Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A medical CT image secret sharing method

A CT image and secret sharing technology, applied in the field of medical information security, can solve problems such as inability to effectively protect CT image theft and tampering, weak resistance to plaintext or selective plaintext attacks, etc., to achieve resistance to plaintext attacks or selective plaintext attacks, The effect of reducing suspicion that secret information is contained

Active Publication Date: 2019-04-02
CHENGDU UNIVERSITY OF TECHNOLOGY
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to provide a method for secret sharing of medical CT images, which mainly solves the shortcomings of the existing CT image encryption schemes in the prior art due to the weak ability to resist plaintext or selective plaintext attacks, which cannot be used in practical applications. Effectively protect CT images from theft and tampering

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A medical CT image secret sharing method
  • A medical CT image secret sharing method
  • A medical CT image secret sharing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0023] like Figure 1 to Figure 6 As shown, a method for secret sharing of medical CT images comprises the following steps:

[0024] In the encryption stage, first obtain the CT image subimage corresponding to the receiver’s permission level and a decimal matrix through sparse singular value decomposition, and then obtain the key of the two-dimensional Logistic map through the decimal matrix and use the map to generate two Chaotic sequence, scrambling the pixel positions of the CT image sub-images to obtain a snowflake image, and then dividing the snowflake image into five function value matrices by polynomials, and finally embedding the elements in the function value matrix into the camouflage image selected by the user In the lower two bits, five shadow images are obtained; in the decryption stage, the user collects five different shadow images and extracts the lower two bits of these shadow images, reorganizes the five function value matrices, and then obtains the snowflake...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a medical CT image secret sharing method. The method comprises an encryption stage and a decryption stage, and is characterized by in the encryption phase, firstly, through sparse singular value decomposition, obtaining a CT image sub-graph with the definition corresponding to the permission level of a receiver and a decimal matrix; obtaining a key of two-dimensional Logistic mapping through the decimal matrix, and generating two chaotic sequences by using the mapping; and performing scrambling operation on pixel positions of the CT image sub-images to obtain a snowflake image, then segmenting the snowflake image into five function value matrixes through a polynomial, and finally embedding elements in the function value matrixes into low two bits of a camouflage image selected by a user to obtain five shadow images. According to the scheme, the purpose of completely recovering the secret CT image subgraphs can be achieved only by enabling the receiver obtainingthe five shadow graphs and the receiver storing the secret keys to participate in decryption at the same time, and the method has very high practical value and popularization value.

Description

technical field [0001] The invention belongs to the field of medical information security, and in particular relates to a method for secretly sharing medical CT images. Background technique [0002] With the rapid development of telemedicine technology, more and more patients benefit from it. The remote transmission of CT images is an important part of telemedicine, and the wide application of telemedicine is accompanied by the storage and transmission of a large number of CT images on the Internet. Due to the high acquisition cost and great scientific value of CT images, CT images of some important figures with great influence in the political, military and economic fields also have important confidentiality value. The theft and tampering of CT images during transmission will cause huge losses. Therefore, it is of great practical value to encrypt CT images before transmitting them. Current CT image encryption schemes cannot effectively protect CT images from theft and ta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/10G06T1/00G16H30/20
CPCG06F21/10G06T1/0021G16H30/20
Inventor 刘明哲赵飞翔刘艳华刘祥和蒋鑫
Owner CHENGDU UNIVERSITY OF TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products