scispace - formally typeset
Open AccessJournal ArticleDOI

A Robust Authentication Algorithm for Medical Images Based on Fractal Brownian Model and Visual Cryptography

TLDR
A security authentication method is designed based on fractal and visual cryptography based on the discrete fractal Brownian random field model that is effective against common attacks such as JPEG compression, scaling, rotation operation, clipping, added noise, filtering, and blurring.
Abstract
In this paper, we aimed to discuss the security authentication requirements of medical images in the medical network, and a security authentication method is designed based on fractal and visual cryptography. Based on the discrete fractal Brownian random field model, the gray-level statistical information and spatial structure information of medical images is fully mined. The gray distribution of medical images is expressed in the form of fractal features. By using the spatial data mining methods, the data of fractal structure space is analyzed, and by using the stability of the energy structure, the authentication features are formed. Using the visual cryptography (VC), the robustness of the authentication method is further enhanced. Through the centralized test of common medical images and the comparison analysis with existing methods, it is further verified that the method is effective against common attacks such as JPEG compression, scaling, rotation operation, clipping, added noise, filtering, and blurring.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

An image encryption algorithm based on new generalized fusion fractal structure

TL;DR: In this paper , a generalized fusion fractal structure is proposed by combining two one-dimensional fractals as seed functions from a larger spectrum of fractal functions, and a novel image encryption algorithm based on the new fractal function is proposed which utilizes a generated pseudo-random number (PRN) sequence as secret key.
Journal Article

An adaptive image zero-watermarking algorithm in DT-CWT domain

TL;DR: The experimental results show that this zero-watermarking algorithm not only ensures the unity between robustness and imperceptibility, but also has good performance in common intentional or unintentional attacks such as filtering, lossy compression, noising and geometric transform.

Reversible data hiding scheme using deep learning and visual cryptography for medical image communication

TL;DR: In this paper , reversible data concealment is combined with visual cryptography to provide a secure method of exchanging medical images, where a cover image is divided into nonoverlapping secret shares using Hadamard matrix and the DICOM image is fully reversibly extracted with the cover image.
Journal ArticleDOI

Reversible data hiding scheme using deep learning and visual cryptography for medical image communication

TL;DR: In this article , reversible data concealment is combined with visual cryptography to provide a secure method of exchanging medical images in telemedicine, where a cover image is divided into nonoverlapping secret shares using Hadamard matrix.
References
More filters
Journal ArticleDOI

Robust color image watermarking technique in the spatial domain

TL;DR: The experimental results show that the proposed watermarking algorithm can obtain better invisibility of watermark and stronger robustness for common attacks, e.g., JPEG compression, cropping, and adding noise.
Journal ArticleDOI

Copyright protection scheme for digital images using visual cryptography and sampling methods

TL;DR: A novel copyright protection scheme for digital images based on visual cryptography and statistics is proposed that can register multiple secret images without altering the host image and can identify the rightful ownership without resorting to the original image.
Journal ArticleDOI

Improvement of a Privacy Authentication Scheme Based on Cloud for Medical Environment

TL;DR: This work proposes a new authentication scheme, which provides anonymity, unlinkability, and message authentication, and allows patients to directly and remotely consult with doctors, and is more efficient in terms of computation cost.
Journal ArticleDOI

A Robust Image Watermarking Technique Based on DWT, APDCBT, and SVD

Xiao Zhou, +2 more
- 19 Mar 2018 - 
TL;DR: The discrete wavelet transform and all phase discrete cosine biorthogonal transform presented in recent years as well as the singular value decomposition (SVD) are adopted in this method to insert and recover the watermark.
Related Papers (5)