Boukhatem Mohammed Belkaid, L. Mourad, Cherifi Mehdi, A. Soltane
{"title":"使用混合加密的医学图像的安全传输:身份验证,机密性,完整性","authors":"Boukhatem Mohammed Belkaid, L. Mourad, Cherifi Mehdi, A. Soltane","doi":"10.1109/ICCVIA.2015.7351789","DOIUrl":null,"url":null,"abstract":"Data Security for end-end transmission is achieved by many different symmetric and asymmetric techniques for message confidentiality, message authentication and key exchange using transport layer security. This paper presents a new encryption system for secure medical images transmission. The hybrid encryption system is based on AES and RSA algorithms. AES is used for data confidentiality, the RSA is used for authentication and the integrity is assured by the basic function of correlation between adjacent pixels in the image. Our encryption system generates a unique password every new session of encryption. Several parameters were used for various tests of our analysis.","PeriodicalId":419122,"journal":{"name":"International Conference on Computer Vision and Image Analysis Applications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Secure transfer of medical images using hybrid encryption: Authentication, confidentiality, integrity\",\"authors\":\"Boukhatem Mohammed Belkaid, L. Mourad, Cherifi Mehdi, A. Soltane\",\"doi\":\"10.1109/ICCVIA.2015.7351789\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data Security for end-end transmission is achieved by many different symmetric and asymmetric techniques for message confidentiality, message authentication and key exchange using transport layer security. This paper presents a new encryption system for secure medical images transmission. The hybrid encryption system is based on AES and RSA algorithms. AES is used for data confidentiality, the RSA is used for authentication and the integrity is assured by the basic function of correlation between adjacent pixels in the image. Our encryption system generates a unique password every new session of encryption. Several parameters were used for various tests of our analysis.\",\"PeriodicalId\":419122,\"journal\":{\"name\":\"International Conference on Computer Vision and Image Analysis Applications\",\"volume\":\"14 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-02-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on Computer Vision and Image Analysis Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCVIA.2015.7351789\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Computer Vision and Image Analysis Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCVIA.2015.7351789","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure transfer of medical images using hybrid encryption: Authentication, confidentiality, integrity
Data Security for end-end transmission is achieved by many different symmetric and asymmetric techniques for message confidentiality, message authentication and key exchange using transport layer security. This paper presents a new encryption system for secure medical images transmission. The hybrid encryption system is based on AES and RSA algorithms. AES is used for data confidentiality, the RSA is used for authentication and the integrity is assured by the basic function of correlation between adjacent pixels in the image. Our encryption system generates a unique password every new session of encryption. Several parameters were used for various tests of our analysis.