{"title":"一种改进的医学图像和患者信息传输安全方法","authors":"Amal Hafsa, J. Malek, Mohsen Machhout","doi":"10.1109/SETIT54465.2022.9875481","DOIUrl":null,"url":null,"abstract":"Cryptographic functions involve protecting personal information transmitted over the network against destructive attacks. The objective of this paper is to reinforce the safety of the transmission and the storage of medical images by using a hybrid framework for medical image encryption and authentication. The proposed model is based on symmetric and asymmetric approaches. To evaluate the strength of the proposed approach; our cryptosystem is tested by various tools. The experimental findings prove that our cryptographic system provides high robustness that can resist the most known cryptanalysis attacks.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"An Improved Security Approach for Medical Images and Patients’ Information Transmission\",\"authors\":\"Amal Hafsa, J. Malek, Mohsen Machhout\",\"doi\":\"10.1109/SETIT54465.2022.9875481\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cryptographic functions involve protecting personal information transmitted over the network against destructive attacks. The objective of this paper is to reinforce the safety of the transmission and the storage of medical images by using a hybrid framework for medical image encryption and authentication. The proposed model is based on symmetric and asymmetric approaches. To evaluate the strength of the proposed approach; our cryptosystem is tested by various tools. The experimental findings prove that our cryptographic system provides high robustness that can resist the most known cryptanalysis attacks.\",\"PeriodicalId\":126155,\"journal\":{\"name\":\"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-05-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SETIT54465.2022.9875481\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SETIT54465.2022.9875481","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Improved Security Approach for Medical Images and Patients’ Information Transmission
Cryptographic functions involve protecting personal information transmitted over the network against destructive attacks. The objective of this paper is to reinforce the safety of the transmission and the storage of medical images by using a hybrid framework for medical image encryption and authentication. The proposed model is based on symmetric and asymmetric approaches. To evaluate the strength of the proposed approach; our cryptosystem is tested by various tools. The experimental findings prove that our cryptographic system provides high robustness that can resist the most known cryptanalysis attacks.