Performances analysis of image encryption for medical applications
This work is interested in securing transmission of digital images on the Internet, in public or local networks such as medical images, military or biometrics (authentication retina or fingerprint). We will implement three famous algorithms which are the RSA, DES and AES. The first one uses an asymmetric method for generating the keys (public and private) hence the second and the third algorithms are symmetric cipher block and use only private key for ciphering and deciphering. The simulation results will be presented and discussed in function of two main security parameters which are the length of the information blocks and the key length. Finally, a comparative study between the three techniques is conducted in order to classify everyone by the best performances of robustness especially with the presence of different kinds of attacks.
R. Norcen, M. Podesser, A. Pommer, H.P.Schmidt, A. Uhl, (2003). Confidential storage and transmission of
medical image data. Computers in Biology and Medicine 33, 277292, Pergamon.
Abbas Cheddad , Joan Condell, Kevin Curran, Paul McKevitt, (2010).A hash-based image encryption algorithm
Optics Communications 283, 879893, Elsevier.
Gonzalo Alvareza , Shujun Lib, Luis Hernandeza, (2007). Analysis of security problems in a medical image
encryption system. Computers in Biology and Medicine 37, 424 427, Elsevier.
Fauzan Saeed and Mustafa Rashid, (2010). Integrating Classical Encryption with Modern Technique IJCSNS International Journal of Computer Science and Network Security, Vol.10 No.5.
William PUECH Jos, Marconi RODRIGUES, (2004). Scurisation dimage par crypto-tatouage , CORESA'2004 conference, Lille, France.
Diaa Salama Abdul Minaam, Hatem M. Abdual-Kader, and Mohiy Mohamed Hadhoud. (2010). Evaluating the effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types. International Journal of Network Security, Vol.11, No.2, 78-87.
Manoj. B, Manjula N Harihar, (2012). Image Encryption and Decryption using AES International Journal of Engineering and Advanced Technology, Volume-1, Issue 5.
L.H. Encinas, A. P. Dom?nguez, (2006). Comments on a technique for image encryption using digital signature. Optics Communications 268, 261265, Elsevier.
G. H. Karimian, B. Rashidi, and A. farmani, (2012). A High Speed and Low Power Image Encryption with 128-Bit AES Algorithm International Journal of Computer and Electrical Engineering, Vol. 4, No. 3.
Copyright (c) 2015 Journal of Information Sciences and Computing Technologies
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
TRANSFER OF COPYRIGHT
JISCT is pleased to undertake the publication of your contribution to Journal of Information Sciences and Computing Technologies
The copyright to this article is transferred to JISCT(including without limitation, the right to publish the work in whole or in part in any and all forms of media, now or hereafter known) effective if and when the article is accepted for publication thus granting JISCT all rights for the work so that both parties may be protected from the consequences of unauthorized use.