CN113141359A - Password system for privacy protection of electronic medical images of Internet of things - Google Patents
Password system for privacy protection of electronic medical images of Internet of things Download PDFInfo
- Publication number
- CN113141359A CN113141359A CN202110427924.XA CN202110427924A CN113141359A CN 113141359 A CN113141359 A CN 113141359A CN 202110427924 A CN202110427924 A CN 202110427924A CN 113141359 A CN113141359 A CN 113141359A
- Authority
- CN
- China
- Prior art keywords
- patient
- encryption
- key
- medical
- image
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computing arrangements based on specific mathematical models
- G06N7/08—Computing arrangements based on specific mathematical models using chaos models or non-linear system models
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
- G16H30/00—ICT specially adapted for the handling or processing of medical images
- G16H30/20—ICT specially adapted for the handling or processing of medical images for handling medical images, e.g. DICOM, HL7 or PACS
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16Y—INFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
- G16Y40/00—IoT characterised by the purpose of the information processing
- G16Y40/50—Safety; Security of things, users, data or systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/001—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/88—Medical equipments
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- Medical Informatics (AREA)
- General Health & Medical Sciences (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Mathematical Optimization (AREA)
- Algebra (AREA)
- Mathematical Analysis (AREA)
- Data Mining & Analysis (AREA)
- Pure & Applied Mathematics (AREA)
- Mathematical Physics (AREA)
- Software Systems (AREA)
- Computational Mathematics (AREA)
- Artificial Intelligence (AREA)
- Evolutionary Computation (AREA)
- Nonlinear Science (AREA)
- Power Engineering (AREA)
- Nuclear Medicine, Radiotherapy & Molecular Imaging (AREA)
- Radiology & Medical Imaging (AREA)
- Epidemiology (AREA)
- Primary Health Care (AREA)
- Public Health (AREA)
- Medical Treatment And Welfare Office Work (AREA)
- Measuring And Recording Apparatus For Diagnosis (AREA)
Abstract
The invention relates to a password system for protecting privacy of electronic medical images of the Internet of things. The invention mainly comprises the following steps that (1) a password system for protecting the privacy of the electronic medical image of the Internet of things is provided; (2) a Pseudo Random Number Generator (PRNG) algorithm based on a 2D-ICM and 2D-LASM chaotic system is provided; (3) a rapid medical image parallel encryption method is provided.
Description
Technical Field
The invention relates to the field of information security and privacy protection, in particular to a password system for protecting the privacy of an electronic medical image of the Internet of things.
Background
Privacy protection has become a primary requirement for modern applications such as social media, internet of things (IoT), and electronic medical systems. In the field of electronic medicine, many medical imaging devices are widely connected and used to facilitate the diagnosis and treatment process of doctors, such as Magnetic Resonance Imaging (MRI) for brain tumor diagnosis, lung Computed Tomography (CT) for lung detection, and endoscopes for detecting the stomach. These personal medical images should be kept secret to ensure that the privacy of the patient is not compromised. Medical images are generally characterized by a huge amount of data and have high requirements on safety. Conventional text data-based encryption schemes cannot be directly applied to electronic image data due to limitations in the characteristics of the image data itself. In addition, a satisfactory level of security is achieved in a fast, lightweight encryption manner, taking into account the constraints of real-time data acquisition. The invention provides a double-chaos system-based privacy protection password system for medical images of the Internet of things. The encryption system can protect the medical image of the patient from being damaged by the middleman, and the medical image is in a ciphertext form during transmission and storage, so that any medical information of the patient cannot be disclosed. Aiming at medical images with huge data volume, the password system adopts a parallel mode, and only little time is needed for encryption, so that the real-time processing requirement of medical data acquisition under a real scene is met. A bidirectional ciphertext feedback mechanism is introduced in the encryption process, and the high safety of the system is ensured by the generated avalanche effect. The password system can encrypt the gray medical image and the color medical image, the generated encrypted image does not reveal any information, and only allows an authorized user to decrypt, thereby effectively protecting the privacy of patients.
Disclosure of Invention
The invention aims to solve the safety problem in the transmission and the access of the electronic medical image. Therefore, the invention provides a password system for protecting the privacy of the electronic medical images of the Internet of things, which mainly comprises three contents:
1. a password system for protecting the privacy of the electronic medical image of the Internet of things is provided;
2. a Pseudo Random Number Generator (PRNG) algorithm based on a 2D-ICM and 2D-LASM chaotic system is provided;
3. a rapid medical image parallel encryption method is provided.
The specific contents are as follows:
1. a cryptosystem for privacy protection of thing networking electron medical image is proposed
In our cryptographic system framework (fig. 1), medical images of a patient are acquired by a medical visual sensing device, such as color gastroscopic images, grayscale CT images, MRI images, and the like. Each patient has a key belonging to the patient, and after the data acquisition end passes the authentication, the encryption key of the patient can be acquired from the hospital key management system. The medical image acquired by the sensing equipment is encrypted by using the encryption key and then transmitted to the cloud platform, and is stored in a ciphertext mode. When the medical image data of the patient needs to be checked, after the user logs in the client and passes the authentication, the authorized user can acquire the decryption key of the patient from the hospital key management system, and the ciphertext image stored in the cloud platform is decrypted, so that the medical data of the patient can be checked. By the method, the medical data of the patient can be stored in an encrypted manner on the cloud platform, so that the privacy information of the patient is well protected. The patient can check own data at the mobile terminal, and medical data of the patient can be accessed only after a hospital doctor, a remote specialist, a researcher and the like obtain authorization through authentication. In the present encryption system, a symmetric cryptographic mechanism is used, and thus the encryption key and the decryption key are the same. The basic key of the encryption algorithm, namely the initial condition of the chaotic system, is stored in the key management system, and the basic key of all patients is the same. The updating process of the key firstly carries out hash calculation on the ID of each patient, the obtained hash code is unique because the ID value of each patient is different, and the hash code and the basic key are used for carrying out correlation calculation to obtain an updated key, namely the true key for the encryption algorithm. And the updating part of the key is completed and stored at the key management system end, the data acquisition end or the client sends an authentication request, and the updated key is obtained after the authentication. The key used by each patient for data encryption is different, where the encryption key is the updated key. The benefit of using a different key for each patient is that the privacy of the medical care information for other patients remains secure, assuming that one patient's key is inadvertently compromised.
2. A Pseudo Random Number Generator (PRNG) algorithm based on a 2D-ICM and 2D-LASM chaotic system is provided
The 2D-ICM is a two-dimensional hyperchaotic system with complex chaotic behavior, and the mathematical expression thereof is as follows:
the system parameters a and b are real numbers, a ≠ 0, b ≠ 0, x, y ∈ [ -1, 1 ]. The 2D-ICM has two positive Lyapunov exponents, and is hyperchaotic in the whole parameter range, so that the track of the 2D-ICM is difficult to infer. The lyapunov index value of the 2D-ICM increases with increasing parameter, and as large a lyapunov index value as possible can be obtained by adjusting the parameter. The larger the Lyapunov exponent is, the more obvious the chaotic characteristic of the system is, and the higher the safety is when the system is used for a cryptosystem.
The 2D-LASM is a two-dimensional chaotic system having high sensitivity to an initial value. The 2D-LASM is derived from the Sin mapping and the Logistic mapping, and the mathematical expression is as follows:
the system parameters u, v, mu belongs to [0, 1], when mu belongs to [0.37, 0.38] < U [0.4, 0.42] < U [0.44, 0.93], the 2D-LASM has chaotic behavior, when mu belongs to [0.37, 0.38] < U [0.4, 0.42] < U [0.44, 0.93], the 2D-LASM has two positive Lyapunov indexes, and the system has hyperchaotic behavior.
We use these two-dimensional chaotic maps to generate a random sequence associated with the plaintext image. Although the sequence generated by the chaotic system has no period in theory, the precision of the computer is limited, and the periodic phenomenon can occur due to the rounding of the precision in practical implementation. In consideration of the problem of limited precision, the chaos sequences generated by the two chaos systems are subjected to some operations and randomly combined, so that each random sequence used for encryption is jointly generated by the 2D-ICM and the 2D-LASM, and the degradation problem caused by limited precision calculation is avoided. We discard the first 1000 of the generated sequence to eliminate the effect of the initial value on the generated sequence. In addition, the hash value of the patient ID is obtained through the SHA-512 hash algorithm and is used for updating the encryption key, and high security of medical image information is guaranteed. The specific steps of our designed PRNG algorithm are described as follows:
the method comprises the following steps: the SHA-512 algorithm is used to calculate the hash H of the patient ID, which is divided into 64 eight-bit blocks, denoted H ═ H1,h2,...,hi]Wherein i is 1, 2i∈[0,255]。
Step two: the following calculation is made from the hash value of the patient ID
Step three: for x in fixed key0,y0,u0,v0Update as follows
Step four: and respectively iterating the 2D-ICM chaotic system and the 2D-LASM chaotic system mn +1000 times by using the updated key, and discarding the first 1000 values of each sequence to obtain four random sequences x, y, u and v.
Step five: t is obtained by the following calculation1,T2,T3,
For T1,T2,T3Sorting from small to large to obtain T ═ Sort (T)1,T2,T3)。
Step six: and randomly recombining X, Y, U and V in the step four to obtain four random sequences X, Y, U and V.
3. Provides a rapid medical image parallel encryption method
Most medical image acquisition systems diagnose patients by capturing color or gray key images in real-time video images through a high-resolution vision sensor, so a rapid medical image encryption algorithm is provided, which can be used for color and gray images and ensures the privacy and confidentiality of the key medical images. A method for updating a key and feeding back a ciphertext is introduced, so that an attacker cannot know any information about medical data of a patient from a ciphertext image and cannot construct a cryptanalysis model to acquire required information.
The method comprises the following steps: according to a fixed key x provided by a key management system0,y0,u0,v0A, b, mu and the patient ID, the four random sequences X, Y, U, V are obtained by the PRNG algorithm of content two.
Step two: the medical images I are grouped according to the parallel arrangement in the encryption module. The medical image is converted into a one-dimensional vector Iv, which is common assuming that each group contains l pixel valuesAnd (4) grouping. When l is set, N is guaranteed to be an integer.
Step three: change Iv into a matrix I of size l NNUsing K1To INPerforming row scrambling to obtain Ip in a scrambling mode
Ip(K1(i),:)=IN(i,:),i=1,2,…,N
Step four: using K2Performing block cipher text feedback forward diffusion on Ip to obtain Id1In a diffusion manner of
Step five: using K3To Id1Performing feedback back diffusion on the block cipher text to obtain Id2In a diffusion manner of
Step six: let Id2Is used for each packet ofgDenotes the use of K4The internal pixels of the N groups are scrambled in parallel to obtain a scrambled group IgpThe scrambling mode is expressed as
Igp(K4(i))=Ig(i),i=1,2,…,l
Step seven: using K5To IgpPerforming parallel block cipher text feedback forward diffusion to obtain Igd1In a diffusion manner of
Step eight: using K6To Igd1Performing feedback back diffusion on the block cipher text to obtain Igd2In a diffusion manner of
Step nine: splicing each group finished by parallel diffusion into a one-dimensional vector C with the length of l x N in sequencev。
Step ten: c is to bevAnd converting the image into a ciphertext image C with the size of m x n, and storing the ciphertext image C in the cloud platform in a ciphertext mode.
Because a rapid encryption algorithm is needed when the medical sensor of the internet of things performs data acquisition and encryption transmission, a parallel mode is adopted to meet the real-time processing requirement of medical images in a real scene. Fig. 2 is a block diagram of parallel encryption, assuming that the algorithm is run on a multi-threaded computer, dividing the image into N packets according to the number of threads available on the computer, and then performing global scrambling and bi-directional diffusion on the main thread on the N packets of the entire image. Then, entering a parallel phase, each thread completes scrambling and bi-directional diffusion of the internal elements of each packet. And finally, transmitting each encrypted packet to a main thread, finishing the final merging operation by the main thread according to the packet sequence, and outputting the final password image. When running in a parallel model, our proposed encryption algorithm takes very little time. Our method may not significantly improve image encryption efficiency when there are fewer pixels to be encrypted, but is well suited for medical images of large data volumes, with significant advantages over traditional encryption algorithms.
After the authorized user of the client passes the authentication, the background can obtain the decryption key of the key management system, and four random sequences X, Y, U and V are generated through the PRNG algorithm. And the ciphertext data returned by the cloud platform is subjected to inverse operation of the encryption algorithm to obtain the decrypted medical data and visually display the decrypted medical data.
Drawings
FIG. 1 is a system framework diagram of the present invention
FIG. 2 is a parallel structure diagram of the present invention
Detailed Description
The invention provides a password system for protecting privacy of electronic medical images of the Internet of things, which mainly comprises the following five steps:
constructing a PRNG;
(II) generating a key stream;
(III) group scrambling;
(IV) packet diffusion;
(V) scrambling in parallel in the group;
(VI) parallel diffusion in the group;
the implementation platform is MATLAB R2020b and the operating system is win 10. The method comprises the following specific steps:
the first step is as follows: construction of PRNG
Calculating the hash value of the patient ID, and updating the encryption key on the basis key of the key management center. And iterating the 2D-ICM chaotic system and the 2D-LASM chaotic system, and recombining the generated four sequences to obtain four random sequences.
The second step is that: generating a keystream
Four random sequences are obtained by using a PRNG algorithm, and the random sequences are preprocessed to generate six key streams required in encryption.
The third step: packet scrambling
Grouping plaintext images in a main thread and then according to a key stream K1The plaintext block is scrambled.
The fourth step: packet flooding
Using keystream K in main thread2Forward ciphertext feedback diffusion is carried out on plaintext blocks, and then the key stream K is used3And performing reverse ciphertext feedback diffusion.
The fifth step: intra-group parallel scrambling
In each thread, according to the key stream K4The pixels within a group are scrambled and the keystream used within each group is different.
Parallel diffusion in group (VI)
In each thread, a keystream K is used5Forward ciphertext feedback diffusion is carried out on the pixels of each group, and then the key stream K is used6And performing reverse ciphertext feedback diffusion.
Claims (4)
1. A cryptosystem for privacy protection of electronic medical images of the Internet of things is characterized in that:
(1) a password system for protecting the privacy of the electronic medical image of the Internet of things is provided;
(2) a Pseudo Random Number Generator (PRNG) algorithm based on a 2D-ICM and 2D-LASM chaotic system is provided;
(3) a rapid medical image parallel encryption method is provided.
2. The password system for privacy protection of electronic medical images of the internet of things according to claim 1, wherein: the medical image of the patient is acquired through the medical visual sensing equipment, after the data acquisition end passes the authentication, the encryption key of the patient can be acquired from the hospital key management system, the medical image is encrypted by using the encryption key and then transmitted to the cloud platform, and the medical image is stored in a ciphertext mode. When the medical image data of the patient needs to be checked, after the user logs in the client and passes the authentication, the authorized user can acquire the decryption key of the patient from the hospital key management system, and the ciphertext image stored in the cloud platform is decrypted, so that the medical data of the patient can be checked. By the method, the medical data of the patient can be stored in an encrypted manner on the cloud platform, so that the privacy information of the patient is well protected. In encryption systems, a symmetric cryptographic mechanism is used, the base key of all patients being the same. The true key for the encryption algorithm needs to be calculated by correlating the hash code of the patient ID with the basic key, so that the actual key used for data encryption is different for each patient, and the medical privacy information of other patients is still safe in case that the key of one patient is leaked carelessly.
3. The Pseudo Random Number Generator (PRNG) algorithm based on a 2D-ICM and 2D-LASM chaotic system according to claim 1. The method is characterized in that: the 2D-ICM and 2D-LASM chaotic systems are adopted to generate random sequences, although the sequences generated by the chaotic systems have no period theoretically, the accuracy of a computer is limited, and a periodic phenomenon can occur due to accuracy rounding in actual implementation. In consideration of the problem of limited precision, the chaotic sequences generated by the two chaotic systems are subjected to certain operations and randomly combined, so that each random sequence used for encryption is jointly generated by the 2D-ICM and the 2D-LASM, and the degradation problem caused by the limited precision calculation is avoided. The first 1000 of the generated sequence are discarded to eliminate the effect of the initial value on the generated sequence. The Hash value of the patient ID is obtained through the SHA-512 Hash algorithm and is used for updating the encryption key, and high safety of medical image information is guaranteed.
4. The rapid parallel encryption method for medical images according to claim 1, characterized in that: the encryption algorithm adopts a parallel mode to meet the real-time processing requirement of the medical image in a real scene. Assuming the algorithm is run on a multi-threaded computer, the image is divided into N packets according to the number of threads available on the computer, and then the N packets of the entire image are subjected to overall scrambling and bi-spreading on the main thread. Entering a parallel phase, each thread completes scrambling and bi-directional diffusion of each packet's internal elements. And finally, transmitting each encrypted packet to a main thread, finishing the final merging operation by the main thread according to the packet sequence, and outputting the final password image. When running in a parallel model, our proposed encryption algorithm takes very little time. Our method may not significantly improve image encryption efficiency when there are fewer pixels to be encrypted, but is well suited for medical images of large data volumes, with significant advantages over traditional encryption algorithms. By adopting the bidirectional ciphertext feedback method, the generated avalanche effect prevents an attacker from knowing any information about the medical data of the patient from the ciphertext image and constructing a cryptanalysis model to acquire required information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110427924.XA CN113141359B (en) | 2021-04-21 | 2021-04-21 | Password system for privacy protection of electronic medical images of Internet of things |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110427924.XA CN113141359B (en) | 2021-04-21 | 2021-04-21 | Password system for privacy protection of electronic medical images of Internet of things |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113141359A true CN113141359A (en) | 2021-07-20 |
CN113141359B CN113141359B (en) | 2022-02-25 |
Family
ID=76812981
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110427924.XA Active CN113141359B (en) | 2021-04-21 | 2021-04-21 | Password system for privacy protection of electronic medical images of Internet of things |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113141359B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117291750A (en) * | 2023-11-27 | 2023-12-26 | 平利县女娲茗鼎农业科技有限公司 | Block chain-based veterinary waste traceability management method and system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102289425A (en) * | 2011-04-28 | 2011-12-21 | 哈尔滨工业大学 | Hash algorithm based on extensible precision chaos |
CN105306778A (en) * | 2015-10-14 | 2016-02-03 | 中国科学院大学 | Security watermark algorithm combining cryptography |
CN108040056A (en) * | 2017-12-15 | 2018-05-15 | 福州大学 | Safety medical treatment big data system based on Internet of Things |
CN109800585A (en) * | 2018-12-04 | 2019-05-24 | 王继军 | A kind of image interpolation space completely reversibility separates ciphertext domain Information Hiding Algorithms |
CN110535624A (en) * | 2019-08-16 | 2019-12-03 | 湖北工业大学 | A kind of medical image method for secret protection applied to DICOM format |
CN110837651A (en) * | 2019-11-04 | 2020-02-25 | 合肥工业大学 | Color image encryption method based on fractional order discrete neural network and DNA operation |
-
2021
- 2021-04-21 CN CN202110427924.XA patent/CN113141359B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102289425A (en) * | 2011-04-28 | 2011-12-21 | 哈尔滨工业大学 | Hash algorithm based on extensible precision chaos |
CN105306778A (en) * | 2015-10-14 | 2016-02-03 | 中国科学院大学 | Security watermark algorithm combining cryptography |
CN108040056A (en) * | 2017-12-15 | 2018-05-15 | 福州大学 | Safety medical treatment big data system based on Internet of Things |
CN109800585A (en) * | 2018-12-04 | 2019-05-24 | 王继军 | A kind of image interpolation space completely reversibility separates ciphertext domain Information Hiding Algorithms |
CN110535624A (en) * | 2019-08-16 | 2019-12-03 | 湖北工业大学 | A kind of medical image method for secret protection applied to DICOM format |
CN110837651A (en) * | 2019-11-04 | 2020-02-25 | 合肥工业大学 | Color image encryption method based on fractional order discrete neural network and DNA operation |
Non-Patent Citations (2)
Title |
---|
WEIJIA CAO等: "Designing a 2D infinite collapse map for image encryption", 《SIGNAL PROCESSING》 * |
王欣宇等: "基于 MapReduce 的并行混合混沌加密方案", 《计算机应用研究》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117291750A (en) * | 2023-11-27 | 2023-12-26 | 平利县女娲茗鼎农业科技有限公司 | Block chain-based veterinary waste traceability management method and system |
CN117291750B (en) * | 2023-11-27 | 2024-02-06 | 平利县女娲茗鼎农业科技有限公司 | Block chain-based veterinary waste traceability management method and system |
Also Published As
Publication number | Publication date |
---|---|
CN113141359B (en) | 2022-02-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hua et al. | Medical image encryption using high-speed scrambling and pixel adaptive diffusion | |
Vengadapurvaja et al. | An efficient homomorphic medical image encryption algorithm for cloud storage security | |
Wang et al. | Multiple medical image encryption algorithm based on scrambling of region of interest and diffusion of odd-even interleaved points | |
Abokhdair et al. | Integration of chaotic map and confusion technique for color medical image encryption | |
CN108183799A (en) | Mixed cipher method based on association in time imaging | |
Madhu et al. | Securing medical images by image encryption using key image | |
Rachmawanto et al. | Medical image cryptosystem using dynamic Josephus sequence and chaotic-hash scrambling | |
Manikandan et al. | A Novel Random Error Approximate Adder‐Based Lightweight Medical Image Encryption Scheme for Secure Remote Monitoring of Health Data | |
Brindha | Confidentiality, integrity and authentication of DICOM medical images | |
Wang et al. | Galois field-based image encryption for remote transmission of tumor ultrasound images | |
CN113141359B (en) | Password system for privacy protection of electronic medical images of Internet of things | |
Dagadu et al. | Chaotic medical image encryption based on Arnold transformation and pseudorandomly enhanced logistic map | |
Sasikaladevi et al. | EMOTE–Multilayered encryption system for protecting medical images based on binary curve | |
Deepa et al. | A state-of-art model of encrypting medical image using DNA cryptography and hybrid chaos map-2d zaslavaski map | |
Ahmad et al. | A framework to protect patient digital medical imagery for secure telediagnosis | |
Li et al. | An image encryption method based on tent and Lorenz chaotic systems | |
US11263353B2 (en) | Mixed sequencing of polynomial-diverse encryption and decryption operations for side channel attack protection | |
Preethi et al. | Secure Fusion of Crypto-Stegano Based Scheme for Satellite Image Application | |
Lin et al. | Combining riemann-lebesgue based key generator and machine learning based intelligent encryption scheme for IoMT images infosecurity | |
Akkasaligar et al. | Multilevel security for medical image using heterogeneous chaotic map and deoxyribonucleic acid sequence operations | |
Navamani et al. | Secure transmission of DICOM images by comparing different cryptographic algorithms | |
Demla et al. | RISE: Rubik’s cube and image segmentation based secure medical images encryption | |
Shi et al. | A (t, n) secret sharing scheme for image encryption | |
Nampalle et al. | Medical image security and authenticity via dual encryption | |
Sulaman et al. | A Novel Approach for Medical Image Security Using the Radon Transform and AES-CBC Algorithm |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |