Secure data stream transmission method for cell pathological image storage system

Author(s):  
Yuejin Zhang ◽  
Yu Zhao ◽  
Guanxiang Yin ◽  
Xiaohui Guan ◽  
Meiling Zhong ◽  
...  
2015 ◽  
Vol 713-715 ◽  
pp. 1448-1451
Author(s):  
Lin Lu ◽  
Yan Feng Zhang ◽  
Xiao Feng Li

The high-altitude missile and other special application occasions have requirements on image storage system, such as small size, high storage speed, low temperature resistance, etc. Commonly used image storage system in the market cannot meet such requirement. In the paper, real-time image storage system solutions on missile based on FPGA should be proposed. The system mainly consists of acquisition module and memory reading module. The whole system adopts FPGA as main control chip for mainly completing real-time decoding and acquisition on one path of PAL format video images, reading and writing of NandFlash chipset, erasure, bad block management and so on. The solution has passed various environmental tests with stable performance, large data storage capacity and easy expansion, which has been used in engineering practice.


2021 ◽  
Author(s):  
Jiming Yao ◽  
Wei Wang ◽  
Peng Wu ◽  
Ningzhe Xing ◽  
Chun Yang

Author(s):  
Xing Xie ◽  
Indrakshi Ray ◽  
Waruna Ranasinghe ◽  
Philips A. Gilbert ◽  
Pramod Shashidhara ◽  
...  

2019 ◽  
Vol 30 (04) ◽  
pp. 551-570 ◽  
Author(s):  
Wenjuan Meng ◽  
Jianhua Ge ◽  
Tao Jiang

A cloud storage system which incorporates the deletion and deduplication functionalities will have both security and efficiency advantages over exiting solutions which provide only one of them. However, the security models of secure data deletion and data deduplication functionalities are not compatible with each other, which will cause security and efficiency vulnerability under coercive adversaries. To solve these security and efficiency challenges, we define and construct a scheme, whose security relies on the proper erasure of keys in the wrapped key tree and periodical update of the deduplication encryption keys. Moreover, we enhance the efficiency of the proposed scheme by introducing incremental data update, where only the changed part is encrypted/decrypted and uploaded/downloaded in data updating. Further security analysis shows that the proposed scheme is secure against coercive attack. Finally, the practical implementation shows that our scheme is performance efficient in computation, storage and communication for both the cloud storage server and users.


1986 ◽  
Author(s):  
R. Heu ◽  
J. Hol zkamp ◽  
J. Tiemann
Keyword(s):  

IJARCCE ◽  
2017 ◽  
Vol 6 (4) ◽  
pp. 316-323
Author(s):  
Bhos Komal ◽  
Ingale Karuna ◽  
Hattikatti Susmita ◽  
Jadhav Sachin ◽  
Mirajkar SS ◽  
...  

2009 ◽  
Author(s):  
Yu-feng Li ◽  
Rong-kun Xue ◽  
Fei Liang

Sign in / Sign up

Export Citation Format

Share Document