2021
DOI: 10.1007/s12652-020-02597-5
|View full text |Cite
|
Sign up to set email alerts
|

Robust medical image encryption based on DNA-chaos cryptosystem for secure telemedicine and healthcare applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
37
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 83 publications
(38 citation statements)
references
References 46 publications
0
37
0
1
Order By: Relevance
“…It provides chronic health management, prescription compliance, remote services, care-for-all under critical and severe cases, etc., which ultimately enable this methodology to support the healthcare and medical care sphere. In addition, a series of tele-wearables heals up the patients and keeps them updating about their health status in a unique way [ 20 , 21 ].
Fig.
…”
Section: Capabilities and Features Of Telemedicine When Used In Healthcare Management Systemmentioning
confidence: 99%
“…It provides chronic health management, prescription compliance, remote services, care-for-all under critical and severe cases, etc., which ultimately enable this methodology to support the healthcare and medical care sphere. In addition, a series of tele-wearables heals up the patients and keeps them updating about their health status in a unique way [ 20 , 21 ].
Fig.
…”
Section: Capabilities and Features Of Telemedicine When Used In Healthcare Management Systemmentioning
confidence: 99%
“…Several studies have introduced a general survey [17][18][19][20][21][22][23][24][25] for different types of forgery techniques. In the copy-move technique [26][27][28][29][30][31][32][33][34], the copied parts share characteristics such as lighting conditions, background, and dynamic range with the rest of the images. So, forgery detection becomes more difficult.…”
Section: Related Workmentioning
confidence: 99%
“…The key-points-based techniques such as SIFT [26][27][28] and SURF [29,30] are used to reduce the computational complexity. These techniques are not affected by scaling, rotation transformations and are robust to noise.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Meanwhile, the DNA-based encryption method has caught attention because of its excellent performance on confusion and diffusion [10][11][12]. Piecewise linear chaotic map (PWLCM) is used to generate the key image, and DNA rules is used to encode the key image by E-SM et al [13]. Folifack propose a cryptosystem based on a chaotic Jerk system and DNA encoding proposed in the article for image encryption [14].…”
Section: Introductionmentioning
confidence: 99%