Publication: A partial encryption scheme using absolute-value chaotic map for secure electronic health records
1
Issued Date
2014-01-01
Resource Type
Other identifier(s)
2-s2.0-84901019968
Rights
Mahidol University
Rights Holder(s)
SCOPUS
Bibliographic Citation
JICTEE 2014 - 4th Joint International Conference on Information and Communication Technology, Electronic and Electrical Engineering. (2014)
Suggested Citation
S. Fong-In, S. Kiattisin, A. Leelasantitham, W. San-Um A partial encryption scheme using absolute-value chaotic map for secure electronic health records. JICTEE 2014 - 4th Joint International Conference on Information and Communication Technology, Electronic and Electrical Engineering. (2014). doi:10.1109/JICTEE.2014.6804083 Retrieved from: https://repository.li.mahidol.ac.th/handle/123456789/33888
Research Projects
Organizational Units
Authors
Journal Issue
Thesis
Title
A partial encryption scheme using absolute-value chaotic map for secure electronic health records
Author(s)
Other Contributor(s)
Abstract
This paper presents a partial encryption scheme using absolute-value chaotic map for secure electronic health records (EHR). The HER system has been an emerging technology that allows medical personals to create, manage, and control medical data electronically through specific database or even web browsers. The proposed encryption scheme realizes XOR operations between separated planes of binary gray-scale image and a binaty imgae generated by an absolute-value chaotic map. The proposed is relatively simple containning a single absolute-value function with two constants and offers complex and robust dynamical behaviors in terms of random output values. Experiments have been performed in MATLAB using a magnetic resosnace image which is divided into 64 sub-blocks and 13th itterations were proceeded for encryption. Encryption qualitative performances are evaluated through pixel density histograms, 2-dimensional power spectral density, and vertical, horizontal, and diagonal correlation plots. For the encryption quantitative measures, correlation coefficients, entropy, NPCR and UACI are realized. Demonstrations of wrong-key decrypted image are also included. The proposed encryption scheme offers a potential alternative to a secure medical data records and web browsing through clound computing systems. © 2014 IEEE.
