期刊文献+

基于混沌加密的医学图像安全共享方案 被引量:5

Medical Image's Secure Sharing Scheme Based on Chaos Encryption
下载PDF
导出
摘要 采用Shamir秘密共享方案对医学图像进行安全分发是一个重要的研究领域.针对现有方法在影子图机密性和传输效率上的不足,提出基于混沌加密的医学图像安全共享方案.方案首先利用Lagrange插值原理对医学图像进行分解得到若干影子图;然后利用离散混沌函数对影子图进行加密,最后对加密后的影子图采用Shamir秘密共享方案进行分发.本文方案中影子图容量为秘密医学图像的1/r,提高了大容量医学图像传输效率,降低存储空间要求;利用混沌的混合性和对初始值敏感特性对医学图像加密,大大加强医学图像的机密性,防止图像在传输过程中被篡改.实验分析表明,本文方案在传输效率、影子图机密性、图像完整性保护和时间效率上具有优势.算法适用于共享环境下的医学图像安全传输. Using Shamir secret sharing scheme for medical image's secure transmission is a very important research field. Aiming atthe existent algorithm's defects in transmission efficiency and shadow images' confidentiality, a medical image's secure sharing methodbased on chaos encryption is presented in this paper. First,Lagrange interpolation theory is used to divide the original medical imageinto shadow images. Then, a discrete chaos function is utilized to encrypt these shadow images. Finally, the Shamir secret sharingscheme is used to transmit the encrypted shadow images. The shadow image's capacity is just 1/r of original secret medical image inour method. Thus ,the transmission efficiency of huge-capacity medical images is improved and the storage requirement is reduced. U-sing the mixture and initial value sensitivity properties of chaos to encrypt medical image can enhance its confidentiality. At the sametime, it can prevent the image from being tampered in transmission procedure. Experimental results show that the presented method hasgood transmission efficiency ,high shadow image's confidentiality, integrity protection and good run efficiently. The presented methodcan be applied to online medical image's secure transmission.
出处 《小型微型计算机系统》 CSCD 北大核心 2016年第1期162-167,共6页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(61103202 61272494)资助
关键词 混沌加密 医学图像 秘密共享 影子图 chaotic encryption medical image secret sharing shadow image
  • 相关文献

参考文献8

二级参考文献93

共引文献187

同被引文献34

  • 1Luiz S F,Sergio S L,Paulo M B.Providing Integrity and Authenticity in DICOM Images:A Novel Approach[J].IEEE Transactions on Information Technology in Biomedicine,2009,13(4):582-589.
  • 2Guo Xiaotao,Zhuang Tiange.Lossless Watermarking for Verifying the Integrity of Medical Images with Tamper Localization[J].Journal of Digital Imaging,2009,22(6):620-628.
  • 3Li Chunlei,Wang Yunhong,Ma Bin,et al.Tamper Dete-ction and Self-recovery of Biometric Images Using Salient Regionbased Authentication Watermarking Scheme[J].Computer Standards and Interfaces,2012,34(4):367-379.
  • 4Tian Lihua,Zheng Nanning,Xue Jiaru,et al.An Integrated Visual Saliency-based Watermarking Approach for Synchronous Image Authentication and Copyright Protection[J].Signal Processing:Image Communication,2011,26(8):427-437.
  • 5Deng Xiaohong,Cheng Zhigang,Zeng Feng,et al.Authentication and Recovery of Medical Diagnostic Image Using Dual Reversible Digital Watermarking[J].Journal of Nanoscience&Nanotechnology,2013,13(3):2099-2107.
  • 6Eswaraiah R,Reddy E S.Robust Medical Image Watermarking Technique for Accurate Detection of Tampers Inside Region of Interest and Recovering Original Region of Interest[J].IET Image Processing,2015,9(8):615-625.
  • 7微笑的艾米.DICOM医学图像文件格式[EB/OL].[2015-03-08].http://blog.csdn.net/okaimee/article/details/5736710.
  • 8钟晓燕,冯前进,陈武凡,江贵平.基于Hash函数敏感性的医学图像精确认证[J].中国图象图形学报,2008,13(2):204-208. 被引量:5
  • 9侯整风,高汉军,韩江洪,胡东辉.基于矩阵乘法的可压缩门限图像共享方案[J].武汉大学学报(信息科学版),2008,33(10):1003-1006. 被引量:4
  • 10杨木伟,王劲林,陈君,武蓓.IPTV中DRM许可证服务系统研究与实现[J].微计算机信息,2009,25(3):6-8. 被引量:2

引证文献5

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部