2020
DOI: 10.1049/iet-ipr.2019.0042
|View full text |Cite
|
Sign up to set email alerts
|

Securing DICOM images by a new encryption algorithm using Arnold transform and Vigenère cipher

Abstract: This study presents a novel encryption method for the security of DICOM (Digital Imaging and Communications in Medicine) images used in medical applications. The proposed algorithm splits the original image into blocks of size 16 × 16 pixels, then encrypts it through three steps. Firstly, the keys k1, k2, k3 and k4 are transformed from four vectors of 16 pixels to a matrix of 16 × 16 pixels. Then, the proposed algorithm encrypts the image block‐by‐block using the Vigenère cipher algorithm. For each block, the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(16 citation statements)
references
References 29 publications
(39 reference statements)
0
15
0
1
Order By: Relevance
“…Various design suggestions that make use of public key (asymmetric) encryption techniques were presented in some recent studies [49][50][51]. Similar to the design logic proposed in the study, other design studies have highlighted the key generator [52][53][54] and used best practices of modern cryptology science [55][56][57]. Quantum systems [58,59], fractional systems [60][61][62], and medical encryption algorithms [63][64][65], which have attracted attention recently, are other current topics related to design proposals.…”
Section: Analysis Of Proposed Architecturementioning
confidence: 87%
See 1 more Smart Citation
“…Various design suggestions that make use of public key (asymmetric) encryption techniques were presented in some recent studies [49][50][51]. Similar to the design logic proposed in the study, other design studies have highlighted the key generator [52][53][54] and used best practices of modern cryptology science [55][56][57]. Quantum systems [58,59], fractional systems [60][61][62], and medical encryption algorithms [63][64][65], which have attracted attention recently, are other current topics related to design proposals.…”
Section: Analysis Of Proposed Architecturementioning
confidence: 87%
“…While histogram analysis results are given in Figure 10, correlation analysis results are shown in Figure 11. science [55][56][57]. Quantum systems [58,59], fractional systems [60][61][62], and medical encryption algorithms [63][64][65], which have attracted attention recently, are other current topics related to design proposals.…”
Section: Discussionmentioning
confidence: 99%
“…This method also provides greater security for a stag's image, which avoids the ability to insert unequally using a QR code. The system proposed in [27] retains the quality of image Stag with a normal PSNR ratio value of 50,226 DB. Trial results also confirm the suitability of the proposed method for security applications.…”
Section: Summary Of Related Workmentioning
confidence: 99%
“…But, Babagh's cryptanalysis is not efficient in not knowing the size of the encryption key. Several attempts to improve Vigenere's technique have invaded the digital world we quote [9,10]. In this work, the new structure of the substitution matrix and its attached replacement function will be described in detail.…”
Section: Vigenere's Classical Techniquementioning
confidence: 99%