Browse > Article
http://dx.doi.org/10.22937/IJCSNS.2022.22.6.13

A Systematic Literature Review on Security Challenges In Image Encryption Algorithms for Medical Images  

Almalki, Nora (Department of Computer Science, College of Computer and Information Systems, Umm Al-Qura University)
Alsuwat, Hatim (Department of Computer Science, College of Computer and Information Systems, Umm Al-Qura University)
Publication Information
International Journal of Computer Science & Network Security / v.22, no.6, 2022 , pp. 75-82 More about this Journal
Abstract
Medical data is one of the data that must be kept in safe containers, far from intrusion, viewing and modification. With the technological developments in hospital systems and the use of cloud computing, it has become necessary to save, encrypt and even hide data from the eyes of attackers. Medical data includes medical images, whether they are x-ray images of patients or others, or even documents that have been saved in the image format. In this review, we review the latest research and the latest tools and algorithms that are used to protect, encrypt and hide these images, and discuss the most important challenges facing these areas.
Keywords
Medical Image; Encryption; Steganography;
Citations & Related Records
Times Cited By KSCI : 7  (Citation Analysis)
연도 인용수 순위
1 Saraswata A , Khatria C , Sudhakara , Thakrala P , Biswas P.: An Extended Hybridization of Vigenere and Caesar Cipher Techniques for Secure Communication. Science Direct. Procedia Computer Science (2016)
2 Heimerl F, Lohmann S, Lange S, Ertl T.: Word cloud explorer: Text analytics based on word clouds. IEEE. Hawaii International Conference on System Sciences (2014)
3 Kamal S , Hosny K, Elgindy T, Darwish M, Fouda M.: A New Image Encryption Algorithm for Grey and Color Medical Images. IEEE (2021)
4 Ahgue A, Nkapkop J, Effa J, Franz S, Malutan R, Borda M.:A New DNA-Combining Chaos Scheme for Fast and Secure Image Encryption. Springer Nature Switzerland AG (2019)
5 Kumar P, Aswatha A, Sasi S.: Grayscale Image Encryption Based on Symmetric-Key Latin Square Image Cipher (LSIC) .Springer (2018)
6 Shyla M , Kumar K, Das R.: Image steganography using genetic algorithm for cover image selection and embedding. Science Direct, Soft Computing Letters (2021)
7 Zenati A , Ouarda W, Alimi A.: SSDIS-BEM: A New Signature Steganography Document Image System based on Beta Elliptic Modeling. Science Direct. Engineering Science and Technology, an International Journal (2020)
8 Bongale A, Bhamidipati K, Bongale A, Kumar S.: Hybrid International Data Encryption Algorithm for Digital Image Encryption . Springer (2021)
9 Chen X, Wu H.: Image Encryption Algorithm Based on Chaotic Sequence. Springer (2020)
10 Jiang B.:A Homomorphic Encryption Algorithm for Chaotic Image Coding Data in Cloud Computing. Springer (2019)
11 Zhang R, Jiang D, Ding W, Wang Y, Wu Y, Guang Y, Ding Q.: Visually Meaningful Image Encryption Algorithm Based on Parallel Compressive Sensing and Cellular Neural Network. Advances in Smart Vehicular Technology, Transportation, Communication and Applications, Smart Innovation, Systems and Technologies 250. Springer (2022)
12 Kitchenham, B., Charters, S. "Guidelines for performing systematic literature reviews in software engineering 2".
13 Sasikaladevi N , Geetha K , Revathi A.: EMOTE - Multilayered encryption system for protecting medical images based on binary curve. Science Direct. Journal of King Saud University - Computer and Information Sciences(2022)
14 Li F, Yua Z, Qinb C.: GAN-based spatial image steganography with cross feedback mechanism. Science Direct. Signal Processing (2022)
15 Hussain A , Bora P.:Novel Watermarking Technique Using Encryption Steganography, Chaotic Logistic Map and Multiple Embedding. Science Direct. Procedia Computer Science (2020)
16 William S.: Cryptography and Network Security Principles and Practice Fifth Edition (2011)
17 Vengadapurvaja A, Nisha G, Aarthy R, Sasikaladevi N.: An Efficient Homomorphic Medical Image Encryption Algorithm For Cloud Storage Security. Science Direct.Procedia Computer Science (2017)
18 Stallings W.: Cryptography and Network Security (2011)
19 X. Liao, J. Yin, S. Guo, X. Li, and A. K. Sangaiah,.:Medical JPEG image steganography based on preserving inter-block dependencies. Comput. Electr. Eng., vol. 67, pp. 320-329, Apr (2018)   DOI