Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
A Multiple-Medical-Image Encryption Method Based on SHA-256 and DNA Encoding
by
Zhang, Jialu
, Wu, Junfeng
, Wang, Xiaofeng
, Liu, Dong
in
Algorithms
/ Batch processing
/ Congruences
/ Data encryption
/ Digital imaging
/ DNA
/ DNA encoding
/ Encryption
/ Genetic research
/ hash function
/ Image transmission
/ Information storage
/ Internet of Things
/ Investment analysis
/ linear congruence
/ medical image encryption
/ Medical imaging
/ Methods
/ multiple-image encryption
/ Noise pollution
/ Wavelet transforms
2023
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
A Multiple-Medical-Image Encryption Method Based on SHA-256 and DNA Encoding
by
Zhang, Jialu
, Wu, Junfeng
, Wang, Xiaofeng
, Liu, Dong
in
Algorithms
/ Batch processing
/ Congruences
/ Data encryption
/ Digital imaging
/ DNA
/ DNA encoding
/ Encryption
/ Genetic research
/ hash function
/ Image transmission
/ Information storage
/ Internet of Things
/ Investment analysis
/ linear congruence
/ medical image encryption
/ Medical imaging
/ Methods
/ multiple-image encryption
/ Noise pollution
/ Wavelet transforms
2023
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
A Multiple-Medical-Image Encryption Method Based on SHA-256 and DNA Encoding
by
Zhang, Jialu
, Wu, Junfeng
, Wang, Xiaofeng
, Liu, Dong
in
Algorithms
/ Batch processing
/ Congruences
/ Data encryption
/ Digital imaging
/ DNA
/ DNA encoding
/ Encryption
/ Genetic research
/ hash function
/ Image transmission
/ Information storage
/ Internet of Things
/ Investment analysis
/ linear congruence
/ medical image encryption
/ Medical imaging
/ Methods
/ multiple-image encryption
/ Noise pollution
/ Wavelet transforms
2023
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
A Multiple-Medical-Image Encryption Method Based on SHA-256 and DNA Encoding
Journal Article
A Multiple-Medical-Image Encryption Method Based on SHA-256 and DNA Encoding
2023
Request Book From Autostore
and Choose the Collection Method
Overview
Ensuring the privacy and secrecy of digital medical images has become a pressing issue as a result of the quick development of smart medical technology and the exponential growth in the quantity of medical images transmitted and stored in networks. The lightweight multiple-image encryption approach for medical images that is suggested in this research can encrypt/decrypt any number of medical photos of varied sizes with just one encryption operation and has a computational cost that is similar to encrypting a single image. The plaintext images with different sizes are filled at the right and bottom of the image to ensure that the size of all plaintext images is uniform; then, all the filled images are stacked to obtain a superimposed image. The initial key, which is generated using the SHA-256 technique, is then used as the starting value of the linear congruence algorithm to create the encryption key sequence. The cipher picture is then created by encrypting the superimposed image with the encryption key and DNA encoding. The algorithm can be made even more secure by implementing a decryption mechanism that decrypts the image independently in order to reduce the possibility of information leaking during the decryption process. The outcomes of the simulation experiment demonstrate the algorithm’s strong security and resistance to interference such as noise pollution and lost image content.
This website uses cookies to ensure you get the best experience on our website.