Y. Vijaya Lakshmi, K. Naveena, M. Ramya, N. Pravallika, T. Sindhu, V. Namitha
{"title":"Medical Image Encryption using Enhanced Rivest Shamir Adleman Algorithm","authors":"Y. Vijaya Lakshmi, K. Naveena, M. Ramya, N. Pravallika, T. Sindhu, V. Namitha","doi":"10.1109/ICAIS56108.2023.10073869","DOIUrl":null,"url":null,"abstract":"Medical photographs are considered sensitive and crucial data in medical informatics systems. To communicate medical photos via an insecure network, a trustworthy encryption solution must be created. Encryption is the most effective way for ensuring image secrecy since it eliminates the risk of data loss. The two types of encryptions are symmetric encryption, which uses a single key for both encryption and decryption and gives just confidentiality, making it less safe, and asymmetric encryption, which uses two keys for encryption and decryption and provides confidentiality, non-repudiation, and authentication, making it more secure. It is now simpler than ever for complete strangers to access the most sensitive information recorded on your computer due to hacking activities and privacy intrusions. As a result, asymmetric encryption outperforms symmetric encryption. Despite the fact that there are several security alternatives accessible, such as free anti-malware software for home users and cloud anti-virus for organizations, these attempts to secure data Some large corporations and government agencies already use encryption software to secure data, but it is also available and becoming more readily available to the general public. The RSA algorithm is an asymmetric encryption technique that safeguards the picture before transferring it. It is one of the most extensively used encryption tools.","PeriodicalId":164345,"journal":{"name":"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAIS56108.2023.10073869","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Medical photographs are considered sensitive and crucial data in medical informatics systems. To communicate medical photos via an insecure network, a trustworthy encryption solution must be created. Encryption is the most effective way for ensuring image secrecy since it eliminates the risk of data loss. The two types of encryptions are symmetric encryption, which uses a single key for both encryption and decryption and gives just confidentiality, making it less safe, and asymmetric encryption, which uses two keys for encryption and decryption and provides confidentiality, non-repudiation, and authentication, making it more secure. It is now simpler than ever for complete strangers to access the most sensitive information recorded on your computer due to hacking activities and privacy intrusions. As a result, asymmetric encryption outperforms symmetric encryption. Despite the fact that there are several security alternatives accessible, such as free anti-malware software for home users and cloud anti-virus for organizations, these attempts to secure data Some large corporations and government agencies already use encryption software to secure data, but it is also available and becoming more readily available to the general public. The RSA algorithm is an asymmetric encryption technique that safeguards the picture before transferring it. It is one of the most extensively used encryption tools.