Javascript must be enabled to continue!
A novel approach for encryption and decryption of digital imaging and communications using mathematical modelling in internet of medical things
View through CrossRef
AbstractThis research introduces an innovative algorithm for the encryption and decryption of greyscale digital imaging and communications in medicine images utilizing Laplace transforms. The proposed method presents a ground breaking approach to image encryption, effectively concealing visual information and ensuring a robust, secure, and reliable encryption process. By leveraging the inherent strengths of Laplace transform, the algorithm guarantees the complete retrieval of the original image without any loss, provided the correct decryption key is used. To thoroughly evaluate the performance of the algorithm, multiple tests were conducted, including extensive statistical analyses and assessments of encryption quality. Key performance metrics were carefully measured, including correlation coefficients and entropy values, which ranged from 7.89 to 7.99. Additionally, the algorithm's effectiveness was demonstrated through peak signal‐to‐noise ratio values, which spanned from 7.597 to 9.915, indicating the degree of similarity between the original and encrypted images. Furthermore, the number of pixels change rate values, ranging from 99.519241 to 99.609375, highlighted the algorithm's ability to produce significantly different encrypted images from the original. The unified average changing intensity values, falling between 35.72345678 and 35.78233456, further underscored the algorithm's proficiency in altering pixel intensities uniformly. Overall, this research offers a significant advancement in the field of image encryption, combining theoretical robustness with practical efficiency.
Institution of Engineering and Technology (IET)
Title: A novel approach for encryption and decryption of digital imaging and communications using mathematical modelling in internet of medical things
Description:
AbstractThis research introduces an innovative algorithm for the encryption and decryption of greyscale digital imaging and communications in medicine images utilizing Laplace transforms.
The proposed method presents a ground breaking approach to image encryption, effectively concealing visual information and ensuring a robust, secure, and reliable encryption process.
By leveraging the inherent strengths of Laplace transform, the algorithm guarantees the complete retrieval of the original image without any loss, provided the correct decryption key is used.
To thoroughly evaluate the performance of the algorithm, multiple tests were conducted, including extensive statistical analyses and assessments of encryption quality.
Key performance metrics were carefully measured, including correlation coefficients and entropy values, which ranged from 7.
89 to 7.
99.
Additionally, the algorithm's effectiveness was demonstrated through peak signal‐to‐noise ratio values, which spanned from 7.
597 to 9.
915, indicating the degree of similarity between the original and encrypted images.
Furthermore, the number of pixels change rate values, ranging from 99.
519241 to 99.
609375, highlighted the algorithm's ability to produce significantly different encrypted images from the original.
The unified average changing intensity values, falling between 35.
72345678 and 35.
78233456, further underscored the algorithm's proficiency in altering pixel intensities uniformly.
Overall, this research offers a significant advancement in the field of image encryption, combining theoretical robustness with practical efficiency.
Related Results
Digital Image Encryption Using Logistic Map
Digital Image Encryption Using Logistic Map
This study focuses on the application of the logistic map algorithm in the Python programming language for digital image encryption and decryption. It investigates the impact of im...
The Geography of Cyberspace
The Geography of Cyberspace
The Virtual and the Physical
The structure of virtual space is a product of the Internet’s geography and technology. Debates around the nature of the virtual — culture, s...
Calcium Ionophore-Induced Tissue Factor (TF) Decryption Induces TF Immobilization Into Lipid Rafts and Negative Regulation of TF Procoagulant Activity.
Calcium Ionophore-Induced Tissue Factor (TF) Decryption Induces TF Immobilization Into Lipid Rafts and Negative Regulation of TF Procoagulant Activity.
Abstract
Abstract 1131
Cell exposed tissue factor (TF), the physiologic initiator of blood coagulation, is normally expressed in a low procoagulant, o...
An Authorized Scheme Service Privately Shared Data
An Authorized Scheme Service Privately Shared Data
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that levera...
Comparative Analysis of Encryption Algorithms
Comparative Analysis of Encryption Algorithms
Purpose: Encryption algorithm allows users to extend the assurance found in the physical world to the electronic world in the carrying out of our day-to-day activities. This resear...
Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications
Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications
As the world keeps advancing, the need for automated interconnected devices has started to gain significance; to cater to the condition, a new concept Internet of Things (IoT) has ...
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...
Investigating data encryption technologies in securing business information systems
Investigating data encryption technologies in securing business information systems
In today’s increasingly interconnected digital landscape, businesses are confronted with the pressing need to secure sensitive information from a growing range of cyber threats. As...

