Ajili et al., 2021 - Google Patents
Crypto‐Watermarking Algorithm Using Weber's Law and AES: A View to Transfer Safe Medical ImageAjili et al., 2021
View PDF- Document ID
- 15129648158877008778
- Author
- Ajili S
- Hajjaji M
- Mtibaa A
- Publication year
- Publication venue
- Scientific Programming
External Links
Snippet
We propose a novel method for medical image watermarking in the DCT domain using the AES encryption algorithm. First, we decompose the original medical image into subblocks of 8× 8. Besides, we apply the DCT and the quantization, respectively, to each subblock …
- 238000004422 calculation algorithm 0 title abstract description 43
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Hua et al. | Reversible data hiding in encrypted images using cipher-feedback secret sharing | |
| Chang et al. | Privacy-preserving reversible information hiding based on arithmetic of quadratic residues | |
| Aouissaoui et al. | Robustly correlated key‐medical image for DNA‐chaos based encryption | |
| Parah et al. | A new secure and robust watermarking technique based on logistic map and modification of DC coefficient | |
| Kannammal et al. | Two level security for medical images using watermarking/encryption algorithms | |
| Vellaisamy et al. | Inversion attack resilient zero‐watermarking scheme for medical image authentication | |
| Hurrah et al. | Embedding in medical images: an efficient scheme for authentication and tamper localization | |
| Ajili et al. | Crypto‐Watermarking Algorithm Using Weber’s Law and AES: A View to Transfer Safe Medical Image | |
| Soualmi et al. | A novel blind medical image watermarking scheme based on Schur triangulation and chaotic sequence | |
| Koppu et al. | A fast enhanced secure image chaotic cryptosystem based on hybrid chaotic magic transform | |
| Joseph et al. | A study on steganographic techniques | |
| Farschi et al. | A novel chaotic approach for information hiding in image | |
| Ahmed et al. | Hash-based authentication of digital images in noisy channels | |
| Sathananthavathi et al. | Secure visual communication with advanced cryptographic and ımage processing techniques | |
| Benrhouma | Cryptanalysis and improvement of a semi-fragile watermarking technique for tamper detection and recovery | |
| Islam et al. | Denoising and error correction in noisy AES-encrypted images using statistical measures | |
| Maji et al. | Cover independent image steganography in spatial domain using higher order pixel bits | |
| Dharmika et al. | Privacy preservation of medical health records using symmetric block cipher and frequency domain watermarking techniques | |
| Ajili et al. | Combining watermarking and encryption algorithm for medical image safe transfer: method based on DCT | |
| Al-Bahadili | A secure block permutation image steganography algorithm | |
| Kutade et al. | A survey on various approaches of image steganography | |
| Bhattacharjee et al. | An image-in-image communication scheme using secret sharing and M-ary spread spectrum watermarking | |
| Agarwal et al. | Selective bin model for reversible data hiding in encrypted images | |
| Singh et al. | Deep learning based medical image segmentation for encryption with copyright protection through data hiding | |
| Srivastava et al. | Design and implementation of crypto based water marking techniques for EHR security |