Secured computed tomography scanner using a random bit.

Technol Health Care

Department of Mathematics and Big-data Science, Kumoh National Institute of Technology, Gumi, Korea.

Published: May 2023

AI Article Synopsis

  • Patient data transferred via WiFi in CT scanners raises security concerns, necessitating robust protection methods for medical imaging.!* -
  • A new deterministic algorithm for random bit generation is proposed, addressing limitations in existing hardware-dependent methods.!* -
  • The algorithm demonstrates higher entropy in randomized images compared to traditional hardware methods, improving overall security performance.!*

Article Abstract

Background: Patient data in current computed tomography scanner machines are transferred through several communication channels, such as WiFi, to the mobile channel platform. Therefore, patient information is an important security concern. Medical imaging must be protected using various methods.

Objective: The current hardware-dependent method for generating random bits exhibits predictable or inconvenient physical characteristics. Therefore, a more flexible random-bit generation technique is to be devised.

Methods: We propose a deterministic random bit generation algorithm that uses a mathematical periodic function.

Results: After randomizing the image using the proposed random bit, the performance is analyzed and compared with that of the processed image.

Conclusion: The random bit generation method using a mathematical algorithm shows higher entropy than the random bit generated by hardware.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC10200179PMC
http://dx.doi.org/10.3233/THC-236006DOI Listing

Publication Analysis

Top Keywords

random bit
20
computed tomography
8
tomography scanner
8
bit generation
8
random
6
bit
5
secured computed
4
scanner random
4
bit background
4
background patient
4

Similar Publications

Image Encryption Method Based on Three-Dimensional Chaotic Systems and V-Shaped Scrambling.

Entropy (Basel)

January 2025

School of Information Science and Engineering, Yanshan University, Qinhuangdao 066004, China.

With the increasing importance of securing images during network transmission, this paper introduces a novel image encryption algorithm that integrates a 3D chaotic system with V-shaped scrambling techniques. The proposed method begins by constructing a unique 3D chaotic system to generate chaotic sequences for encryption. These sequences determine a random starting point for V-shaped scrambling, which facilitates the transformation of image pixels into quaternary numbers.

View Article and Find Full Text PDF

The Structure of Bit-String Similarity Networks.

Entropy (Basel)

January 2025

Centro Atómico Bariloche and Instituto Balseiro, Comisión Nacional de Energía Atómica, Universidad Nacional de Cuyo, Av. E. Bustillo 9500, San Carlos de Bariloche 8400, Argentina.

We study the structural properties of networks formed by random sets of bit strings-namely the ordered arrays of binary variables representing, for instance, genetic information or cultural profiles. Two bit strings are connected by a network link when they are sufficiently similar to each other, i.e.

View Article and Find Full Text PDF

Cryptanalysis of an Image Encryption Algorithm Using DNA Coding and Chaos.

Entropy (Basel)

January 2025

Electrical Engineering College, Heilongjiang University, Harbin 150080, China.

In recent years, many chaotic image encryption algorithms have been cracked by chosen plaintext attack. Therefore, the method of associating the key with the plaintext to resist the cryptanalysis has received extensive attention from designers. This paper proposes a new method of cryptanalysis for image encryption algorithms with a key associated with plaintext.

View Article and Find Full Text PDF

In this paper, we propose a method to enhance the performance of a random number generator (RNG) that exploits ring oscillators (ROs). Our approach employs additional phase detectors to extract more entropy; thus, RNG uses fewer resources to produce bit sequences that pass all statistical tests proposed by National Institute of Standards and Technology (NIST). Generating a specified number of bits is on-demand, eliminating the need for continuous RNG operation.

View Article and Find Full Text PDF

Background: Muscarinic receptor agonism and positive allosteric modulation is a promising mechanism of action for treating psychosis, not present in most D2R-blocking antipsychotics. Xanomeline, an M1/M4-preferring agonist, has shown efficacy in late-stage clinical trials, with more compounds being investigated. Therefore, we aim to synthesize evidence on the preclinical efficacy of muscarinic receptor agonists and positive allosteric modulators in animal models of psychosis to provide unique insights and evidence-based information to guide drug development.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!