2017
DOI: 10.1109/tnb.2017.2780881
|View full text |Cite
|
Sign up to set email alerts
|

DNA Chaos Blend to Secure Medical Privacy

Abstract: In this technological era, it is highly essential to protect the digital medical data from the fraud and forgery as they are transmitted over the public channel. Also with the increased data traffic, it is hard to transmit the entire bulky medical data. New methods have come into the scene to reduce the traffic while maintaining the sufficient level of security. Partial encryption is one of the methods which selectively encrypt the bulky medical image. Meanwhile, if the same medical image is needed to be reuse… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
84
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 159 publications
(85 citation statements)
references
References 33 publications
1
84
0
Order By: Relevance
“…However, the simple visual inspection remains insufficient to judge the quality of a good encryption scheme. It is well known that many encryption schemes have been successfully violated using simple statistical and differential analysis are widely used to successfully validate the efficiency of encryption schemes [42][43][44][45][46][47][48][49][50][51][52][53][54]. The robustness of our proposed technique is similarly established via these simple, yet important tests as presented in the remainder of this subsection.…”
Section: Performance Testsmentioning
confidence: 92%
“…However, the simple visual inspection remains insufficient to judge the quality of a good encryption scheme. It is well known that many encryption schemes have been successfully violated using simple statistical and differential analysis are widely used to successfully validate the efficiency of encryption schemes [42][43][44][45][46][47][48][49][50][51][52][53][54]. The robustness of our proposed technique is similarly established via these simple, yet important tests as presented in the remainder of this subsection.…”
Section: Performance Testsmentioning
confidence: 92%
“…The results are shown in Figure 12. Step 22 H is treated as follows. Step 17: The area H2 is taken out according to T2 in the starting point and size in A from Y(:, :, 2), as shown in Figure 13.…”
Section: Encryption Algorithm Descriptionmentioning
confidence: 99%
“…The results are shown in Figure 12. Step 22 H is treated as follows. Step 18: Convert matrix T2 and matrix H2 sums of one row and (m 2 × n 2 ) column matrix T22 and H22, respectively.…”
Section: Encryption Algorithm Descriptionmentioning
confidence: 99%
“…There exist several tools and methods for estimating the initial values of chaotic systems by determining the behavior of the systems [28]. Therefore, some researchers used chaotic and non-chaotic encryption schemes together [29].…”
Section: Image Encryption With Chaotic Mapsmentioning
confidence: 99%