A Multiple-Medical-Image Encryption Method Based on SHA-256 and DNA Encoding
Ensuring the privacy and secrecy of digital medical images has become a pressing issue as a result of the quick development of smart medical technology and the exponential growth in the quantity of medical images transmitted and stored in networks. The lightweight multiple-image encryption approach...
Saved in:
Published in | Entropy (Basel, Switzerland) Vol. 25; no. 6; p. 898 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Switzerland
MDPI AG
03.06.2023
MDPI |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Ensuring the privacy and secrecy of digital medical images has become a pressing issue as a result of the quick development of smart medical technology and the exponential growth in the quantity of medical images transmitted and stored in networks. The lightweight multiple-image encryption approach for medical images that is suggested in this research can encrypt/decrypt any number of medical photos of varied sizes with just one encryption operation and has a computational cost that is similar to encrypting a single image. The plaintext images with different sizes are filled at the right and bottom of the image to ensure that the size of all plaintext images is uniform; then, all the filled images are stacked to obtain a superimposed image. The initial key, which is generated using the SHA-256 technique, is then used as the starting value of the linear congruence algorithm to create the encryption key sequence. The cipher picture is then created by encrypting the superimposed image with the encryption key and DNA encoding. The algorithm can be made even more secure by implementing a decryption mechanism that decrypts the image independently in order to reduce the possibility of information leaking during the decryption process. The outcomes of the simulation experiment demonstrate the algorithm’s strong security and resistance to interference such as noise pollution and lost image content. |
---|---|
AbstractList | Ensuring the privacy and secrecy of digital medical images has become a pressing issue as a result of the quick development of smart medical technology and the exponential growth in the quantity of medical images transmitted and stored in networks. The lightweight multiple-image encryption approach for medical images that is suggested in this research can encrypt/decrypt any number of medical photos of varied sizes with just one encryption operation and has a computational cost that is similar to encrypting a single image. The plaintext images with different sizes are filled at the right and bottom of the image to ensure that the size of all plaintext images is uniform; then, all the filled images are stacked to obtain a superimposed image. The initial key, which is generated using the SHA-256 technique, is then used as the starting value of the linear congruence algorithm to create the encryption key sequence. The cipher picture is then created by encrypting the superimposed image with the encryption key and DNA encoding. The algorithm can be made even more secure by implementing a decryption mechanism that decrypts the image independently in order to reduce the possibility of information leaking during the decryption process. The outcomes of the simulation experiment demonstrate the algorithm’s strong security and resistance to interference such as noise pollution and lost image content. Ensuring the privacy and secrecy of digital medical images has become a pressing issue as a result of the quick development of smart medical technology and the exponential growth in the quantity of medical images transmitted and stored in networks. The lightweight multiple-image encryption approach for medical images that is suggested in this research can encrypt/decrypt any number of medical photos of varied sizes with just one encryption operation and has a computational cost that is similar to encrypting a single image. The plaintext images with different sizes are filled at the right and bottom of the image to ensure that the size of all plaintext images is uniform; then, all the filled images are stacked to obtain a superimposed image. The initial key, which is generated using the SHA-256 technique, is then used as the starting value of the linear congruence algorithm to create the encryption key sequence. The cipher picture is then created by encrypting the superimposed image with the encryption key and DNA encoding. The algorithm can be made even more secure by implementing a decryption mechanism that decrypts the image independently in order to reduce the possibility of information leaking during the decryption process. The outcomes of the simulation experiment demonstrate the algorithm's strong security and resistance to interference such as noise pollution and lost image content.Ensuring the privacy and secrecy of digital medical images has become a pressing issue as a result of the quick development of smart medical technology and the exponential growth in the quantity of medical images transmitted and stored in networks. The lightweight multiple-image encryption approach for medical images that is suggested in this research can encrypt/decrypt any number of medical photos of varied sizes with just one encryption operation and has a computational cost that is similar to encrypting a single image. The plaintext images with different sizes are filled at the right and bottom of the image to ensure that the size of all plaintext images is uniform; then, all the filled images are stacked to obtain a superimposed image. The initial key, which is generated using the SHA-256 technique, is then used as the starting value of the linear congruence algorithm to create the encryption key sequence. The cipher picture is then created by encrypting the superimposed image with the encryption key and DNA encoding. The algorithm can be made even more secure by implementing a decryption mechanism that decrypts the image independently in order to reduce the possibility of information leaking during the decryption process. The outcomes of the simulation experiment demonstrate the algorithm's strong security and resistance to interference such as noise pollution and lost image content. |
Audience | Academic |
Author | Zhang, Jialu Wu, Junfeng Wang, Xiaofeng Liu, Dong |
AuthorAffiliation | Department of Applied Mathematics, Xi’an University of Technology, Xi’an 710049, China; faziboat@126.com (J.Z.); liudong9813@163.com (D.L.); xfwang@xaut.edu.cn (X.W.) |
AuthorAffiliation_xml | – name: Department of Applied Mathematics, Xi’an University of Technology, Xi’an 710049, China; faziboat@126.com (J.Z.); liudong9813@163.com (D.L.); xfwang@xaut.edu.cn (X.W.) |
Author_xml | – sequence: 1 givenname: Junfeng orcidid: 0000-0003-4097-6799 surname: Wu fullname: Wu, Junfeng – sequence: 2 givenname: Jialu surname: Zhang fullname: Zhang, Jialu – sequence: 3 givenname: Dong surname: Liu fullname: Liu, Dong – sequence: 4 givenname: Xiaofeng surname: Wang fullname: Wang, Xiaofeng |
BackLink | https://www.ncbi.nlm.nih.gov/pubmed/37372242$$D View this record in MEDLINE/PubMed |
BookMark | eNptkstu1DAUhi1URC-w4AVQJDZ0kda3-LJCoRQ60gwsgLXl-JJ6lLEHJ0Hq2-PplFFbIS9sH3_n93_scwqOYooOgLcIXhAi4aXDDWRQSPECnCAoZU0JhEeP1sfgdBzXEGKCEXsFjgknHGOKT8CyrVbzMIXt4OqVs8HooV5sdO-q62jy3XYKKVYrN90mW33So7NV2f-4aWvcsEpHW33-1u7QZEPsX4OXXg-je_Mwn4FfX65_Xt3Uy-9fF1ftsjYNlFMtPeq6piOOQieLkeIdSQe15Q5RyDSxwiOEuMUSEUqo8IxYjb1vCKNCMHIGFntdm_RabXPY6Hynkg7qPpByr3SeghmcYp3wxnrRdB2mVnNhMOcNko2k0ELpi9bHvdZ27jbOGhenrIcnok9PYrhVffqjEMSSCUyKwocHhZx-z26c1CaMxg2Dji7No8KCQMY4JLig75-h6zTnWN6qUFhyySinhbrYU70uFYToU7nYlGHdJpjy9T6UeMsbsUtCsCS8e1zDwfy_by7A-R4wOY1jdv6AIKh2LaQOLVTYy2esCZPe9UFxEYb_ZPwFsgvCaw |
CitedBy_id | crossref_primary_10_1038_s41598_025_86569_9 crossref_primary_10_1109_TCE_2024_3481260 crossref_primary_10_1109_ACCESS_2024_3518533 crossref_primary_10_1007_s40747_023_01258_2 crossref_primary_10_1016_j_eswa_2023_121090 crossref_primary_10_1038_s41598_025_86771_9 crossref_primary_10_47264_idea_nasij_4_2_4 crossref_primary_10_3390_e26020154 crossref_primary_10_1016_j_jksuci_2024_102265 crossref_primary_10_3390_math11153373 |
Cites_doi | 10.1007/s11042-020-09533-x 10.1016/j.optlastec.2021.107073 10.1016/j.measurement.2022.111175 10.1109/ACCESS.2022.3185206 10.1016/j.image.2022.116793 10.1016/j.vlsi.2023.01.008 10.1016/j.patrec.2021.10.033 10.1109/ACCESS.2020.2991420 10.1109/TNNLS.2021.3062754 10.1016/j.compeleceng.2023.108609 10.1016/j.ijleo.2017.08.028 10.1109/TII.2022.3194590 10.1016/j.sigpro.2016.10.003 10.1007/s11042-019-08168-x 10.1007/s11042-017-5534-8 10.1016/j.micpro.2022.104546 10.1016/j.compbiomed.2022.105542 10.1016/j.procs.2023.01.072 10.1016/j.ijleo.2022.169624 10.1109/ACCESS.2021.3138718 10.1016/j.optlaseng.2022.107303 10.1016/j.ijleo.2018.06.029 10.1016/j.optlaseng.2018.05.009 10.1016/j.ijleo.2022.168649 10.1007/s00521-018-3801-x 10.1007/s00500-014-1539-7 10.1016/j.matcom.2021.06.012 10.1016/j.sigpro.2017.10.004 10.1109/ACCESS.2018.2817615 10.1016/j.measen.2023.100676 10.1007/s11042-018-6496-1 10.3390/e25050746 |
ContentType | Journal Article |
Copyright | COPYRIGHT 2023 MDPI AG 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. 2023 by the authors. 2023 |
Copyright_xml | – notice: COPYRIGHT 2023 MDPI AG – notice: 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. – notice: 2023 by the authors. 2023 |
DBID | AAYXX CITATION NPM 7TB 8FD 8FE 8FG ABJCF ABUWG AFKRA AZQEC BENPR BGLVJ CCPQU DWQXO FR3 HCIFZ KR7 L6V M7S PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS PTHSS 7X8 5PM DOA |
DOI | 10.3390/e25060898 |
DatabaseName | CrossRef PubMed Mechanical & Transportation Engineering Abstracts Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection Materials Science & Engineering Collection ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Central Essentials ProQuest Central Technology Collection ProQuest One Community College ProQuest Central Engineering Research Database SciTech Premium Collection Civil Engineering Abstracts ProQuest Engineering Collection Engineering Database ProQuest Central Premium ProQuest One Academic Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China Engineering Collection MEDLINE - Academic PubMed Central (Full Participant titles) DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef PubMed Publicly Available Content Database Technology Collection Technology Research Database ProQuest One Academic Middle East (New) Mechanical & Transportation Engineering Abstracts ProQuest Central Essentials ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Engineering Collection ProQuest Central Korea ProQuest Central (New) Engineering Collection Civil Engineering Abstracts Engineering Database ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection ProQuest One Academic UKI Edition Materials Science & Engineering Collection Engineering Research Database ProQuest One Academic ProQuest One Academic (New) MEDLINE - Academic |
DatabaseTitleList | Publicly Available Content Database PubMed MEDLINE - Academic CrossRef |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals - NZ url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: NPM name: PubMed url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database – sequence: 3 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
EISSN | 1099-4300 |
ExternalDocumentID | oai_doaj_org_article_6b8fcdf85bb24da78c2775195940d09f PMC10296823 A758282910 37372242 10_3390_e25060898 |
Genre | Journal Article |
GrantInformation_xml | – fundername: Natural Science Basic Research Program of Shaanxi Province grantid: 2022JM-017 – fundername: National Natural Science Foundation of China grantid: 61976176 – fundername: Natural Science Foundation of China grantid: 61976176 |
GroupedDBID | 29G 2WC 5GY 5VS 8FE 8FG AADQD AAFWJ AAYXX ABDBF ABJCF ACIWK ACUHS ADBBV AEGXH AENEX AFKRA AFPKN AFZYC ALMA_UNASSIGNED_HOLDINGS BCNDV BENPR BGLVJ CCPQU CITATION CS3 DU5 E3Z ESX F5P GROUPED_DOAJ GX1 HCIFZ HH5 IAO ITC J9A KQ8 L6V M7S MODMG M~E OK1 OVT PGMZT PHGZM PHGZT PIMPY PROAC PTHSS RNS RPM TR2 TUS XSB ~8M NPM PMFND 7TB 8FD ABUWG AZQEC DWQXO FR3 KR7 PKEHL PQEST PQGLB PQQKQ PQUKI PRINS 7X8 5PM PUEGO |
ID | FETCH-LOGICAL-c509t-9f1bb5b3e40e937206019e0ad7e1406a3d8f1117d29134348f63da2ff53648863 |
IEDL.DBID | DOA |
ISSN | 1099-4300 |
IngestDate | Wed Aug 27 01:17:34 EDT 2025 Thu Aug 21 18:37:23 EDT 2025 Fri Jul 11 09:20:31 EDT 2025 Sun Jul 13 04:59:38 EDT 2025 Tue Jun 10 21:26:33 EDT 2025 Thu Apr 03 07:04:27 EDT 2025 Thu Apr 24 23:13:05 EDT 2025 Tue Jul 01 01:58:25 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 6 |
Keywords | linear congruence medical image encryption multiple-image encryption hash function DNA encoding |
Language | English |
License | https://creativecommons.org/licenses/by/4.0 Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c509t-9f1bb5b3e40e937206019e0ad7e1406a3d8f1117d29134348f63da2ff53648863 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
ORCID | 0000-0003-4097-6799 |
OpenAccessLink | https://doaj.org/article/6b8fcdf85bb24da78c2775195940d09f |
PMID | 37372242 |
PQID | 2829796474 |
PQPubID | 2032401 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_6b8fcdf85bb24da78c2775195940d09f pubmedcentral_primary_oai_pubmedcentral_nih_gov_10296823 proquest_miscellaneous_2830667032 proquest_journals_2829796474 gale_infotracacademiconefile_A758282910 pubmed_primary_37372242 crossref_primary_10_3390_e25060898 crossref_citationtrail_10_3390_e25060898 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 20230603 |
PublicationDateYYYYMMDD | 2023-06-03 |
PublicationDate_xml | – month: 6 year: 2023 text: 20230603 day: 3 |
PublicationDecade | 2020 |
PublicationPlace | Switzerland |
PublicationPlace_xml | – name: Switzerland – name: Basel |
PublicationTitle | Entropy (Basel, Switzerland) |
PublicationTitleAlternate | Entropy (Basel) |
PublicationYear | 2023 |
Publisher | MDPI AG MDPI |
Publisher_xml | – name: MDPI AG – name: MDPI |
References | Hua (ref_6) 2018; 144 Sabir (ref_29) 2023; 106 Laiphrakpam (ref_5) 2017; 147 Liu (ref_32) 2020; 8 ref_35 Yasser (ref_11) 2022; 10 Wang (ref_31) 2021; 80 John (ref_17) 2023; 218 John (ref_18) 2023; 25 Jain (ref_10) 2021; 152 (ref_20) 2023; 90 Zhang (ref_33) 2021; 190 Chai (ref_9) 2019; 78 Wu (ref_19) 2023; 19 Gao (ref_26) 2022; 34 Kiran (ref_16) 2022; 91 Priyanka (ref_14) 2022; 196 Wang (ref_27) 2022; 107 Li (ref_21) 2018; 171 (ref_24) 2022; 266 Zhang (ref_12) 2022; 146 Zhang (ref_22) 2019; 78 Li (ref_30) 2023; 160 Wang (ref_34) 2022; 70 Zhang (ref_23) 2021; 141 Liu (ref_7) 2018; 77 Nematzadeh (ref_8) 2018; 110 Elhoseny (ref_2) 2020; 32 Su (ref_25) 2022; 254 Ding (ref_13) 2022; 33 Pareek (ref_3) 2016; 20 Elhoseny (ref_1) 2018; 6 Huang (ref_15) 2022; 10 Sangavi (ref_28) 2023; 72 Cao (ref_4) 2017; 132 |
References_xml | – volume: 80 start-page: 943 year: 2021 ident: ref_31 article-title: An efficient batch images encryption method based on DNA encoding and pwlcm publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-020-09533-x – volume: 141 start-page: 107073 year: 2021 ident: ref_23 article-title: Multiple-image encryption algorithm based on the 3d scrambling model and dynamic DNA coding publication-title: Opt. Laser Technol. doi: 10.1016/j.optlastec.2021.107073 – volume: 196 start-page: 111175 year: 2022 ident: ref_14 article-title: Fastmie: Faster medical image encryption without compromising security publication-title: Measurement doi: 10.1016/j.measurement.2022.111175 – volume: 34 start-page: 1535 year: 2022 ident: ref_26 article-title: An effective multiple-image encryption algorithm based on 3d cube and hyperchaotic map publication-title: J. King Saud Univ. Comput. Inf. Sci. – volume: 10 start-page: 66345 year: 2022 ident: ref_15 article-title: Privacy-preserving deep learning with learnable image encryption on medical images publication-title: IEEE Access doi: 10.1109/ACCESS.2022.3185206 – volume: 107 start-page: 116793 year: 2022 ident: ref_27 article-title: Multiple color image encryption based on cascaded quaternion gyrator transforms publication-title: Signal Process. Image Commun. doi: 10.1016/j.image.2022.116793 – volume: 90 start-page: 131 year: 2023 ident: ref_20 article-title: Real-time medical image encryption for h-iot applications using improved sequences from chaotic maps publication-title: Integration doi: 10.1016/j.vlsi.2023.01.008 – volume: 152 start-page: 356 year: 2021 ident: ref_10 article-title: Medical image encryption scheme using multiple chaotic maps publication-title: Pattern Recognit. Lett. doi: 10.1016/j.patrec.2021.10.033 – volume: 8 start-page: 83596 year: 2020 ident: ref_32 article-title: Color image encryption algorithm based on DNA coding and double chaos system publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2991420 – volume: 33 start-page: 4915 year: 2022 ident: ref_13 article-title: Deepkeygen: A deep learning-based stream cipher generator for medical image encryption and decryption publication-title: IEEE Trans. Neural Netw. Learn. Syst. doi: 10.1109/TNNLS.2021.3062754 – volume: 106 start-page: 108609 year: 2023 ident: ref_29 article-title: Multi-layer security based multiple image encryption technique publication-title: Comput. Electr. Eng. doi: 10.1016/j.compeleceng.2023.108609 – volume: 147 start-page: 88 year: 2017 ident: ref_5 article-title: Medical image encryption based on improved elgamal encryption technique publication-title: Optik doi: 10.1016/j.ijleo.2017.08.028 – volume: 72 start-page: 103408 year: 2023 ident: ref_28 article-title: An exquisite multiple image encryption harnessing multi-scroll lu–chen and chua chaotic systems employing domino strategy publication-title: J. Inf. Secur. Appl. – volume: 19 start-page: 2089 year: 2023 ident: ref_19 article-title: Medical image encryption by content-aware DNA computing for secure healthcare publication-title: IEEE Trans. Ind. Inform. doi: 10.1109/TII.2022.3194590 – volume: 132 start-page: 96 year: 2017 ident: ref_4 article-title: Medical image encryption using edge maps publication-title: Signal Process. doi: 10.1016/j.sigpro.2016.10.003 – volume: 78 start-page: 35419 year: 2019 ident: ref_9 article-title: Medical image encryption algorithm based on latin square and memristive chaotic system publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-019-08168-x – volume: 77 start-page: 22787 year: 2018 ident: ref_7 article-title: A new simple chaotic system and its application in medical image encryption publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-017-5534-8 – volume: 91 start-page: 104546 year: 2022 ident: ref_16 article-title: Resource optimized selective image encryption of medical images using multiple chaotic systems publication-title: Microprocess. Microsyst. doi: 10.1016/j.micpro.2022.104546 – volume: 146 start-page: 105542 year: 2022 ident: ref_12 article-title: An efficient multi-level encryption scheme for stereoscopic medical images based on coupled chaotic system and otsu threshold segmentation publication-title: Comput. Biol. Med. doi: 10.1016/j.compbiomed.2022.105542 – volume: 218 start-page: 918 year: 2023 ident: ref_17 article-title: 2d lorentz chaotic model coupled with logistic chaotic model for medical image encryption: Towards ensuring security for teleradiology publication-title: Procedia Comput. Sci. doi: 10.1016/j.procs.2023.01.072 – volume: 266 start-page: 169624 year: 2022 ident: ref_24 article-title: A novel multiple grayscale image encryption method based on 3d bit-scrambling and diffusion publication-title: Optik doi: 10.1016/j.ijleo.2022.169624 – volume: 10 start-page: 244 year: 2022 ident: ref_11 article-title: A robust chaos-based technique for medical image encryption publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3138718 – volume: 160 start-page: 107303 year: 2023 ident: ref_30 article-title: Multiple-image encryption using phase jump gradient factors -based oam multiplexing holography publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2022.107303 – volume: 171 start-page: 277 year: 2018 ident: ref_21 article-title: Multiple-image encryption by using robust chaotic map in wavelet transform domain publication-title: Optik doi: 10.1016/j.ijleo.2018.06.029 – volume: 110 start-page: 24 year: 2018 ident: ref_8 article-title: Medical image encryption using a hybrid model of modified genetic algorithm and coupled map lattices publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2018.05.009 – volume: 70 start-page: 103340 year: 2022 ident: ref_34 article-title: Image encryption algorithm based on improved zigzag transformation and quaternary DNA coding publication-title: J. Inf. Secur. Appl. – volume: 254 start-page: 168649 year: 2022 ident: ref_25 article-title: Security-enhanced multiple-image encryption based on modified iterative phase retrieval algorithm with structured phase mask in fresnel domain publication-title: Optik doi: 10.1016/j.ijleo.2022.168649 – volume: 32 start-page: 10979 year: 2020 ident: ref_2 article-title: Hybrid optimization with cryptography encryption for medical image security in internet of things publication-title: Neural Comput. Appl. doi: 10.1007/s00521-018-3801-x – volume: 20 start-page: 763 year: 2016 ident: ref_3 article-title: Medical image protection using genetic algorithm operations publication-title: Soft Comput. doi: 10.1007/s00500-014-1539-7 – volume: 190 start-page: 723 year: 2021 ident: ref_33 article-title: A novel image encryption algorithm based on spwlcm and DNA coding publication-title: Math. Comput. Simul. doi: 10.1016/j.matcom.2021.06.012 – volume: 144 start-page: 134 year: 2018 ident: ref_6 article-title: Medical image encryption using high-speed scrambling and pixel adaptive diffusion publication-title: Signal Process. doi: 10.1016/j.sigpro.2017.10.004 – volume: 6 start-page: 20596 year: 2018 ident: ref_1 article-title: Secure medical data transmission model for iot-based healthcare systems publication-title: IEEE Access doi: 10.1109/ACCESS.2018.2817615 – volume: 25 start-page: 100676 year: 2023 ident: ref_18 article-title: Iot based medical image encryption using linear feedback shift register—towards ensuring security for teleradiology applications publication-title: Meas. Sens. doi: 10.1016/j.measen.2023.100676 – volume: 78 start-page: 7841 year: 2019 ident: ref_22 article-title: Multiple-image encryption algorithm based on DNA encoding and chaotic system publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-018-6496-1 – ident: ref_35 doi: 10.3390/e25050746 |
SSID | ssj0023216 |
Score | 2.380108 |
Snippet | Ensuring the privacy and secrecy of digital medical images has become a pressing issue as a result of the quick development of smart medical technology and the... |
SourceID | doaj pubmedcentral proquest gale pubmed crossref |
SourceType | Open Website Open Access Repository Aggregation Database Index Database Enrichment Source |
StartPage | 898 |
SubjectTerms | Algorithms Batch processing Congruences Data encryption Digital imaging DNA DNA encoding Encryption Genetic research hash function Image transmission Information storage Internet of Things Investment analysis linear congruence medical image encryption Medical imaging Methods multiple-image encryption Noise pollution Wavelet transforms |
SummonAdditionalLinks | – databaseName: ProQuest Central dbid: BENPR link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1Lb9QwELZge-GCiniFFhQQElysJrbj2CeUha0WxK4QUKm3yI5tQIKkbLcH_j0zXm9oBOKYZBTZY8_LM_6GkOdKCm281TSUpaQiBEktCxUtfHAl5tuLCPa8WsvlmXh3Xp2nA7fLVFa514lRUbuhwzPyE8z4xWuT4tXFT4pdozC7mlpo3CQHoIKVmpGD-WL94eMYcnFWyh2eEIfg_sQzxNNTWk2sUATr_1slX7NJ03rJawbo9JDcTp5j3uyW-g654fu75H2Tr1JJIE05F_r2B-iIfNF3m19RH-Sr2CU6n4PBcjk8f1o2FHyQ3PQuf7NukHRAE3aPnJ0uPr9e0tQggXZg57dUh9LaynIvCq-x3QxEV9oXxtUe4iZpuFOwBGXtGObXuVBBcmdYCBWXILiS3yezfuj9Q5JXWlrPPPwtWKEZ8FoggDELJnTGFnVGXu4Z1nYJPRybWHxvIYpA3rYjbzPybCS92EFm_ItojlwfCRDlOr4YNl_aJDSttCp0LqjKWiacqVXH6jrC4YjCFTpk5AWuWYuyCIPpTLpSAFNCVKu2qTEpCJMvMnK8X9Y2Cell-2dLZeTp-BnEC3MmpvfDFdJwLAMuOMvIg90uGMfMscUPuDgZUZP9MZnU9Ev_7WuE8Aa3TkvF-KP_j-uI3ML29rE0jR-T2XZz5R-DE7S1T9JO_w1YKQSB priority: 102 providerName: ProQuest |
Title | A Multiple-Medical-Image Encryption Method Based on SHA-256 and DNA Encoding |
URI | https://www.ncbi.nlm.nih.gov/pubmed/37372242 https://www.proquest.com/docview/2829796474 https://www.proquest.com/docview/2830667032 https://pubmed.ncbi.nlm.nih.gov/PMC10296823 https://doaj.org/article/6b8fcdf85bb24da78c2775195940d09f |
Volume | 25 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3Nq9QwEB_0efEiil_V51JF0Et4bdKmybGru28VdxH1wd5K0iQ8Qbvy3Hfwv3cm7ZYtCl68FNoMJZnJZGaYyW8AXipZaOOtZiHPJStCkMzyULLMB5dTvj2LYM_rjVxdFO-35fao1RfVhPXwwD3jzqRVoXVBldbywplKtbyqIiRKkblMBzp90eYdgqkh1BI8lz2OkMCg_sxzwtFTWk2sTwTp__MoPrJF0zrJI8OzvAt3Bo8xrfuZ3oMbvrsPH-p0PZQCsiHXwt59x7MhXXTt1a94DqTr2B06naOhcim-f17VDH2P1HQufbupiXRHpusBXCwXX96s2NAYgbVo3_dMh9za0gpfZF5TmxmMqrTPjKs8xkvSCKeQ9XnlOOXVRaGCFM7wEEohUWGleAgn3a7zjyEttbSee_xbsIXmHMMLAi7mwYTW2KxK4PWBYU07oIZT84pvDUYPxNtm5G0CL0bSHz1Uxt-I5sT1kYDQreMHlHkzyLz5l8wTeEUya0gHcTKtGa4S4JIIzaqpK0oG4uKzBE4PYm0G5fzZ0FC8gVsk8HwcRrWiXInp_O6aaASV_2aCJ_Co3wXjnAW19kHXJgE12R-TRU1Huq-XEbob3TktFRdP_gcbnsJtjls9Fq6JUzjZX137Z-gi7e0Mbqrl-QxuzRebj59mUTfweb7NfwOFFQ8q |
linkProvider | Directory of Open Access Journals |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwEB6VcoALAvEKFAgIBBerie04yQGhlHbZpbt7oZV6C3FsF6Q2KdutUP8Uv5EZJxu6AnHrMfEossfjeWTG3wC8zpTMK6tz5uJYMemcYpq7hEXWmZjy7ZEHe57N1fhQfj5Kjjbg1-ouDJVVrnSiV9Smrekf-TZl_Py1Sfnh7AejrlGUXV210OjEYt9e_sSQ7fz9ZBf39w3no72Dj2PWdxVgNRrHJctdrHWihZWRzalHC4YkuY0qk1oMNlQlTIbzjlPDKSktZOaUMBV3LhEKpV0J_O4NuCkFWnK6mT76NAR4gseqQy_CwWjbckLvy_Jszeb51gB_G4ArFnC9OvOKuRvdhTu9nxoWnWDdgw3b3IdpEc76AkTWZ3jY5BQ1UrjX1ItLr33Cme9JHe6geTQhPn8ZFww9nrBqTLg7L4i0JYP5AA6vhXEPYbNpG_sYwiRX2nKLX3Na5hx3VhJcMneVqysdpQG8WzGsrHuscmqZcVJizEK8LQfeBvBqID3rADr-RbRDXB8ICFPbv2gXx2V_REulM1cblyVac2mqNKt5mnrwHRmZKHcBvKU9K-nk42Tqqr_AgEsiDK2ySCkFiYuPAthabWvZq4Tz8o8AB_ByGMbDTBmaqrHtBdEIKjqOBA_gUScFw5wFNRRChyqAbE0-1ha1PtJ8_-YBw9GJzFXGxZP_z-sF3BofzKbldDLffwq3OQq0L4oTW7C5XFzYZ-h-LfVzL_MhfL3uQ_Ybe0I95Q |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3db9MwED-NTkK8IBBfgQEBgeDFamInTvyAUEpbtWytJmDS3rI4tgEJktF1QvvX-Ou4S9KwCsTbHpOcLPt8vo_c-XcAL1IZqcJqxVwYShY5J5nmLmaBdSakfHvQgD0vlnJ2FL0_jo934NfmLgyVVW50YqOoTV3SP_IhZfyaa5PR0HVlEYfj6dvTH4w6SFGmddNOoxWRfXvxE8O3szfzMe71S86nk0_vZqzrMMBKNJRrplyodayFjQKrqF8LhifKBoVJLAYeshAmxTWEieGUoBZR6qQwBXcuFhIlXwoc9xrsJhQVDWB3NFkefujDPcFD2WIZCaGCoeWE5ZeqdMsCNo0C_jYHl-zhdq3mJeM3vQU3O6_Vz1oxuw07troDB5m_6MoRWZfvYfPvqJ_8SVWuLhpd5C-aDtX-CI2l8fH54yxj6P_4RWX88TIj0prM5104uhLW3YNBVVf2Afixktpyi6M5HSmO-xwReDJ3hSsLHSQevN4wLC875HJqoPEtxwiGeJv3vPXgeU962sJ1_ItoRFzvCQhhu3lRrz7n3YHNpU5daVwaa80jUyRpyZOkgeKJAhMo58Er2rOc9ABOpiy66wy4JELUyrOEEpK4-MCDvc225p2COMv_iLMHz_rPeLQpX1NUtj4nGkElyIHgHtxvpaCfs6D2QuheeZBuycfWora_VF-_NPDh6FIqmXLx8P_zegrX8YDlB_Pl_iO4wVGemwo5sQeD9ercPkZfbK2fdELvw8lVn7PfyppDdw |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Multiple-Medical-Image+Encryption+Method+Based+on+SHA-256+and+DNA+Encoding&rft.jtitle=Entropy+%28Basel%2C+Switzerland%29&rft.au=Wu%2C+Junfeng&rft.au=Zhang%2C+Jialu&rft.au=Liu%2C+Dong&rft.au=Wang%2C+Xiaofeng&rft.date=2023-06-03&rft.issn=1099-4300&rft.eissn=1099-4300&rft.volume=25&rft.issue=6&rft_id=info:doi/10.3390%2Fe25060898&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1099-4300&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1099-4300&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1099-4300&client=summon |