一种改进的医学图像和患者信息传输安全方法

Amal Hafsa, J. Malek, Mohsen Machhout
{"title":"一种改进的医学图像和患者信息传输安全方法","authors":"Amal Hafsa, J. Malek, Mohsen Machhout","doi":"10.1109/SETIT54465.2022.9875481","DOIUrl":null,"url":null,"abstract":"Cryptographic functions involve protecting personal information transmitted over the network against destructive attacks. The objective of this paper is to reinforce the safety of the transmission and the storage of medical images by using a hybrid framework for medical image encryption and authentication. The proposed model is based on symmetric and asymmetric approaches. To evaluate the strength of the proposed approach; our cryptosystem is tested by various tools. The experimental findings prove that our cryptographic system provides high robustness that can resist the most known cryptanalysis attacks.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"An Improved Security Approach for Medical Images and Patients’ Information Transmission\",\"authors\":\"Amal Hafsa, J. Malek, Mohsen Machhout\",\"doi\":\"10.1109/SETIT54465.2022.9875481\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cryptographic functions involve protecting personal information transmitted over the network against destructive attacks. The objective of this paper is to reinforce the safety of the transmission and the storage of medical images by using a hybrid framework for medical image encryption and authentication. The proposed model is based on symmetric and asymmetric approaches. To evaluate the strength of the proposed approach; our cryptosystem is tested by various tools. The experimental findings prove that our cryptographic system provides high robustness that can resist the most known cryptanalysis attacks.\",\"PeriodicalId\":126155,\"journal\":{\"name\":\"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-05-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SETIT54465.2022.9875481\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SETIT54465.2022.9875481","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

加密功能包括保护通过网络传输的个人信息免受破坏性攻击。本文的目的是通过使用一种混合框架的医学图像加密和认证来增强传输和存储的安全性。所提出的模型基于对称和非对称方法。评估建议方法的有效性;我们的密码系统通过各种工具进行了测试。实验结果证明,我们的密码系统具有很高的鲁棒性,可以抵抗大多数已知的密码分析攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
An Improved Security Approach for Medical Images and Patients’ Information Transmission
Cryptographic functions involve protecting personal information transmitted over the network against destructive attacks. The objective of this paper is to reinforce the safety of the transmission and the storage of medical images by using a hybrid framework for medical image encryption and authentication. The proposed model is based on symmetric and asymmetric approaches. To evaluate the strength of the proposed approach; our cryptosystem is tested by various tools. The experimental findings prove that our cryptographic system provides high robustness that can resist the most known cryptanalysis attacks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信