Linear cryptanalysis method for DES cipher
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Medical Image Retrieval and Registration: Towards Computer Assisted Diagnostic Approach
IDEAS-DH '04 Proceedings of the IDEAS Workshop on Medical Information Systems: The Digital Hospital
Protecting the Exchange of Medical Images in Healthcare Process Integration with Web Services
HICSS '07 Proceedings of the 40th Annual Hawaii International Conference on System Sciences
IEEE Transactions on Pattern Analysis and Machine Intelligence
A novel hybrid crypto-biometric authentication scheme for ATM based banking applications
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
IEEE Transactions on Information Technology in Biomedicine
A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations
Computer Standards & Interfaces
A mutual-healing key distribution scheme in wireless sensor networks
Journal of Network and Computer Applications
A frequency domain subspace blind channel estimation method for trailing zero OFDM systems
Journal of Network and Computer Applications
Medical image security and EPR hiding using Shamir's secret sharing scheme
Journal of Systems and Software
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
WSEAS Transactions on Computers
A hybrid embedded steganography technique: optimum pixel method and matrix embedding
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
An efficient and secure medical image protection scheme based on chaotic maps
Computers in Biology and Medicine
Hi-index | 0.00 |
This paper proposes a novel pixel-based scrambling scheme to protect, in an efficient and secure way, the distribution of digital medical images. To provide an efficient encryption of a large volume of digital medical images, the proposed system uses simple pixel level XOR operation for image scrambling in an innovative way such that structural parameters of the encryption scheme have become a part of the cryptographic key. The cryptographic key of this operation is a true random number sequence generated from multi-scroll chaotic attractors. Cryptanalysis is provided. Simulation experiment has also validated the effectiveness of the proposed system.