Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Medical image privacy protection based on thumbnail encryption and distributed storage
Na ZHOU, Ming CHENG, Menglin JIA, Yang YANG
Journal of Computer Applications    2023, 43 (10): 3149-3155.   DOI: 10.11772/j.issn.1001-9081.2022111646
Abstract187)   HTML6)    PDF (4138KB)(169)       Save

With the popularity of cloud storage services and telemedicine platforms, more and more medical images are uploaded to the cloud. After being uploaded, the uploaded medical images may be leaked to unauthorized third parties, resulting in the disclosure of users’ personal privacy. Besides, if medical images are only uploaded to a single server for storage, they are vulnerable to attacks resulting in the loss of all data. To solve these problems, a medical image privacy protection algorithm based on thumbnail encryption and distributed storage was proposed. Firstly, by encrypting the thumbnail of the original medical image, the relevance of the medical images was preserved properly while achieving the encryption effect. Secondly, the double embedding method was adopted when hiding secret information, and data extraction and image recovery were performed separately to achieve Reversible Data Hiding (RDH) of the encrypted image. Finally, the distributed storage method based on polynomial shared matrix was used to generate n shares of the image and distribute them to n servers. Experimental results show that by using the encrypted thumbnail as carrier, the proposed algorithm exceeds the traditional security encryption methods on embedding rate. Even if the server is attacked, the receiver can recover the original image and private information as long as it receives no less than k shares. In the privacy protection of medical images, experiments were carried out from the aspects of anti-attack and image recovery, and the analysis results show that the proposed encryption algorithm has good performance and high security.

Table and Figures | Reference | Related Articles | Metrics
RFID pseudorandom number generator based on clock-controlled non-linear sequence
Xue-li QIN Ming CHENG Wei LI
Journal of Computer Applications    2009, 29 (11): 2998-3000.  
Abstract1554)      PDF (558KB)(1347)       Save
Focused on the study of Pseudo-Random Number Generator (PRNG) in RFID encryption system, a design of complex clock-controlled PRNG was proposed, which is constituted by the linear feedback shift register (LFSR). Some characteristic parameters of the design were analyzed, such as sequence cycle, linear-complexity, uniformity, power consumption etc, through the Matlab and Quartus Ⅱ sofeware. Hardware circuit used the low-cost and low-power Cyclone II of FPGA products. This method maintains these properties of long cycle and high linear complexity of the clock-contrlloed non-linear sequence, but also improves the uniformity of output sequence. In addition, this design of circuit structure is simple and can output 16 bit parallel data. Therefore, it can satisfy the requirements of RFID encryption system.
Related Articles | Metrics