2010 7th International Multi- Conference on Systems, Signals and Devices 2010
DOI: 10.1109/ssd.2010.5585539
|View full text |Cite
|
Sign up to set email alerts
|

RSA based encryption decryption of medical images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 4 publications
0
6
0
Order By: Relevance
“…Coutinho [15] shows that those prime numbers must be wisely chosen, otherwise it is relative simple to break this kind of encryption. Notwithstanding, RSA has been used for encoding and decoding medical images [18] and for a hybrid Bluetooth communication algorithm [17].…”
Section: Related Workmentioning
confidence: 99%
“…Coutinho [15] shows that those prime numbers must be wisely chosen, otherwise it is relative simple to break this kind of encryption. Notwithstanding, RSA has been used for encoding and decoding medical images [18] and for a hybrid Bluetooth communication algorithm [17].…”
Section: Related Workmentioning
confidence: 99%
“…The keys must be made in such a way that the decryption key may not be easily deduced from the public encryption key [9].In RSA, the public key consists of the modulus n which is a large integer number, a product of two prime numbers p and q, whose bits length is the key size. If these numbers are identified, then the private key can be hacked and the RSA is broken [10].…”
Section: Rsa Based Encryptionmentioning
confidence: 99%
“…Conventional image encryption techniques are divided into two groups, namely, asymmetric encryption (with private and public keys) and symmetric encryption (with a secret key) [2]. Several algorithms have been proposed in the past for the encryption of images.…”
Section: Introductionmentioning
confidence: 99%