements)
references
References 43 publications
(50 reference statements)
0
10
0
Order By: Relevance
“…Simulation results show that the methods are well hidden and provide good resistance against attacks during image handling operations. In [13], the authors present a proportional study of patient facts interspersed in the use of a manuscript signal of an electrocardiogram ECG in medical metaphors, using discrete Fourier transforms and DCT. For security, text information and ECG signals are encoded before being incorporated into the frequency state.…”
Section: Summary Of Related Workmentioning
confidence: 99%
“…Simulation results show that the methods are well hidden and provide good resistance against attacks during image handling operations. In [13], the authors present a proportional study of patient facts interspersed in the use of a manuscript signal of an electrocardiogram ECG in medical metaphors, using discrete Fourier transforms and DCT. For security, text information and ECG signals are encoded before being incorporated into the frequency state.…”
Section: Summary Of Related Workmentioning
confidence: 99%
“…According to Shannon [11], an encryption scheme that consists of both a confusion and diffusion property can be considered a secured cryptosystem. Fridrich proposed a confusion-diffusion structure in [12] that encrypted images using the permuting pixel location and diffusing pixel value with chaos for the first time. However, as compared to permuting pixels, the permutation of bits of pixels gives more security, while the calculation cost may be larger.…”
Section: Data Securitymentioning
confidence: 99%
“…There are four classic types of attacks: cipher text only attacks, known-plaintext attacks, chosen-plaintext attacks, and chosen cipher text attacks. 34,35 The strongest is the chosen plaintext attack. Accordingly, if a cryptosystem resists the chosen plaintext attack, it can resist all other attacks.…”
Section: Chosen Plain Text Attack Analysismentioning
confidence: 99%
“…There are four classic types of attacks: cipher text only attacks, known‐plaintext attacks, chosen‐plaintext attacks, and chosen cipher text attacks 34,35 . The strongest is the chosen plaintext attack.…”
Section: Simulation and Security Analysismentioning
confidence: 99%