{"title":"An Improved Security Approach for Medical Images and Patients’ Information Transmission","authors":"Amal Hafsa, J. Malek, Mohsen Machhout","doi":"10.1109/SETIT54465.2022.9875481","DOIUrl":null,"url":null,"abstract":"Cryptographic functions involve protecting personal information transmitted over the network against destructive attacks. The objective of this paper is to reinforce the safety of the transmission and the storage of medical images by using a hybrid framework for medical image encryption and authentication. The proposed model is based on symmetric and asymmetric approaches. To evaluate the strength of the proposed approach; our cryptosystem is tested by various tools. The experimental findings prove that our cryptographic system provides high robustness that can resist the most known cryptanalysis attacks.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SETIT54465.2022.9875481","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Cryptographic functions involve protecting personal information transmitted over the network against destructive attacks. The objective of this paper is to reinforce the safety of the transmission and the storage of medical images by using a hybrid framework for medical image encryption and authentication. The proposed model is based on symmetric and asymmetric approaches. To evaluate the strength of the proposed approach; our cryptosystem is tested by various tools. The experimental findings prove that our cryptographic system provides high robustness that can resist the most known cryptanalysis attacks.