Baranwal et al., 2024 - Google Patents
Using chaos to encrypt images with reconstruction through deep learning model for smart healthcareBaranwal et al., 2024
- Document ID
- 4617257844759647695
- Author
- Baranwal N
- Singh K
- Singh A
- et al.
- Publication year
- Publication venue
- Computers and Electrical Engineering
External Links
Snippet
In recent years, the potential for digital images to deliver important information carrier in healthcare domains mainly derives from the possibility of intelligent or interconnecting heterogeneous devices. Because of the high value of medical images, there is an urgent …
- 238000013136 deep learning model 0 title abstract description 9
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0203—Image watermarking whereby the image with embedded watermark is reverted to the original condition before embedding, e.g. lossless, distortion-free or invertible watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Xiong et al. | Color image chaos encryption algorithm combining CRC and nine palace map | |
| Sarosh et al. | A security management framework for big data in smart healthcare | |
| Kumar et al. | IEHC: An efficient image encryption technique using hybrid chaotic map | |
| Denis et al. | Hybrid data encryption model integrating multi-objective adaptive genetic algorithm for secure medical data communication over cloud-based healthcare systems | |
| Lin et al. | An image encryption scheme based on Lorenz hyperchaotic system and RSA algorithm | |
| Li et al. | Reversible data hiding in encrypted images using cross division and additive homomorphism | |
| Chen et al. | An asymmetric image encryption scheme based on hash SHA-3, RSA and compressive sensing | |
| Masood et al. | A novel image encryption scheme based on Arnold cat map, Newton-Leipnik system and Logistic Gaussian map | |
| Bao et al. | A secure and robust image encryption algorithm based on compressive sensing and DNA coding | |
| Ye et al. | Asymmetric image encryption scheme based on the Quantum logistic map and cyclic modulo diffusion | |
| Pavithra et al. | A survey on the techniques of medical image encryption | |
| Aparna et al. | Combined image encryption and steganography technique for enhanced security using multiple chaotic maps | |
| Alexan et al. | Stegocrypt: A robust tri‐stage spatial steganography algorithm using TLM encryption and DNA coding for securing digital images | |
| Sasikaladevi et al. | EMOTE–Multilayered encryption system for protecting medical images based on binary curve | |
| Ye et al. | Research on reversible image steganography of encrypted image based on image interpolation and difference histogram shift | |
| Himthani et al. | Systematic survey on visually meaningful image encryption techniques | |
| Li et al. | Medical images lossless recovery based on POB number system and image compression | |
| Long et al. | A LE-controlled 4D non-degenerate hyperchaotic system and STP-CS model based efficient image encryption algorithm | |
| Baranwal et al. | Using chaos to encrypt images with reconstruction through deep learning model for smart healthcare | |
| Khan et al. | Integration of a novel 3D chaotic map with ELSS and novel cross-border pixel exchange strategy for secure image communication | |
| CN115718925A (en) | A globally coupled privacy image encryption method and storage medium with infinite space-time chaos | |
| Gupta et al. | An effective approach of secured medical image transmission using encryption method | |
| Si | Image data privacy protection technology based on reversible information hiding and robust secret sharing | |
| Ye et al. | Joint fingerprinting and encryption in hybrid domains for multimedia sharing in social networks | |
| Dawood et al. | A comprehensive review of color image encryption technology |