2022
DOI: 10.3390/computation10090158
|View full text |Cite
|
Sign up to set email alerts
|

Secure Medical Image Transmission Scheme Using Lorenz’s Attractor Applied in Computer Aided Diagnosis for the Detection of Eye Melanoma

Abstract: Early detection of diseases is vital for patient recovery. This article explains the design and technical matters of a computer-supported diagnostic system for eye melanoma detection implementing a security approach using chaotic-based encryption to guarantee communication security. The system is intended to provide a diagnosis; it can be applied in a cooperative environment for hospitals or telemedicine and can be extended to detect other types of eye diseases. The introduced method has been tested to assess … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 43 publications
0
0
0
Order By: Relevance
“…Ciphering images is the process of protecting them by altering their pixels in a way that makes them indecipherable. It protects image confidentiality and integrity, particularly when the images are sensitive and confidential, as in the military case [1] and medical images [2,3]. Perturbations in ciphering steps complicate the statistical relationships between original and ciphered images and make predicting them difficult.…”
Section: Introductionmentioning
confidence: 99%
“…Ciphering images is the process of protecting them by altering their pixels in a way that makes them indecipherable. It protects image confidentiality and integrity, particularly when the images are sensitive and confidential, as in the military case [1] and medical images [2,3]. Perturbations in ciphering steps complicate the statistical relationships between original and ciphered images and make predicting them difficult.…”
Section: Introductionmentioning
confidence: 99%
“…Without an appropriate decryption key, the image cannot be restored and understood [1,2]. Image encryption aims to protect the privacy and security of images, especially in situations where images are sensitive and confidential, such as medical [3,4], and military [5] images. In the context of encryption methods, Shannon's theory emphasizes the importance of the two main concepts of confusion and diffusion [3,6,7].…”
Section: Introductionmentioning
confidence: 99%
“…Image encryption aims to protect the privacy and security of images, especially in situations where images are sensitive and confidential, such as medical [3,4], and military [5] images. In the context of encryption methods, Shannon's theory emphasizes the importance of the two main concepts of confusion and diffusion [3,6,7]. Combining these two concepts aims to create a strong dependency between encrypted data and encryption keys.…”
Section: Introductionmentioning
confidence: 99%