Two-Round Symmetric Cryptography for Medical Image Infosecurity Against-Hacker Attacks in a Picture Archiving and Communication System
暂无分享,去创建一个
Chao-Lin Kuo | Neng-Sheng Pai | Yu-Chi Pu | Jian-Xing Wu | Chia-Hung Lin | Pi-Yun Chen | Chih-Hsien Li | Chao-Lin Kuo | N. Pai | Yu-Chi Pu | Chia‐Hung Lin | Jian-Xing Wu | Pi-Yun Chen | Chih-Hsien Li
[1] Her-Terng Yau,et al. Bluetooth Based Chaos Synchronization Using Particle Swarm Optimization and Its Applications to Image Encryption , 2012, Sensors.
[2] Amir Akhavan,et al. Applications of tripled chaotic maps in cryptography , 2007, 0705.2633.
[3] Zhengjun Liu,et al. Color image encryption by using Arnold and discrete fractional random transforms in IHS space , 2010 .
[4] Muhammad Rafiq Abuturab,et al. Color image security system based on discrete Hartley transform in gyrator transform domain , 2013 .
[5] Cheng-Chi Lee,et al. A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System , 2016, Journal of Medical Systems.
[6] Mohammad Reza Mosavi,et al. A novel image encryption based on hash function with only two-round diffusion process , 2013, Multimedia Systems.
[7] Cheng-Chi Lee,et al. A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System , 2015, Journal of Medical Systems.
[8] Chao-Lin Kuo,et al. Symmetric Cryptography With Shift 2n-1, Hash Transformation, Optimization-Based Controller for Medical Image Infosecurity: Case Study in Mammographic Image , 2020, IEEE Photonics Journal.
[9] Robert Dony,et al. Improving the Security of the Medical Images , 2013 .
[10] Chao-Lin Kuo. Design of an Adaptive Fuzzy Sliding-Mode Controller for Chaos Synchronization , 2007 .
[11] Kwok-Tung Lo,et al. A Content-Adaptive Joint Image Compression and Encryption Scheme , 2018, IEEE Transactions on Multimedia.
[12] Vinod Patidar,et al. Diffusion-substitution based gray image encryption scheme , 2013, Digit. Signal Process..
[13] Thomas Monroe,et al. Picture Archiving and Communication System Acceptance Testing : Results and Identification of Problem Components , 2005 .
[14] Mohamed Ali Hajjaji,et al. Cryptography of medical images based on a combination between chaotic and neural network , 2016, IET Image Process..
[15] Namrata Dhanda,et al. DIP Using Image Encryption and XOR Operation Affine Transform , 2015 .
[16] Xin-Wen Wu,et al. Comments on the security of "Diffusion-substitution based gray image encryption" scheme , 2014, Digit. Signal Process..
[17] Yousef Farid,et al. A robust hybrid method for image encryption based on Hopfield neural network , 2012, Comput. Electr. Eng..
[18] Tsung-Lung Yang,et al. Hash Transformation and Machine Learning-Based Decision-Making Classifier Improved the Accuracy Rate of Automated Parkinson’s Disease Screening , 2020, IEEE Transactions on Neural Systems and Rehabilitation Engineering.
[19] Rengarajan Amirtharaj,et al. Image Encryption: An Information Security Perceptive , 2014 .
[20] W. San-Um,et al. A Lossless physical-layer encryption scheme in medical Picture Archiving and Communication Systems using highly-robust chaotic signals , 2014, The 7th 2014 Biomedical Engineering International Conference.
[21] Chuan-Kuei Huang,et al. Multi chaotic systems based pixel shuffle for image encryption , 2009 .
[22] Che-Chou Shen,et al. Chirp-encoded excitation for dual-frequency ultrasound tissue harmonic imaging , 2012, IEEE Transactions on Ultrasonics, Ferroelectrics and Frequency Control.
[23] A. Nag,et al. Image encryption using affine transform and XOR operation , 2011, 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies.
[24] Pong-Jeu Lu,et al. Customized Handmade Pulmonary Valved Conduit Reconstruction for Children and Adult Patients Using Meta-Learning Based Intelligent Model , 2018, IEEE Access.
[25] Fatih Özkaynak,et al. An Image Encryption Algorithm Based on Chaotic Selection of Robust Cryptographic Primitives , 2020, IEEE Access.
[26] Christian Roux,et al. A Joint Encryption/Watermarking System for Verifying the Reliability of Medical Images , 2012, IEEE Transactions on Information Technology in Biomedicine.
[27] Hiba Chougrad,et al. Deep Convolutional Neural Networks for breast cancer screening , 2018, Comput. Methods Programs Biomed..
[28] Chao-Lin Kuo,et al. Medical Image Infosecurity Using Hash Transformation and Optimization-Based Controller in a Health Information System: Case Study in Breast Elastography and X-Ray Image , 2020, IEEE Access.
[29] Salwa K. Abd-El-Hafiz,et al. Symmetric encryption algorithms using chaotic and non-chaotic generators: A review , 2015, Journal of advanced research.
[30] Olivier Basset,et al. An Enhanced Chirp Modulated Golay Code for Ultrasound Diverging Wave Compounding , 2018, 2018 26th European Signal Processing Conference (EUSIPCO).
[31] Xiao-Song Yang,et al. Hyperchaos and bifurcation in a new class of four-dimensional Hopfield neural networks , 2006, Neurocomputing.
[32] S. Shankar,et al. DATA HIDING IN ENCRYPTED IMAGES USING ARNOLD TRANSFORM , 2016 .
[33] Zheng Zhou,et al. An Image Encryption Method Based on the Feistel Network and Dynamic DNA Encoding , 2018, IEEE Photonics Journal.
[34] Joaquin Alvarez,et al. Robust synchronization of Sprott circuits using sliding mode control , 2006 .
[35] Safya Belghith,et al. A novel image encryption scheme based on substitution-permutation network and chaos , 2016, Signal Process..
[36] M. A. Mohamed,et al. Novel Fast Encryption Algorithms for Multimedia Transmission over Mobile WiMax Networks , 2012 .
[37] Mohammed Ali Hussain,et al. Securing Medical Images by Image Encryption using Key Image , 2014 .
[38] C. Sinthanayothin,et al. PACS (Picture Archiving Communication System) for dentistry , 2008, 2008 5th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology.
[39] C. Chui,et al. A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .
[40] Liping Zhang,et al. Privacy Protection for Telecare Medicine Information Systems Using a Chaotic Map-Based Three-Factor Authenticated Key Agreement Scheme , 2017, IEEE Journal of Biomedical and Health Informatics.
[41] Fatih Özkaynak,et al. Security Problems of Chaotic Image Encryption Algorithms Based on Cryptanalysis Driven Design Technique , 2019, IEEE Access.
[42] Ian W. Ricketts,et al. The Mammographic Image Analysis Society digital mammogram database , 1994 .
[43] Diego Vicentin. Developing Standards, Shaping the Network: Ethnographic Notes on the IEEE 802 LAN/MAN Standards Committee , 2015 .
[44] Chih-Yen Chen,et al. A Three-Dimensional Adaptive PSO-Based Packing Algorithm for an IoT-Based Automated e-Fulfillment Packaging System , 2017, IEEE Access.