메뉴 건너뛰기




Volumn 2, Issue 1, 2012, Pages 15-24

Novel scheme for storage and transmission of medical images with patient information using elliptic curve based image encryption schemes with LSB based steganographic technique

Author keywords

Cyclic elliptic curve; Finite field; Image encryption; Steganographic technique; Stream cipher system

Indexed keywords


EID: 84881236091     PISSN: 21567018     EISSN: 21567026     Source Type: Journal    
DOI: 10.1166/jmihi.2012.1068     Document Type: Article
Times cited : (2)

References (32)
  • 2
    • 0003508558 scopus 로고    scopus 로고
    • Federal Information Processing Standards Publications (FIPS 197), November
    • Federal Information Processing Standards Publications (FIPS 197), Advanced Encryption Standard (AES), November (2001).
    • (2001) Advanced Encryption Standard (AES)
  • 3
    • 1342306864 scopus 로고    scopus 로고
    • A symmetric encryption scheme based on 3D chaotic cat maps
    • G. Chen, Y. Mao, and C. K. Chui, A symmetric encryption scheme based on 3D chaotic cat maps, Chaos, Solitions & Fractals 21, 749 (2004).
    • (2004) Chaos, Solitions & Fractals , vol.21 , pp. 749
    • Chen, G.1    Mao, Y.2    Chui, C.K.3
  • 4
    • 10444257964 scopus 로고    scopus 로고
    • A novel fast image encryption scheme based on 3D chaotic baker maps
    • Y. Mao, G. Chen, and S. Lian, A novel fast image encryption scheme based on 3D chaotic baker maps. Int. Journal of Bifurcation and Chaos 14, 3613 (2004).
    • (2004) Int. Journal of Bifurcation and Chaos , vol.14 , pp. 3613
    • Mao, Y.1    Chen, G.2    Lian, S.3
  • 6
    • 51249102657 scopus 로고    scopus 로고
    • Image encryption algorithm based on chaotic mapping
    • © Universiti Teknologi Malaysia
    • M. Salleh, S. Ibrahim, and I. F. Isnin, Image encryption algorithm based on chaotic mapping. Jurnal Teknologi 39(D), 1 (2003), © Universiti Teknologi Malaysia.
    • (2003) Jurnal Teknologi , vol.39 , Issue.D , pp. 1
    • Salleh, M.1    Ibrahim, S.2    Isnin, I.F.3
  • 11
    • 84881264170 scopus 로고    scopus 로고
    • It security in biomedical imaging informatics: The hidden vulnerability
    • World Scientific Publishing Company, Singapore
    • W. S. Adam Chee, IT Security in Biomedical Imaging Informatics: The Hidden Vulnerability, Journal of Mechanics in Medicine and Biology, World Scientific Publishing Company, Singapore (2007) Vol. 7, pp. 101-106.
    • (2007) Journal of Mechanics in Medicine and Biology , vol.7 , pp. 101-106
    • Adam Chee, W.S.1
  • 12
    • 0003688173 scopus 로고    scopus 로고
    • National Electrical Manufacturers Association, Rosslyn, DICOM Committee, Virgina USA
    • D. Clunie, Digital Imaging and Communications in Medicine (DICOM), National Electrical Manufacturers Association, Rosslyn, DICOM Committee, Virgina USA (2001).
    • (2001) Digital Imaging and Communications in Medicine (DICOM)
    • Clunie, D.1
  • 16
    • 0035167458 scopus 로고    scopus 로고
    • Analysis of LSB based image steganography techniques
    • Thessaloniki, Greece, October
    • R. Chandramouli and N. Memon, Analysis of LSB based image steganography techniques, Proceedings of ICIP 2001., Thessaloniki, Greece, October (2001).
    • (2001) Proceedings of ICIP 2001
    • Chandramouli, R.1    Memon, N.2
  • 17
    • 63149093627 scopus 로고    scopus 로고
    • Efficient storage and transmission of digital fundus images with patient information using reversible watermarking technique and error control codes
    • J. Nayak, P. S Bhat, R. Acharya, and M. Sathish Kumar, Efficient storage and transmission of digital fundus images with patient information using reversible watermarking technique and error control codes. Journal of Medical Systems (Springer) 163 (2008).
    • (2008) Journal of Medical Systems (Springer) , pp. 163
    • Nayak, J.1    Bhat, P.S.2    Acharya, R.3    Sathish Kumar, M.4
  • 18
    • 77951787544 scopus 로고    scopus 로고
    • High speed and secure encryption schemes based on chinese reminder theorem for storage and transmission of medical information
    • G. Aital, K. N. Hari Bhat, and S. U. Acharya, High speed and secure encryption schemes based on chinese reminder theorem for storage and transmission of medical information. Journal of Mechanics in Medicine and Biology. 10, 167 (2010).
    • (2010) Journal of Mechanics in Medicine and Biology. , vol.10 , pp. 167
    • Aital, G.1    Hari Bhat, K.N.2    Acharya, S.U.3
  • 24
    • 84874800178 scopus 로고
    • A public Key cryptosystem and a signature scheme based on discrete logarithms
    • IT-31
    • T. ElGamal, A public Key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Information Theory IT-31, 469 (1985).
    • (1985) IEEE Trans. Information Theory , pp. 469
    • Elgamal, T.1
  • 27
    • 79957816695 scopus 로고    scopus 로고
    • Symmetric key image encryption scheme with key sequences derived from random sequence of cyclic elliptic curve points
    • S. V. Sathyanarayana, M. Aswatha Kumar, and K. N. Haribhat, Symmetric key image encryption scheme with key sequences derived from random sequence of cyclic elliptic curve points. International Journal of Network Security 12, 137 (2011).
    • (2011) International Journal of Network Security , vol.12 , pp. 137
    • Sathyanarayana, S.V.1    Aswatha Kumar, M.2    Haribhat, K.N.3
  • 29
    • 84889062986 scopus 로고
    • Building cyclic elliptic curves modulo large primes
    • F. Morain, Building Cyclic Elliptic Curves Modulo Large Primes. Lecture Notes in Computer Science 547, 328 (1990).
    • (1990) Lecture Notes in Computer Science , vol.547 , pp. 328
    • Morain, F.1
  • 32
    • 31344462815 scopus 로고    scopus 로고
    • Block ciphers and stream ciphers: The state of the art
    • Belgium
    • A. Biryukov, Block Ciphers and Stream Ciphers: The State of the Art, Technical report, http://www.esat.kuleuven.ac.be, Belgium (2006).
    • (2006) Technical Report
    • Biryukov, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.