Chaotic-encryption-based medical image share method

A medical image, chaotic encryption technology, applied in image data processing, image data processing, instruments, etc., can solve problems such as low visual quality, medical error diagnosis, hospital and patient losses, etc.

Active Publication Date: 2013-07-31
CENT SOUTH UNIV
View PDF1 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But since the method is based on the OR operation, the recovered secret image is lossy, so the visual quality is not high
Medical images have high requirements for fidelity. Once a medical image is damaged, it may cause medical misdiagnosis and bring irreparable losses to hospitals and patients.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Chaotic-encryption-based medical image share method
  • Chaotic-encryption-based medical image share method
  • Chaotic-encryption-based medical image share method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0118] Such as Figure 1-5 , although the invention has been described with respect to specific embodiments, it is apparent that the principles of the invention, as defined by the appended claims, can be applied beyond the embodiments specifically described herein. Moreover, some details have been left out here in order not to obscure the inventive aspects of the invention. Specific details not described within this application are within the purview of any person of ordinary skill in the art.

[0119] The drawings in this application and their accompanying detailed description are for purposes of illustrating example embodiments of the invention only. In order to maintain brevity, other embodiments of the invention using the principles of the invention are not specifically described in this application and are not specifically illustrated by the present drawings. "Example" herein simply means "serving as an example, instance, or illustration."

[0120] see figure 1 , fig...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a chaotic-encryption-based medical image share method which comprises a secret image breakdown step, a chaotic image encryption step, a chaotic image decryption step and a secret image recovery step. According to the invention, a threshold secret share scheme is utilized to divide an image into n shadow images, the chaos principle is utilized to encrypt the n shadow images, the encrypted shadow images have the statistical property of white noise, and the collected r shadow images are utilized to recover the secret image. The chaotic-encryption-based medical image share method facilitates data storage and transmission, ensures confidentiality and integrity of significant images, and has strong anti-attack capacity.

Description

technical field [0001] The invention relates to a method for sharing medical images based on chaotic encryption. Background technique [0002] The rapid development of computer network and communication technology has promoted the process of social informatization, and the use of the Internet to exchange information is an important feature of the information society. Medical remote diagnosis has made great progress with the development of the Internet, but it is also accompanied by a series of information security problems, such as leakage and tampering of important medical images during transmission. [0003] Secret sharing system is an important branch in the field of modern cryptography, and it is also an important research content in the direction of information security. In 1979, Shamir and Blakley proposed the secret sharing scheme for the first time. The secret sharing system divides the shared secret into several parts (called sub-secrets) and distributes them to s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00
Inventor 陈志刚梁涤青邓小鸿
Owner CENT SOUTH UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products