medical image authentication
Recently Published Documents


TOTAL DOCUMENTS

43
(FIVE YEARS 11)

H-INDEX

9
(FIVE YEARS 0)

2022 ◽  
Vol 70 (2) ◽  
pp. 3133-3150
Author(s):  
Fayez Alqahtani ◽  
Mohammed Amoon ◽  
Walid El-Shafai

2021 ◽  
Vol 23 (05) ◽  
pp. 356-367
Author(s):  
Usha Verma ◽  
◽  
Neelam Sharma ◽  

The security of medical images is very important to maintain the confidentiality and privacy of patient information. Medical practitioners are required to adopt policies for the security of the access of patient’s electronic information. This paper provides the security analysis of the Medical Images based on Elliptic curve cryptography. Elliptic curve cryptography (ECC) is a complex method and involves intense computation which makes it robust for the intruder attack. In this paper, ECC based Medical Image Encryption algorithm is performed on varieties of medical images like MRI, CT scan and X-ray. Security analysis is presented based on Histogram, Entropy, NPCR and UACI measures and compared with traditional method RSA. Histogram after encryption using ECC has uniform distribution which reflects that the information of original medical image is hidden properly. Entropy and NPCR achieved are 7.86 – 7.99 and 99.62 – 99.64 % respectively which are very close to their ideal values. Results reveal that ECC is more powerful and useful for medical image authentication and key distribution. However, it can be used for exchange of secret key rather than encryption.


2021 ◽  
Vol 17 (4) ◽  
pp. 155014772110141
Author(s):  
Tiankai Sun ◽  
Xingyuan Wang ◽  
Da Lin ◽  
Rong Bao ◽  
Daihong Jiang ◽  
...  

In this article, based on wavelet reconstruction and fractal dimension, a medical image authentication method is implemented. According to the local and global methods, the regularity of the mutation structure in the carrier information is analyzed through a measurement defined in the medical image transformation domain. To eliminate the redundancy of the reconstructed data, the fractal dimension is used to reduce the attributes of the reconstructed wavelet coefficients. According to the singularity of the fractal dimension of the block information, the key features are extracted and the fractal feature is constructed as the authentication feature of the images. The experimental results show that the authentication scheme has good robustness against attacks, such as JPEG compression, multiplicative noise, salt and pepper noise, Gaussian noise, image rotation, scaling attack, sharpening, clipping attack, median filtering, contrast enhancement, and brightness enhancement.


Sign in / Sign up

Export Citation Format

Share Document