Performances analysis of image encryption for medical applications

Sammoud Ali, Adnen Cherif

Abstract


This work is interested in securing transmission of digital images on the Internet, in public or local networks such as medical images, military or biometrics (authentication retina or fingerprint). We will implement three famous algorithms which are the RSA, DES and AES. The first one uses an asymmetric method for generating the keys (public and private) hence the second and the third algorithms are symmetric cipher block and use only private key for ciphering and deciphering. The simulation results will be presented and discussed in function of two main security parameters which are the length of the information blocks and the key length. Finally, a comparative study between the three techniques is conducted in order to classify everyone by the best performances of robustness especially with the presence of different kinds of attacks.


Keywords


Encryption data; image; RSA; DES; AES.

Full Text:

PDF

References


R. Norcen, M. Podesser, A. Pommer, H.P.Schmidt, A. Uhl, (2003). Confidential storage and transmission of

medical image data. Computers in Biology and Medicine 33, 277292, Pergamon.

Abbas Cheddad , Joan Condell, Kevin Curran, Paul McKevitt, (2010).A hash-based image encryption algorithm

Optics Communications 283, 879893, Elsevier.

Gonzalo Alvareza , Shujun Lib, Luis Hernandeza, (2007). Analysis of security problems in a medical image

encryption system. Computers in Biology and Medicine 37, 424 427, Elsevier.

Fauzan Saeed and Mustafa Rashid, (2010). Integrating Classical Encryption with Modern Technique IJCSNS International Journal of Computer Science and Network Security, Vol.10 No.5.

William PUECH Jos, Marconi RODRIGUES, (2004). Scurisation dimage par crypto-tatouage , CORESA'2004 conference, Lille, France.

Diaa Salama Abdul Minaam, Hatem M. Abdual-Kader, and Mohiy Mohamed Hadhoud. (2010). Evaluating the effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types. International Journal of Network Security, Vol.11, No.2, 78-87.

Manoj. B, Manjula N Harihar, (2012). Image Encryption and Decryption using AES International Journal of Engineering and Advanced Technology, Volume-1, Issue 5.

L.H. Encinas, A. P. Dom?nguez, (2006). Comments on a technique for image encryption using digital signature. Optics Communications 268, 261265, Elsevier.

G. H. Karimian, B. Rashidi, and A. farmani, (2012). A High Speed and Low Power Image Encryption with 128-Bit AES Algorithm International Journal of Computer and Electrical Engineering, Vol. 4, No. 3.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2015 Journal of Information Sciences and Computing Technologies

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

 

Copyright © 2014 Journal of Information Sciences and Computing Technologies. All rights reserved.

ISSN: 2394-9066

For any help/support contact us at jiscteditor@scitecresearch.com.