2022
DOI: 10.1155/2022/6438331
|View full text |Cite
|
Sign up to set email alerts
|

Securing E-Healthcare Images Using an Efficient Image Encryption Model

Abstract: With the advancements in e-healthcare services, it is possible to provide remote medical services to patients and swifter first aid. Medical images play an essential role in e-healthcare applications for providing quick and better remote diagnosis and treatment to patients. Medical images generally comprise secret details about the patients and are therefore prone to various security threats during their transmission over public networks. Thus, it is required to secure these images prior to their communication… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
0
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(3 citation statements)
references
References 47 publications
0
0
0
Order By: Relevance
“…For future work, more study may be required in image encryption techniques to find a satisfactory compromise between security and the ability to retrieve the initial image within decryption [48] accurately, [49]. Advanced privacypreserving approaches, such as differential privacy [50] and secure multi-party computation [51], may add security and secrecy during digital encryption and decryption.…”
Section: Discussionmentioning
confidence: 99%
“…For future work, more study may be required in image encryption techniques to find a satisfactory compromise between security and the ability to retrieve the initial image within decryption [48] accurately, [49]. Advanced privacypreserving approaches, such as differential privacy [50] and secure multi-party computation [51], may add security and secrecy during digital encryption and decryption.…”
Section: Discussionmentioning
confidence: 99%
“…Securing E-healthcare image encryption based on a six-dimensional hyperchaotic map (SDHM) was suggested in [38]. This scheme was used to retrieve hidden keys.…”
Section: Encryption Based On Chaotic Mapsmentioning
confidence: 99%
“…SCAN method and chaotic tent map Different medical images Statistical and differential attacks [38] To ensure the safety of medical images before to their dissemination on public networks.…”
Section: Ref Nomentioning
confidence: 99%