A survey of image encryption for healthcare applications

被引:16
|
作者
Priyanka [1 ]
Singh, Amit Kumar [1 ]
机构
[1] Natl Inst Technol Patna, Dept Comp Sci & Engn, Patna, Bihar, India
关键词
Image encryption; Security; E-Healthcare; Chaotic map; ECC; DNA; Cellular Automata; Fuzzy; HYPER-CHAOTIC SYSTEM; DYNAMIC S-BOXES; CELLULAR-AUTOMATA; LEVEL PERMUTATION; DNA; ALGORITHM; MAP; SUBSTITUTION; DESIGN;
D O I
10.1007/s12065-021-00683-x
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, medical image encryption has attracted many researchers because of security issues in the communication process. The recent COVID-19 has highlighted the fact that medical images are consistently created and disseminated online, leading to a need for protection from unauthorised utilisation. This paper intends to review the various medical image encryption approaches along with their merits and limitations. It includes a survey, a brief introduction, and the most utilised interesting applications of image encryption. Then, the contributions of reviewed approaches are summarised and compared regarding different technical perspectives. Lastly, we highlight the recent challenges along with several directions of potential research that could fill the gaps in these domains for researchers and developers.
引用
收藏
页码:801 / 818
页数:18
相关论文
共 50 条
  • [31] A review of image watermarking applications in healthcare
    Coatrieux, G.
    Lecornu, L.
    Sankur, B.
    Roux, Ch.
    2006 28TH ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY, VOLS 1-15, 2006, : 6118 - +
  • [32] A novel method of testing image randomness with applications to image shuffling and encryption
    Wu, Yue
    Agaian, Sos
    Noonan, Joseph P.
    MOBILE MULTIMEDIA/IMAGE PROCESSING, SECURITY, AND APPLICATIONS 2013, 2013, 8755
  • [33] Survey on homomorphic encryption and its applications to cloud security
    Li, Shundong
    Dou, Jiawei
    Wang, Daoshun
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (06): : 1378 - 1388
  • [34] A Novel Image Encryption Approach for Cloud Computing Applications
    Altowaijri, Saleh
    Ayari, Mohamed
    El Touati, Yamen
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (12) : 440 - 445
  • [35] An efficient and robust image encryption scheme for medical applications
    Kanso, A.
    Ghebleh, M.
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2015, 24 (1-3) : 98 - 116
  • [36] An efficient medical image encryption algorithm for telemedicine applications
    Prabhavathi, K.
    Anandaraju, M. B.
    Kiran
    MICROPROCESSORS AND MICROSYSTEMS, 2023, 101
  • [37] Improved Tent Map and Its Applications in Image Encryption
    Liao, Xuefeng
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (01): : 25 - 34
  • [38] Multi Image Integration and Encryption Algorithm for Security Applications
    Kumar, A. D. Senthil
    Anandhi, T. S.
    PROCEEDINGS OF THE IECON 2016 - 42ND ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2016, : 986 - 991
  • [39] New fractional matrix with its applications in image encryption
    Zhang, Feng
    Hu, Yang
    Tao, Ran
    Wang, Yue
    OPTICS AND LASER TECHNOLOGY, 2014, 64 : 82 - 93
  • [40] Survey on JPEG compatible joint image compression and encryption algorithms
    Li, Peiya
    Lo, Kwok-Tung
    IET SIGNAL PROCESSING, 2020, 14 (08) : 475 - 488