Two-Round Symmetric Cryptography for Medical Image Infosecurity Against-Hacker Attacks in a Picture Archiving and Communication System

التفاصيل البيبلوغرافية
العنوان: Two-Round Symmetric Cryptography for Medical Image Infosecurity Against-Hacker Attacks in a Picture Archiving and Communication System
المؤلفون: Jian-Xing Wu, Chih-Hsien Li, Yu-Chi Pu, Pi-Yun Chen, Neng-Sheng Pai, Chia-Hung Lin, Chao-Lin Kuo
المصدر: IEEE Access, Vol 8, Pp 181698-181711 (2020)
بيانات النشر: IEEE, 2020.
سنة النشر: 2020
مصطلحات موضوعية: General Computer Science, business.industry, Computer science, Hash function, General Engineering, ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION, Symmetric cryptography, 020206 networking & telecommunications, hacker attack, 02 engineering and technology, Encryption, Picture archiving and communication system, Symmetric-key algorithm, hash transformation, 0202 electrical engineering, electronic engineering, information engineering, Cloud database, 020201 artificial intelligence & image processing, General Materials Science, lcsh:Electrical engineering. Electronics. Nuclear engineering, business, lcsh:TK1-9971, Hacker, Computer network, optimization-based controller, peak signal-to-noise ratio
الوصف: Digitalizing medical images, such as images in ultrasonography or mammography, or magnetic resonance imaging, can be applied for telemedicine applications in telediagnosis and telesurgery, and can be stored in a cloud database via computer networking transmission or wireless communications. Besides, these images contain the patient privacy information. Thus, their reliability and availability should be protected to ensure medical image infosecurity in public channels or open spaces. Medical images can also be hacked by unauthorized people. Therefore, in the picture archiving and communication system (PACS), this study proposes against-hacker attacks with two-round symmetric cryptography models for medical image infosecurity. Hash transformation with multi secret keys is performed to change the pixel values and produce dynamic errors for the two-round encryption processes. In image decryption, two-round decryption processes are employed to estimate the possible hacker attacks at the routing path and to determine the decryption key parameter by using an optimization-based controller. For a case study of mammographic images consisting of 50 benign tumors and 50 malignant tumors, the peak signal-to-noise ratio (PSNR) is employed to evaluate the decryption quality between the plain and decrypted images.
اللغة: English
تدمد: 2169-3536
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b03b1dea5eaa808e28b51c02ed026614Test
https://ieeexplore.ieee.org/document/9210530Test/
حقوق: OPEN
رقم الانضمام: edsair.doi.dedup.....b03b1dea5eaa808e28b51c02ed026614
قاعدة البيانات: OpenAIRE