Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Integrity verified lightweight ciphering for secure medical image sharing between embedded SoCs
by
Sridevi, A.
, Sivaraman, R.
, R, Vinoth Raj
, Amirtharajan, Rengarajan
, Janakiraman, Siva
, Upadhyay, Har Narayan
in
639/166/987
/ 639/705/117
/ Algorithms
/ Confidentiality
/ Data attack
/ Data integrity
/ Digital signatures
/ Encryption
/ Entropy
/ FPGA
/ Hash function
/ Humanities and Social Sciences
/ Lightweight
/ Methods
/ multidisciplinary
/ Privacy
/ Science
/ Science (multidisciplinary)
/ SoC
/ User interface
2025
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Integrity verified lightweight ciphering for secure medical image sharing between embedded SoCs
by
Sridevi, A.
, Sivaraman, R.
, R, Vinoth Raj
, Amirtharajan, Rengarajan
, Janakiraman, Siva
, Upadhyay, Har Narayan
in
639/166/987
/ 639/705/117
/ Algorithms
/ Confidentiality
/ Data attack
/ Data integrity
/ Digital signatures
/ Encryption
/ Entropy
/ FPGA
/ Hash function
/ Humanities and Social Sciences
/ Lightweight
/ Methods
/ multidisciplinary
/ Privacy
/ Science
/ Science (multidisciplinary)
/ SoC
/ User interface
2025
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Integrity verified lightweight ciphering for secure medical image sharing between embedded SoCs
by
Sridevi, A.
, Sivaraman, R.
, R, Vinoth Raj
, Amirtharajan, Rengarajan
, Janakiraman, Siva
, Upadhyay, Har Narayan
in
639/166/987
/ 639/705/117
/ Algorithms
/ Confidentiality
/ Data attack
/ Data integrity
/ Digital signatures
/ Encryption
/ Entropy
/ FPGA
/ Hash function
/ Humanities and Social Sciences
/ Lightweight
/ Methods
/ multidisciplinary
/ Privacy
/ Science
/ Science (multidisciplinary)
/ SoC
/ User interface
2025
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Integrity verified lightweight ciphering for secure medical image sharing between embedded SoCs
Journal Article
Integrity verified lightweight ciphering for secure medical image sharing between embedded SoCs
2025
Request Book From Autostore
and Choose the Collection Method
Overview
In the age of digital communication, safeguarding the security and integrity of transmitted images is crucial, especially for online and real-time applications where data privacy is paramount. This paper addresses the problem of protecting sensitive medical images during transmission by proposing a robust, lightweight encryption scheme. The proposed method uses keys derived from the Lorentz attractor for diffusion and a 16-bit Linear Feedback Shift Register (LFSR) for pseudo-random confusion. Additionally, the Cipher Block Chaining (CBC) process enhances the encryption output to ensure stronger security. A 512-bit hashing scheme using the Whirlpool algorithm is implemented to maintain data integrity, providing a robust hash comparison mechanism. The obtained hash values achieve a Hamming distance of 46.5–53.3% against the ideal value of 50%, demonstrating its high sensitivity. Furthermore, a custom-tailored lightweight symmetric key encryption secures the hash values before transmission from the sender alongside the encrypted images. At the receiver end, the hash is decrypted and compared with the extracted hash from the received cipher image to verify integrity, enabling secure decryption. The encrypted DICOM images achieve an average entropy value of 7.99752, a PSNR of 5.872 dB, NPCR of 99.66128%, and a UACI of 33.55964%, while the noise attack analysis further demonstrates its robustness. The entire process was implemented and tested on Xilinx PYNQ-Z1 System on Chip (SoC) boards, with user interaction facilitated through a custom-designed Graphical User Interface (GUI). The experimental results confirm the scheme’s effectiveness in securing medical images while maintaining integrity and resilience against attacks, making it suitable for real-time and wireless applications.
This website uses cookies to ensure you get the best experience on our website.