12/28/2022 0 Comments Cdr dicom 4.5 requirementsText based algorithms like Advanced Encryption Standard, Elliptic Curve Cryptography, and RC4 are not preferred for encryption of medical images because of the complicated internal structure, memory requirements, and time delay incurred in the process of key generation and encryption/decryption. The strong privacy requirements of medical images with the operating constraints demand secure encryption algorithms with optimal processing requirements. These medical images are highly sensitive and are to be operated in a resource constrained environment characterized by lower band width, limited processing power, and limited memory. Health records involve extensive usage of multimedia especially images, which are generated from various imaging technologies like conventional X-rays, ultrasound imaging, digital mammography, Computed Axial Tomography (CT), Positron Emission Tomography (PET), and Magnetic Resonance Imaging (MRI). Telemedicine involves large volume of storage and exchange of electronic health records among physicians, patients and health care professionals for better health services. The increasing adoption and usage of internet, smart phones, mobile health care devices, and wearable health technology have significantly impacted the growth of telemedicine over the years. Telemedicine is essentially the remote diagnosis and treatment of patients by means of telecommunications technology. The computational requirements for encryption/decryption have been reduced significantly owing to the reduced number of computations in the process of encryption/decryption. The corresponding results confirm the strength of the proposed design towards statistical and differential crypt analysis. Experiments have been conducted to analyze key space, key sensitivity, avalanche effect, correlation distribution, entropy, and histograms. The proposed system is highly secure because of the randomness introduced due to the application of modular exponentiation key generation and application of Henon maps for permutation of keys. The key matrix is permuted and chaotically controlled by Henon map to decide the encryption keys for every pixel of DICOM image. Modular exponentiation of the primitive roots of the chosen prime in the range of its residual set is employed in the generation of two-dimensional array of keys. This research work proposes a novel idea of integrating number theoretic approach with Henon map for secure and efficient encryption. Images in medical records are characterized by huge volume, high redundancy, and strong correlation among adjacent pixels. Telemedicine involves storage and exchange of large volume of medical records for remote diagnosis and improved health care services. The advancements in telecommunication and networking technologies have led to the increased popularity and widespread usage of telemedicine.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |