[go: up one dir, main page]

Ajili et al., 2021 - Google Patents

Crypto‐Watermarking Algorithm Using Weber's Law and AES: A View to Transfer Safe Medical Image

Ajili et al., 2021

View PDF @Full View
Document ID
15129648158877008778
Author
Ajili S
Hajjaji M
Mtibaa A
Publication year
Publication venue
Scientific Programming

External Links

Snippet

We propose a novel method for medical image watermarking in the DCT domain using the AES encryption algorithm. First, we decompose the original medical image into subblocks of 8× 8. Besides, we apply the DCT and the quantization, respectively, to each subblock …
Continue reading at onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0202Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/08Randomization, e.g. dummy operations or using noise
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0063Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
Hua et al. Reversible data hiding in encrypted images using cipher-feedback secret sharing
Chang et al. Privacy-preserving reversible information hiding based on arithmetic of quadratic residues
Aouissaoui et al. Robustly correlated key‐medical image for DNA‐chaos based encryption
Parah et al. A new secure and robust watermarking technique based on logistic map and modification of DC coefficient
Kannammal et al. Two level security for medical images using watermarking/encryption algorithms
Vellaisamy et al. Inversion attack resilient zero‐watermarking scheme for medical image authentication
Hurrah et al. Embedding in medical images: an efficient scheme for authentication and tamper localization
Ajili et al. Crypto‐Watermarking Algorithm Using Weber’s Law and AES: A View to Transfer Safe Medical Image
Soualmi et al. A novel blind medical image watermarking scheme based on Schur triangulation and chaotic sequence
Koppu et al. A fast enhanced secure image chaotic cryptosystem based on hybrid chaotic magic transform
Joseph et al. A study on steganographic techniques
Farschi et al. A novel chaotic approach for information hiding in image
Ahmed et al. Hash-based authentication of digital images in noisy channels
Sathananthavathi et al. Secure visual communication with advanced cryptographic and ımage processing techniques
Benrhouma Cryptanalysis and improvement of a semi-fragile watermarking technique for tamper detection and recovery
Islam et al. Denoising and error correction in noisy AES-encrypted images using statistical measures
Maji et al. Cover independent image steganography in spatial domain using higher order pixel bits
Dharmika et al. Privacy preservation of medical health records using symmetric block cipher and frequency domain watermarking techniques
Ajili et al. Combining watermarking and encryption algorithm for medical image safe transfer: method based on DCT
Al-Bahadili A secure block permutation image steganography algorithm
Kutade et al. A survey on various approaches of image steganography
Bhattacharjee et al. An image-in-image communication scheme using secret sharing and M-ary spread spectrum watermarking
Agarwal et al. Selective bin model for reversible data hiding in encrypted images
Singh et al. Deep learning based medical image segmentation for encryption with copyright protection through data hiding
Srivastava et al. Design and implementation of crypto based water marking techniques for EHR security