DICAMES logo

Veuillez utiliser cette adresse pour citer ce document : https://hdl.handle.net/20.500.12177/10373
Affichage complet
Élément Dublin CoreValeurLangue
dc.contributor.advisorTiedeu, Alain-
dc.contributor.authorHeucheun Yepdia, Lee Mariel-
dc.date.accessioned2023-04-11T11:38:51Z-
dc.date.available2023-04-11T11:38:51Z-
dc.date.issued2022-
dc.identifier.urihttps://hdl.handle.net/20.500.12177/10373-
dc.description.abstractOver the last few decades, telemedicine has grown considerably thanks to the development of information and communication technologies. A lot of information is exchanged between health care practitioners. Much of this information consists of medical images, many of which contain sensitive patient information and require confidentiality. In order to ensure the security of images during their transmission from one point to another, several encryption algorithms have been developed, among which those based on the fusion or mixing of images are increasingly used. In fact, the majority of image fusion systems aim at providing richer information for better decision making. However, in recent years, image fusion techniques have been developed more for image encryption. In this paper, we propose two secret key encryption algorithms based on image fusion. Subsequently, a beginning of implementation of the first algorithm is led on the STM32F407ZET6 microprocessor embedded board in order to appreciate a possible implementation of the cryptosystem on this card. The first one uses the Henon, logistic-May and logistic-sine chaotic maps in the encryption process, where two images are scrambled separately and then mixed to produce two hybrid images. The second performs two-level target image fusion : the discrete cosine transform (DCT in english) is used first to merge the target images into two multiplexed images, each of which is permuted at the block level. The second level of fusion is performed by a non-linear relation inspired by the Cramer model. may-gaussian and gaussian-gompertz maps are used as pseudo-random number generators in this second algorithm. The performance evaluation tests of the proposed algorithms have been performed on standard images of the scientific community, and then on medical images. The results obtained after simulations, analyses and comparison with algorithms of the literature, show that they are satisfactory in terms of robustness, speed of execution time, quantity of images to encrypt and quality of reconstructed images. Moreover, the proposed algorithms present a simple structure, and are adapted to an implementation in a hardware architecture such as the STM32F407ZET6.fr_FR
dc.format.extent154fr_FR
dc.publisherUniversité de Yaoundé Ifr_FR
dc.subjectCryptography systemfr_FR
dc.subjectImage fusionfr_FR
dc.subjectMedical imagefr_FR
dc.subjectEncryptionfr_FR
dc.titleContribution à l’étude expérimentale d’un système de cryptographie de signaux : application aux images médicalesfr_FR
dc.typeThesis-
Collection(s) :Thèses soutenues

Fichier(s) constituant ce document :
Fichier Description TailleFormat 
FS_These_BC_23_0096.pdf9.84 MBAdobe PDFMiniature
Voir/Ouvrir


Tous les documents du DICAMES sont protégés par copyright, avec tous droits réservés.