A medical image sharing method based on chaotic encryption

A medical image and chaotic encryption technology, applied in image data processing, image data processing, instruments, etc., can solve the problems of secret image damage, loss of hospitals and patients, and high fidelity requirements

Active Publication Date: 2015-09-23
CENT SOUTH UNIV
View PDF1 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But since the method is based on the OR operation, the recovered secret image is lossy, so the visual quality is not high
Medical images have high requirements for fidelity. Once a medical image is damaged, it may cause medical misdiagnosis and bring irreparable losses to hospitals and patients.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A medical image sharing method based on chaotic encryption
  • A medical image sharing method based on chaotic encryption
  • A medical image sharing method based on chaotic encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0118] Such as Figure 1-5 Although the present invention is described in terms of specific embodiments, the principles of the present invention, as defined in the appended claims, can obviously be applied beyond the scope of the embodiments specifically described herein. Moreover, some details are omitted here in order not to obscure the inventive aspects of the present invention. Specific details not described in this application are within the knowledge of any person of ordinary skill in the art.

[0119] The drawings of the present application and the detailed description attached thereto are only used to illustrate exemplary embodiments of the present invention. To maintain conciseness, other embodiments of the present invention using the principles of the present invention are not specifically described in this application, and are not specifically illustrated by the accompanying drawings. "Example" only means "used as an example, instance, or illustration" herein.

[0120...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a chaotic-encryption-based medical image share method which comprises a secret image breakdown step, a chaotic image encryption step, a chaotic image decryption step and a secret image recovery step. According to the invention, a threshold secret share scheme is utilized to divide an image into n shadow images, the chaos principle is utilized to encrypt the n shadow images, the encrypted shadow images have the statistical property of white noise, and the collected r shadow images are utilized to recover the secret image. The chaotic-encryption-based medical image share method facilitates data storage and transmission, ensures confidentiality and integrity of significant images, and has strong anti-attack capacity.

Description

Technical field [0001] The invention relates to a medical image sharing method based on chaotic encryption. Background technique [0002] The rapid development of computer networks and communication technologies has promoted the process of social informatization, and the use of the Internet to exchange information is an important feature of the information society. Medical remote diagnosis has made great progress with the development of the Internet, but it is also accompanied by a series of information security issues, such as the leakage and tampering of important medical images during transmission. [0003] The secret sharing system is an important branch in the field of modern cryptography and an important research content in the direction of information security. In 1979, Shamir and Blakley proposed the secret sharing scheme for the first time. The secret sharing system divides the shared secret into several parts (called sub-secrets) to several participants, and stipulates ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06T1/00
Inventor 陈志刚梁涤青邓小鸿
Owner CENT SOUTH UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products