A Robust Authentication Algorithm for Medical Images Based on Fractal Brownian Model and Visual Cryptography
TLDR
A security authentication method is designed based on fractal and visual cryptography based on the discrete fractal Brownian random field model that is effective against common attacks such as JPEG compression, scaling, rotation operation, clipping, added noise, filtering, and blurring.Abstract:
In this paper, we aimed to discuss the security authentication requirements of medical images in the medical network, and a security authentication method is designed based on fractal and visual cryptography. Based on the discrete fractal Brownian random field model, the gray-level statistical information and spatial structure information of medical images is fully mined. The gray distribution of medical images is expressed in the form of fractal features. By using the spatial data mining methods, the data of fractal structure space is analyzed, and by using the stability of the energy structure, the authentication features are formed. Using the visual cryptography (VC), the robustness of the authentication method is further enhanced. Through the centralized test of common medical images and the comparison analysis with existing methods, it is further verified that the method is effective against common attacks such as JPEG compression, scaling, rotation operation, clipping, added noise, filtering, and blurring.read more
Citations
More filters
Journal ArticleDOI
An image encryption algorithm based on new generalized fusion fractal structure
Musheer Ahmad,Shafali Agarwal,Ahmed Alkhayyat,Adi Alhudhaif,Fayadh Alenezi,Amjad Hussain Zahid,Nojood O. Aljehane +6 more
TL;DR: In this paper , a generalized fusion fractal structure is proposed by combining two one-dimensional fractals as seed functions from a larger spectrum of fractal functions, and a novel image encryption algorithm based on the new fractal function is proposed which utilizes a generated pseudo-random number (PRN) sequence as secret key.
Journal Article
An adaptive image zero-watermarking algorithm in DT-CWT domain
TL;DR: The experimental results show that this zero-watermarking algorithm not only ensures the unity between robustness and imperceptibility, but also has good performance in common intentional or unintentional attacks such as filtering, lossy compression, noising and geometric transform.
Reversible data hiding scheme using deep learning and visual cryptography for medical image communication
TL;DR: In this paper , reversible data concealment is combined with visual cryptography to provide a secure method of exchanging medical images, where a cover image is divided into nonoverlapping secret shares using Hadamard matrix and the DICOM image is fully reversibly extracted with the cover image.
Journal ArticleDOI
Natural share-based lightweight (n, n) single secret image sharing scheme using LSB stuffing for medical images
Journal ArticleDOI
Reversible data hiding scheme using deep learning and visual cryptography for medical image communication
TL;DR: In this article , reversible data concealment is combined with visual cryptography to provide a secure method of exchanging medical images in telemedicine, where a cover image is divided into nonoverlapping secret shares using Hadamard matrix.
References
More filters
Journal ArticleDOI
Robust color image watermarking technique in the spatial domain
Qingtang Su,Beijing Chen +1 more
TL;DR: The experimental results show that the proposed watermarking algorithm can obtain better invisibility of watermark and stronger robustness for common attacks, e.g., JPEG compression, cropping, and adding noise.
Journal ArticleDOI
Copyright protection scheme for digital images using visual cryptography and sampling methods
Ching-Sheng Hsu,Young-Chang Hou +1 more
TL;DR: A novel copyright protection scheme for digital images based on visual cryptography and statistics is proposed that can register multiple secret images without altering the host image and can identify the rightful ownership without resorting to the original image.
Journal ArticleDOI
An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC
Hamed Arshad,Morteza Nikooghadam +1 more
TL;DR: It is concluded that Irshad et al.
Journal ArticleDOI
Improvement of a Privacy Authentication Scheme Based on Cloud for Medical Environment
TL;DR: This work proposes a new authentication scheme, which provides anonymity, unlinkability, and message authentication, and allows patients to directly and remotely consult with doctors, and is more efficient in terms of computation cost.
Journal ArticleDOI
A Robust Image Watermarking Technique Based on DWT, APDCBT, and SVD
TL;DR: The discrete wavelet transform and all phase discrete cosine biorthogonal transform presented in recent years as well as the singular value decomposition (SVD) are adopted in this method to insert and recover the watermark.
Related Papers (5)
Secure fractal image coding based on fractal parameter encryption
Shiguo Lian,Xi Chen,Dengpan Ye +2 more
A novel color image encryption algorithm based on substitution box and hyper-chaotic system with fractal keys
Ehsan Hasanzadeh,Mahdi Yaghoobi +1 more