2018
DOI: 10.1007/s11265-018-1337-z
|View full text |Cite
|
Sign up to set email alerts
|

Encrypted Biography of Biomedical Image - a Pentalayer Cryptosystem on FPGA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 31 publications
(9 citation statements)
references
References 52 publications
0
9
0
Order By: Relevance
“…The proposed encryption scheme utilized the Modulo 2 addition operation for the diffusion in the primary and secondary encryption stage. This necessitates the test to validate the resistance toward chosen plain text attack [ 21 ]. This resistance may be verified by applying the following equation: …”
Section: Results and Experimental Validationmentioning
confidence: 99%
See 1 more Smart Citation
“…The proposed encryption scheme utilized the Modulo 2 addition operation for the diffusion in the primary and secondary encryption stage. This necessitates the test to validate the resistance toward chosen plain text attack [ 21 ]. This resistance may be verified by applying the following equation: …”
Section: Results and Experimental Validationmentioning
confidence: 99%
“…Further, throughput of the algorithm has been calculated through timing analysis which was determined with the Zero Plus digital logic analyzer interfaced with target FPGA. The following Table 6 depicts the hardware analysis of the proposed encryption architecture which in terns compared with the existing FPGA based medical image encryption work [ 21 ].…”
Section: Results and Experimental Validationmentioning
confidence: 99%
“…In addition, NIST SP 800–22 tests have been carried out to ensure the randomness of the encrypted images. The contributions of the proposed work are as follows: Very first work on complete TRNG driven image encryption for greyscale and RGB colour images incorporating both confusion and diffusion whereas some of the earlier works used the TRNG only for diffusion [1720]. Simple TRNG architecture which consumes only 520 combinational logics and 524 logic registers on Cyclone IV EP4CE115F29C7 FPGA. Identical and Non‐identical Ring Oscillator structures have been utilised for yielding better confusion and diffusion. The scheme offers large keyspace of 2 (8×65536+1) which promises resistance against brute force attack. This scheme yields a high entropy of 7.99 and near‐zero correlation which confirms the resistance towards the statistical attacks when applied on more than 100 test images. The proposed non‐chaotic approach improves the efficiency of the encryption and it makes the design free from intensive floating‐point conversions. …”
Section: Resultsmentioning
confidence: 99%
“…A five‐layer DICOM medical image encryption proposed by Ravichandran et al [20] incorporated a PLL‐based synthetic image which consumed 98 hardware units for a generation. In all these works, chaotic maps/attractors played a significant role along with TRNG‐based random images.…”
Section: Introductionmentioning
confidence: 99%
“…In the diagnosis of diseases, medical images play a vital role as to secure digital images widely over the internet. Today healthcare organizations can dislocate financial barriers by eliminating traditional-IT fuss associated with sharing, exchanging and storing diagnostic imaging [19]- [21]. Cybercriminals tag information regarding the patient, such as names, birth dates and health insurance contract indulged in the act of stealing about 20 dollars on the black market, according to researchers at Aberdeen Group.…”
Section: Introductionmentioning
confidence: 99%