CN113141359A - Password system for privacy protection of electronic medical images of Internet of things - Google Patents

Password system for privacy protection of electronic medical images of Internet of things Download PDF

Info

Publication number
CN113141359A
CN113141359A CN202110427924.XA CN202110427924A CN113141359A CN 113141359 A CN113141359 A CN 113141359A CN 202110427924 A CN202110427924 A CN 202110427924A CN 113141359 A CN113141359 A CN 113141359A
Authority
CN
China
Prior art keywords
patient
encryption
key
medical
image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110427924.XA
Other languages
Chinese (zh)
Other versions
CN113141359B (en
Inventor
刘羽
秦拯
秦江宁
宋甫元
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan University
Original Assignee
Hunan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan University filed Critical Hunan University
Priority to CN202110427924.XA priority Critical patent/CN113141359B/en
Publication of CN113141359A publication Critical patent/CN113141359A/en
Application granted granted Critical
Publication of CN113141359B publication Critical patent/CN113141359B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N7/00Computing arrangements based on specific mathematical models
    • G06N7/08Computing arrangements based on specific mathematical models using chaos models or non-linear system models
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H30/00ICT specially adapted for the handling or processing of medical images
    • G16H30/20ICT specially adapted for the handling or processing of medical images for handling medical images, e.g. DICOM, HL7 or PACS
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/50Safety; Security of things, users, data or systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/88Medical equipments

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Mathematical Optimization (AREA)
  • Algebra (AREA)
  • Mathematical Analysis (AREA)
  • Data Mining & Analysis (AREA)
  • Pure & Applied Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Software Systems (AREA)
  • Computational Mathematics (AREA)
  • Artificial Intelligence (AREA)
  • Evolutionary Computation (AREA)
  • Nonlinear Science (AREA)
  • Power Engineering (AREA)
  • Nuclear Medicine, Radiotherapy & Molecular Imaging (AREA)
  • Radiology & Medical Imaging (AREA)
  • Epidemiology (AREA)
  • Primary Health Care (AREA)
  • Public Health (AREA)
  • Medical Treatment And Welfare Office Work (AREA)
  • Measuring And Recording Apparatus For Diagnosis (AREA)

Abstract

The invention relates to a password system for protecting privacy of electronic medical images of the Internet of things. The invention mainly comprises the following steps that (1) a password system for protecting the privacy of the electronic medical image of the Internet of things is provided; (2) a Pseudo Random Number Generator (PRNG) algorithm based on a 2D-ICM and 2D-LASM chaotic system is provided; (3) a rapid medical image parallel encryption method is provided.

Description

Password system for privacy protection of electronic medical images of Internet of things
Technical Field
The invention relates to the field of information security and privacy protection, in particular to a password system for protecting the privacy of an electronic medical image of the Internet of things.
Background
Privacy protection has become a primary requirement for modern applications such as social media, internet of things (IoT), and electronic medical systems. In the field of electronic medicine, many medical imaging devices are widely connected and used to facilitate the diagnosis and treatment process of doctors, such as Magnetic Resonance Imaging (MRI) for brain tumor diagnosis, lung Computed Tomography (CT) for lung detection, and endoscopes for detecting the stomach. These personal medical images should be kept secret to ensure that the privacy of the patient is not compromised. Medical images are generally characterized by a huge amount of data and have high requirements on safety. Conventional text data-based encryption schemes cannot be directly applied to electronic image data due to limitations in the characteristics of the image data itself. In addition, a satisfactory level of security is achieved in a fast, lightweight encryption manner, taking into account the constraints of real-time data acquisition. The invention provides a double-chaos system-based privacy protection password system for medical images of the Internet of things. The encryption system can protect the medical image of the patient from being damaged by the middleman, and the medical image is in a ciphertext form during transmission and storage, so that any medical information of the patient cannot be disclosed. Aiming at medical images with huge data volume, the password system adopts a parallel mode, and only little time is needed for encryption, so that the real-time processing requirement of medical data acquisition under a real scene is met. A bidirectional ciphertext feedback mechanism is introduced in the encryption process, and the high safety of the system is ensured by the generated avalanche effect. The password system can encrypt the gray medical image and the color medical image, the generated encrypted image does not reveal any information, and only allows an authorized user to decrypt, thereby effectively protecting the privacy of patients.
Disclosure of Invention
The invention aims to solve the safety problem in the transmission and the access of the electronic medical image. Therefore, the invention provides a password system for protecting the privacy of the electronic medical images of the Internet of things, which mainly comprises three contents:
1. a password system for protecting the privacy of the electronic medical image of the Internet of things is provided;
2. a Pseudo Random Number Generator (PRNG) algorithm based on a 2D-ICM and 2D-LASM chaotic system is provided;
3. a rapid medical image parallel encryption method is provided.
The specific contents are as follows:
1. a cryptosystem for privacy protection of thing networking electron medical image is proposed
In our cryptographic system framework (fig. 1), medical images of a patient are acquired by a medical visual sensing device, such as color gastroscopic images, grayscale CT images, MRI images, and the like. Each patient has a key belonging to the patient, and after the data acquisition end passes the authentication, the encryption key of the patient can be acquired from the hospital key management system. The medical image acquired by the sensing equipment is encrypted by using the encryption key and then transmitted to the cloud platform, and is stored in a ciphertext mode. When the medical image data of the patient needs to be checked, after the user logs in the client and passes the authentication, the authorized user can acquire the decryption key of the patient from the hospital key management system, and the ciphertext image stored in the cloud platform is decrypted, so that the medical data of the patient can be checked. By the method, the medical data of the patient can be stored in an encrypted manner on the cloud platform, so that the privacy information of the patient is well protected. The patient can check own data at the mobile terminal, and medical data of the patient can be accessed only after a hospital doctor, a remote specialist, a researcher and the like obtain authorization through authentication. In the present encryption system, a symmetric cryptographic mechanism is used, and thus the encryption key and the decryption key are the same. The basic key of the encryption algorithm, namely the initial condition of the chaotic system, is stored in the key management system, and the basic key of all patients is the same. The updating process of the key firstly carries out hash calculation on the ID of each patient, the obtained hash code is unique because the ID value of each patient is different, and the hash code and the basic key are used for carrying out correlation calculation to obtain an updated key, namely the true key for the encryption algorithm. And the updating part of the key is completed and stored at the key management system end, the data acquisition end or the client sends an authentication request, and the updated key is obtained after the authentication. The key used by each patient for data encryption is different, where the encryption key is the updated key. The benefit of using a different key for each patient is that the privacy of the medical care information for other patients remains secure, assuming that one patient's key is inadvertently compromised.
2. A Pseudo Random Number Generator (PRNG) algorithm based on a 2D-ICM and 2D-LASM chaotic system is provided
The 2D-ICM is a two-dimensional hyperchaotic system with complex chaotic behavior, and the mathematical expression thereof is as follows:
Figure BDA0003030244520000031
the system parameters a and b are real numbers, a ≠ 0, b ≠ 0, x, y ∈ [ -1, 1 ]. The 2D-ICM has two positive Lyapunov exponents, and is hyperchaotic in the whole parameter range, so that the track of the 2D-ICM is difficult to infer. The lyapunov index value of the 2D-ICM increases with increasing parameter, and as large a lyapunov index value as possible can be obtained by adjusting the parameter. The larger the Lyapunov exponent is, the more obvious the chaotic characteristic of the system is, and the higher the safety is when the system is used for a cryptosystem.
The 2D-LASM is a two-dimensional chaotic system having high sensitivity to an initial value. The 2D-LASM is derived from the Sin mapping and the Logistic mapping, and the mathematical expression is as follows:
Figure BDA0003030244520000032
the system parameters u, v, mu belongs to [0, 1], when mu belongs to [0.37, 0.38] < U [0.4, 0.42] < U [0.44, 0.93], the 2D-LASM has chaotic behavior, when mu belongs to [0.37, 0.38] < U [0.4, 0.42] < U [0.44, 0.93], the 2D-LASM has two positive Lyapunov indexes, and the system has hyperchaotic behavior.
We use these two-dimensional chaotic maps to generate a random sequence associated with the plaintext image. Although the sequence generated by the chaotic system has no period in theory, the precision of the computer is limited, and the periodic phenomenon can occur due to the rounding of the precision in practical implementation. In consideration of the problem of limited precision, the chaos sequences generated by the two chaos systems are subjected to some operations and randomly combined, so that each random sequence used for encryption is jointly generated by the 2D-ICM and the 2D-LASM, and the degradation problem caused by limited precision calculation is avoided. We discard the first 1000 of the generated sequence to eliminate the effect of the initial value on the generated sequence. In addition, the hash value of the patient ID is obtained through the SHA-512 hash algorithm and is used for updating the encryption key, and high security of medical image information is guaranteed. The specific steps of our designed PRNG algorithm are described as follows:
the method comprises the following steps: the SHA-512 algorithm is used to calculate the hash H of the patient ID, which is divided into 64 eight-bit blocks, denoted H ═ H1,h2,...,hi]Wherein i is 1, 2i∈[0,255]。
Step two: the following calculation is made from the hash value of the patient ID
Figure BDA0003030244520000041
Step three: for x in fixed key0,y0,u0,v0Update as follows
Figure BDA0003030244520000042
Step four: and respectively iterating the 2D-ICM chaotic system and the 2D-LASM chaotic system mn +1000 times by using the updated key, and discarding the first 1000 values of each sequence to obtain four random sequences x, y, u and v.
Step five: t is obtained by the following calculation1,T2,T3
Figure BDA0003030244520000051
For T1,T2,T3Sorting from small to large to obtain T ═ Sort (T)1,T2,T3)。
Step six: and randomly recombining X, Y, U and V in the step four to obtain four random sequences X, Y, U and V.
Figure BDA0003030244520000052
3. Provides a rapid medical image parallel encryption method
Most medical image acquisition systems diagnose patients by capturing color or gray key images in real-time video images through a high-resolution vision sensor, so a rapid medical image encryption algorithm is provided, which can be used for color and gray images and ensures the privacy and confidentiality of the key medical images. A method for updating a key and feeding back a ciphertext is introduced, so that an attacker cannot know any information about medical data of a patient from a ciphertext image and cannot construct a cryptanalysis model to acquire required information.
The method comprises the following steps: according to a fixed key x provided by a key management system0,y0,u0,v0A, b, mu and the patient ID, the four random sequences X, Y, U, V are obtained by the PRNG algorithm of content two.
Step two: the medical images I are grouped according to the parallel arrangement in the encryption module. The medical image is converted into a one-dimensional vector Iv, which is common assuming that each group contains l pixel values
Figure BDA0003030244520000053
And (4) grouping. When l is set, N is guaranteed to be an integer.
Step three: change Iv into a matrix I of size l NNUsing K1To INPerforming row scrambling to obtain Ip in a scrambling mode
Ip(K1(i),:)=IN(i,:),i=1,2,…,N
Step four: using K2Performing block cipher text feedback forward diffusion on Ip to obtain Id1In a diffusion manner of
Figure BDA0003030244520000061
Step five: using K3To Id1Performing feedback back diffusion on the block cipher text to obtain Id2In a diffusion manner of
Figure BDA0003030244520000062
Step six: let Id2Is used for each packet ofgDenotes the use of K4The internal pixels of the N groups are scrambled in parallel to obtain a scrambled group IgpThe scrambling mode is expressed as
Igp(K4(i))=Ig(i),i=1,2,…,l
Step seven: using K5To IgpPerforming parallel block cipher text feedback forward diffusion to obtain Igd1In a diffusion manner of
Figure BDA0003030244520000063
Step eight: using K6To Igd1Performing feedback back diffusion on the block cipher text to obtain Igd2In a diffusion manner of
Figure BDA0003030244520000064
Step nine: splicing each group finished by parallel diffusion into a one-dimensional vector C with the length of l x N in sequencev
Step ten: c is to bevAnd converting the image into a ciphertext image C with the size of m x n, and storing the ciphertext image C in the cloud platform in a ciphertext mode.
Because a rapid encryption algorithm is needed when the medical sensor of the internet of things performs data acquisition and encryption transmission, a parallel mode is adopted to meet the real-time processing requirement of medical images in a real scene. Fig. 2 is a block diagram of parallel encryption, assuming that the algorithm is run on a multi-threaded computer, dividing the image into N packets according to the number of threads available on the computer, and then performing global scrambling and bi-directional diffusion on the main thread on the N packets of the entire image. Then, entering a parallel phase, each thread completes scrambling and bi-directional diffusion of the internal elements of each packet. And finally, transmitting each encrypted packet to a main thread, finishing the final merging operation by the main thread according to the packet sequence, and outputting the final password image. When running in a parallel model, our proposed encryption algorithm takes very little time. Our method may not significantly improve image encryption efficiency when there are fewer pixels to be encrypted, but is well suited for medical images of large data volumes, with significant advantages over traditional encryption algorithms.
After the authorized user of the client passes the authentication, the background can obtain the decryption key of the key management system, and four random sequences X, Y, U and V are generated through the PRNG algorithm. And the ciphertext data returned by the cloud platform is subjected to inverse operation of the encryption algorithm to obtain the decrypted medical data and visually display the decrypted medical data.
Drawings
FIG. 1 is a system framework diagram of the present invention
FIG. 2 is a parallel structure diagram of the present invention
Detailed Description
The invention provides a password system for protecting privacy of electronic medical images of the Internet of things, which mainly comprises the following five steps:
constructing a PRNG;
(II) generating a key stream;
(III) group scrambling;
(IV) packet diffusion;
(V) scrambling in parallel in the group;
(VI) parallel diffusion in the group;
the implementation platform is MATLAB R2020b and the operating system is win 10. The method comprises the following specific steps:
the first step is as follows: construction of PRNG
Calculating the hash value of the patient ID, and updating the encryption key on the basis key of the key management center. And iterating the 2D-ICM chaotic system and the 2D-LASM chaotic system, and recombining the generated four sequences to obtain four random sequences.
The second step is that: generating a keystream
Four random sequences are obtained by using a PRNG algorithm, and the random sequences are preprocessed to generate six key streams required in encryption.
The third step: packet scrambling
Grouping plaintext images in a main thread and then according to a key stream K1The plaintext block is scrambled.
The fourth step: packet flooding
Using keystream K in main thread2Forward ciphertext feedback diffusion is carried out on plaintext blocks, and then the key stream K is used3And performing reverse ciphertext feedback diffusion.
The fifth step: intra-group parallel scrambling
In each thread, according to the key stream K4The pixels within a group are scrambled and the keystream used within each group is different.
Parallel diffusion in group (VI)
In each thread, a keystream K is used5Forward ciphertext feedback diffusion is carried out on the pixels of each group, and then the key stream K is used6And performing reverse ciphertext feedback diffusion.

Claims (4)

1. A cryptosystem for privacy protection of electronic medical images of the Internet of things is characterized in that:
(1) a password system for protecting the privacy of the electronic medical image of the Internet of things is provided;
(2) a Pseudo Random Number Generator (PRNG) algorithm based on a 2D-ICM and 2D-LASM chaotic system is provided;
(3) a rapid medical image parallel encryption method is provided.
2. The password system for privacy protection of electronic medical images of the internet of things according to claim 1, wherein: the medical image of the patient is acquired through the medical visual sensing equipment, after the data acquisition end passes the authentication, the encryption key of the patient can be acquired from the hospital key management system, the medical image is encrypted by using the encryption key and then transmitted to the cloud platform, and the medical image is stored in a ciphertext mode. When the medical image data of the patient needs to be checked, after the user logs in the client and passes the authentication, the authorized user can acquire the decryption key of the patient from the hospital key management system, and the ciphertext image stored in the cloud platform is decrypted, so that the medical data of the patient can be checked. By the method, the medical data of the patient can be stored in an encrypted manner on the cloud platform, so that the privacy information of the patient is well protected. In encryption systems, a symmetric cryptographic mechanism is used, the base key of all patients being the same. The true key for the encryption algorithm needs to be calculated by correlating the hash code of the patient ID with the basic key, so that the actual key used for data encryption is different for each patient, and the medical privacy information of other patients is still safe in case that the key of one patient is leaked carelessly.
3. The Pseudo Random Number Generator (PRNG) algorithm based on a 2D-ICM and 2D-LASM chaotic system according to claim 1. The method is characterized in that: the 2D-ICM and 2D-LASM chaotic systems are adopted to generate random sequences, although the sequences generated by the chaotic systems have no period theoretically, the accuracy of a computer is limited, and a periodic phenomenon can occur due to accuracy rounding in actual implementation. In consideration of the problem of limited precision, the chaotic sequences generated by the two chaotic systems are subjected to certain operations and randomly combined, so that each random sequence used for encryption is jointly generated by the 2D-ICM and the 2D-LASM, and the degradation problem caused by the limited precision calculation is avoided. The first 1000 of the generated sequence are discarded to eliminate the effect of the initial value on the generated sequence. The Hash value of the patient ID is obtained through the SHA-512 Hash algorithm and is used for updating the encryption key, and high safety of medical image information is guaranteed.
4. The rapid parallel encryption method for medical images according to claim 1, characterized in that: the encryption algorithm adopts a parallel mode to meet the real-time processing requirement of the medical image in a real scene. Assuming the algorithm is run on a multi-threaded computer, the image is divided into N packets according to the number of threads available on the computer, and then the N packets of the entire image are subjected to overall scrambling and bi-spreading on the main thread. Entering a parallel phase, each thread completes scrambling and bi-directional diffusion of each packet's internal elements. And finally, transmitting each encrypted packet to a main thread, finishing the final merging operation by the main thread according to the packet sequence, and outputting the final password image. When running in a parallel model, our proposed encryption algorithm takes very little time. Our method may not significantly improve image encryption efficiency when there are fewer pixels to be encrypted, but is well suited for medical images of large data volumes, with significant advantages over traditional encryption algorithms. By adopting the bidirectional ciphertext feedback method, the generated avalanche effect prevents an attacker from knowing any information about the medical data of the patient from the ciphertext image and constructing a cryptanalysis model to acquire required information.
CN202110427924.XA 2021-04-21 2021-04-21 Password system for privacy protection of electronic medical images of Internet of things Active CN113141359B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110427924.XA CN113141359B (en) 2021-04-21 2021-04-21 Password system for privacy protection of electronic medical images of Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110427924.XA CN113141359B (en) 2021-04-21 2021-04-21 Password system for privacy protection of electronic medical images of Internet of things

Publications (2)

Publication Number Publication Date
CN113141359A true CN113141359A (en) 2021-07-20
CN113141359B CN113141359B (en) 2022-02-25

Family

ID=76812981

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110427924.XA Active CN113141359B (en) 2021-04-21 2021-04-21 Password system for privacy protection of electronic medical images of Internet of things

Country Status (1)

Country Link
CN (1) CN113141359B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117291750A (en) * 2023-11-27 2023-12-26 平利县女娲茗鼎农业科技有限公司 Block chain-based veterinary waste traceability management method and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102289425A (en) * 2011-04-28 2011-12-21 哈尔滨工业大学 Hash algorithm based on extensible precision chaos
CN105306778A (en) * 2015-10-14 2016-02-03 中国科学院大学 Security watermark algorithm combining cryptography
CN108040056A (en) * 2017-12-15 2018-05-15 福州大学 Safety medical treatment big data system based on Internet of Things
CN109800585A (en) * 2018-12-04 2019-05-24 王继军 A kind of image interpolation space completely reversibility separates ciphertext domain Information Hiding Algorithms
CN110535624A (en) * 2019-08-16 2019-12-03 湖北工业大学 A kind of medical image method for secret protection applied to DICOM format
CN110837651A (en) * 2019-11-04 2020-02-25 合肥工业大学 Color image encryption method based on fractional order discrete neural network and DNA operation

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102289425A (en) * 2011-04-28 2011-12-21 哈尔滨工业大学 Hash algorithm based on extensible precision chaos
CN105306778A (en) * 2015-10-14 2016-02-03 中国科学院大学 Security watermark algorithm combining cryptography
CN108040056A (en) * 2017-12-15 2018-05-15 福州大学 Safety medical treatment big data system based on Internet of Things
CN109800585A (en) * 2018-12-04 2019-05-24 王继军 A kind of image interpolation space completely reversibility separates ciphertext domain Information Hiding Algorithms
CN110535624A (en) * 2019-08-16 2019-12-03 湖北工业大学 A kind of medical image method for secret protection applied to DICOM format
CN110837651A (en) * 2019-11-04 2020-02-25 合肥工业大学 Color image encryption method based on fractional order discrete neural network and DNA operation

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
WEIJIA CAO等: "Designing a 2D infinite collapse map for image encryption", 《SIGNAL PROCESSING》 *
王欣宇等: "基于 MapReduce 的并行混合混沌加密方案", 《计算机应用研究》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117291750A (en) * 2023-11-27 2023-12-26 平利县女娲茗鼎农业科技有限公司 Block chain-based veterinary waste traceability management method and system
CN117291750B (en) * 2023-11-27 2024-02-06 平利县女娲茗鼎农业科技有限公司 Block chain-based veterinary waste traceability management method and system

Also Published As

Publication number Publication date
CN113141359B (en) 2022-02-25

Similar Documents

Publication Publication Date Title
Hua et al. Medical image encryption using high-speed scrambling and pixel adaptive diffusion
Vengadapurvaja et al. An efficient homomorphic medical image encryption algorithm for cloud storage security
Wang et al. Multiple medical image encryption algorithm based on scrambling of region of interest and diffusion of odd-even interleaved points
Abokhdair et al. Integration of chaotic map and confusion technique for color medical image encryption
CN108183799A (en) Mixed cipher method based on association in time imaging
Madhu et al. Securing medical images by image encryption using key image
Rachmawanto et al. Medical image cryptosystem using dynamic Josephus sequence and chaotic-hash scrambling
Manikandan et al. A Novel Random Error Approximate Adder‐Based Lightweight Medical Image Encryption Scheme for Secure Remote Monitoring of Health Data
Brindha Confidentiality, integrity and authentication of DICOM medical images
Wang et al. Galois field-based image encryption for remote transmission of tumor ultrasound images
CN113141359B (en) Password system for privacy protection of electronic medical images of Internet of things
Dagadu et al. Chaotic medical image encryption based on Arnold transformation and pseudorandomly enhanced logistic map
Sasikaladevi et al. EMOTE–Multilayered encryption system for protecting medical images based on binary curve
Deepa et al. A state-of-art model of encrypting medical image using DNA cryptography and hybrid chaos map-2d zaslavaski map
Ahmad et al. A framework to protect patient digital medical imagery for secure telediagnosis
Li et al. An image encryption method based on tent and Lorenz chaotic systems
US11263353B2 (en) Mixed sequencing of polynomial-diverse encryption and decryption operations for side channel attack protection
Preethi et al. Secure Fusion of Crypto-Stegano Based Scheme for Satellite Image Application
Lin et al. Combining riemann-lebesgue based key generator and machine learning based intelligent encryption scheme for IoMT images infosecurity
Akkasaligar et al. Multilevel security for medical image using heterogeneous chaotic map and deoxyribonucleic acid sequence operations
Navamani et al. Secure transmission of DICOM images by comparing different cryptographic algorithms
Demla et al. RISE: Rubik’s cube and image segmentation based secure medical images encryption
Shi et al. A (t, n) secret sharing scheme for image encryption
Nampalle et al. Medical image security and authenticity via dual encryption
Sulaman et al. A Novel Approach for Medical Image Security Using the Radon Transform and AES-CBC Algorithm

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant