MbrlCatalogueTitleDetail

Do you wish to reserve the book?
Integrity verified lightweight ciphering for secure medical image sharing between embedded SoCs
Integrity verified lightweight ciphering for secure medical image sharing between embedded SoCs
Hey, we have placed the reservation for you!
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Integrity verified lightweight ciphering for secure medical image sharing between embedded SoCs
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Title added to your shelf!
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Integrity verified lightweight ciphering for secure medical image sharing between embedded SoCs
Integrity verified lightweight ciphering for secure medical image sharing between embedded SoCs

Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
How would you like to get it?
We have requested the book for you! Sorry the robot delivery is not available at the moment
We have requested the book for you!
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Integrity verified lightweight ciphering for secure medical image sharing between embedded SoCs
Integrity verified lightweight ciphering for secure medical image sharing between embedded SoCs
Journal Article

Integrity verified lightweight ciphering for secure medical image sharing between embedded SoCs

2025
Request Book From Autostore and Choose the Collection Method
Overview
In the age of digital communication, safeguarding the security and integrity of transmitted images is crucial, especially for online and real-time applications where data privacy is paramount. This paper addresses the problem of protecting sensitive medical images during transmission by proposing a robust, lightweight encryption scheme. The proposed method uses keys derived from the Lorentz attractor for diffusion and a 16-bit Linear Feedback Shift Register (LFSR) for pseudo-random confusion. Additionally, the Cipher Block Chaining (CBC) process enhances the encryption output to ensure stronger security. A 512-bit hashing scheme using the Whirlpool algorithm is implemented to maintain data integrity, providing a robust hash comparison mechanism. The obtained hash values achieve a Hamming distance of 46.5–53.3% against the ideal value of 50%, demonstrating its high sensitivity. Furthermore, a custom-tailored lightweight symmetric key encryption secures the hash values before transmission from the sender alongside the encrypted images. At the receiver end, the hash is decrypted and compared with the extracted hash from the received cipher image to verify integrity, enabling secure decryption. The encrypted DICOM images achieve an average entropy value of 7.99752, a PSNR of 5.872 dB, NPCR of 99.66128%, and a UACI of 33.55964%, while the noise attack analysis further demonstrates its robustness. The entire process was implemented and tested on Xilinx PYNQ-Z1 System on Chip (SoC) boards, with user interaction facilitated through a custom-designed Graphical User Interface (GUI). The experimental results confirm the scheme’s effectiveness in securing medical images while maintaining integrity and resilience against attacks, making it suitable for real-time and wireless applications.