2023
DOI: 10.1145/3561513
|View full text |Cite
|
Sign up to set email alerts
|

EiMOL: A Secure Medical Image Encryption Algorithm based on Optimization and the Lorenz System

Abstract: Nowadays, the demand for digital images from different intelligent devices and sensors has dramatically increased in smart healthcare. Due to advanced low-cost and easily available tools and software, manipulation of these images is an easy task. Thus, the security of digital images is a serious challenge for the content owners, healthcare communities and researchers against illegal access and fraudulent usage. In this paper, a secure medical image encryption algorithm, EiMOL , based on… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
10
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(10 citation statements)
references
References 27 publications
0
10
0
Order By: Relevance
“…The latter hides the image content to be protected into a complex and large subset of the information space, making it impossible for attackers to discover whether and where the information is hidden, thus reducing the chance of information stealing by attackers. Meanwhile, image encryption algorithms by combining chaos theory [1][2][3], cellular automata, DNA coding [4], optical transformation [5], compressive sensing (CS), and other related techniques have been proposed. For example, Ye et al proposed an efficient symmetric image encryption algorithm using intertwining logistic chaotic map [6] to address the issue of low plain image sensitivity.…”
Section: Introductionmentioning
confidence: 99%
“…The latter hides the image content to be protected into a complex and large subset of the information space, making it impossible for attackers to discover whether and where the information is hidden, thus reducing the chance of information stealing by attackers. Meanwhile, image encryption algorithms by combining chaos theory [1][2][3], cellular automata, DNA coding [4], optical transformation [5], compressive sensing (CS), and other related techniques have been proposed. For example, Ye et al proposed an efficient symmetric image encryption algorithm using intertwining logistic chaotic map [6] to address the issue of low plain image sensitivity.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, Lorenz system encrypts general medical images. This algorithm is resistant to attacks in many ways, such as benchmark Kaggle and Open-i datasets [25]. Alexan W et al used fractional order four-dimensional dynamic Chen system to encrypt multilayer color image cryptosystems.…”
Section: Introductionmentioning
confidence: 99%
“…12,13 It is the process of transforming information or data to non-informative data or data with different information to prevent unauthorized users from acquiring the original information. [14][15][16] Lately, many researchers have developed encryption methods for digital images. The authors of Reference 16 have proposed a combination of RDWT and RSVD to generate an encryption key.…”
Section: Introductionmentioning
confidence: 99%
“…Among the different data security schemes, encryption is an effective tool that is intended as a solution to the issues of copyright protection and authentication of digital images 12,13 . It is the process of transforming information or data to non‐informative data or data with different information to prevent unauthorized users from acquiring the original information 14–16 …”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation