Performances analysis of image encryption for medical applications

  • Sammoud Ali Signal processing Laboratory, Science Faculty of Tunis, UTM 1060
  • Adnen Cherif Signal processing Laboratory, Science Faculty of Tunis, UTM 1060
Keywords: Encryption data, image, RSA, DES, AES.

Abstract

This work is interested in securing transmission of digital images on the Internet, in public or local networks such as medical images, military or biometrics (authentication retina or fingerprint). We will implement three famous algorithms which are the RSA, DES and AES. The first one uses an asymmetric method for generating the keys (public and private) hence the second and the third algorithms are symmetric cipher block and use only private key for ciphering and deciphering. The simulation results will be presented and discussed in function of two main security parameters which are the length of the information blocks and the key length. Finally, a comparative study between the three techniques is conducted in order to classify everyone by the best performances of robustness especially with the presence of different kinds of attacks.

References

R. Norcen, M. Podesser, A. Pommer, H.P.Schmidt, A. Uhl, (2003). Confidential storage and transmission of

medical image data. Computers in Biology and Medicine 33, 277292, Pergamon.

Abbas Cheddad , Joan Condell, Kevin Curran, Paul McKevitt, (2010).A hash-based image encryption algorithm

Optics Communications 283, 879893, Elsevier.

Gonzalo Alvareza , Shujun Lib, Luis Hernandeza, (2007). Analysis of security problems in a medical image

encryption system. Computers in Biology and Medicine 37, 424 427, Elsevier.

Fauzan Saeed and Mustafa Rashid, (2010). Integrating Classical Encryption with Modern Technique IJCSNS International Journal of Computer Science and Network Security, Vol.10 No.5.

William PUECH Jos, Marconi RODRIGUES, (2004). Scurisation dimage par crypto-tatouage , CORESA'2004 conference, Lille, France.

Diaa Salama Abdul Minaam, Hatem M. Abdual-Kader, and Mohiy Mohamed Hadhoud. (2010). Evaluating the effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types. International Journal of Network Security, Vol.11, No.2, 78-87.

Manoj. B, Manjula N Harihar, (2012). Image Encryption and Decryption using AES International Journal of Engineering and Advanced Technology, Volume-1, Issue 5.

L.H. Encinas, A. P. Dom?nguez, (2006). Comments on a technique for image encryption using digital signature. Optics Communications 268, 261265, Elsevier.

G. H. Karimian, B. Rashidi, and A. farmani, (2012). A High Speed and Low Power Image Encryption with 128-Bit AES Algorithm International Journal of Computer and Electrical Engineering, Vol. 4, No. 3.

Published
2015-01-18
How to Cite
Ali, S., & Cherif, A. (2015). Performances analysis of image encryption for medical applications. Journal of Information Sciences and Computing Technologies, 1(1), 78-87. Retrieved from http://scitecresearch.com/journals/index.php/jisct/article/view/24
Section
Articles