Proposed Privacy Preservation Technique for Color Medical Images

被引:3
作者
El-Shafai, Walid [1 ,2 ]
Abd El-Hameed, Hayam A. [3 ]
El-Hag, Noha A. [4 ]
Khalaf, Ashraf A. M. [3 ]
Soliman, Naglaa F. [5 ]
AlEisa, Hussah Nasser [6 ]
Abd El-Samie, Fathi E. [1 ]
机构
[1] Menoufia Univ, Dept Elect & Elect Commun, Fac Elect Engn, Menoufia 32952, Egypt
[2] Prince Sultan Univ, Dept Comp Sci, Secur Engn Lab, Riyadh 11586, Saudi Arabia
[3] Minia Univ, Elect Commun Engn Dept, Fac Engn, Al Minya 61111, Egypt
[4] Higher Inst Commercial Sci, Management Informat Syst, El Mahala El Kobra, Egypt
[5] Princess Nourah Bint Abdulrahman Univ, Dept Informat Technol, Coll Comp & Informat Sci, Riyadh 11671, Saudi Arabia
[6] Princess Nourah Bint Abdulrahman Univ, Dept Comp Sci, Coll Comp & Informat Sci, Riyadh, Saudi Arabia
关键词
LSB steganography; AES algorithm; KMCG algorithm; ENCRYPTION; SECURE; EFFICIENT; TRANSMISSION; CRYPTOSYSTEM; ALGORITHM;
D O I
10.32604/iasc.2023.031079
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, the security of images or information is very important. This paper introduces a proposed hybrid watermarking and encryption technique for increasing medical image security. First, the secret medical image is encrypted using Advanced Encryption Standard (AES) algorithm. Then, the secret report of the patient is embedded into the encrypted secret medical image with the Least Significant Bit (LSB) watermarking algorithm. After that, the encrypted secret medical image with the secret report is concealed in a cover medical image, using Kekre's Median Codebook Generation (KMCG) algorithm. Afterwards, the stego-image obtained is split into 16 parts. Finally, it is sent to the receiver. We adopt this strategy to send the secret medical image and report over a network securely. The proposed technique is assessed with different encryption quality metrics including Peak Signal-to-Noise Ratio (PSNR), Correlation Coefficient (C-r), Feature Similarity Index Metric (FSIM), and Structural Similarity Index Metric (SSIM). Histogram estimation is used to confirm the matching between the secret medical image before and after transmission. Simulation results demonstrate that the proposed technique achieves good performance with high quality of the received medical image and clear image details in a very short processing time.
引用
收藏
页码:719 / 732
页数:14
相关论文
共 25 条
[1]   Cancelable face and fingerprint recognition based on the 3D jigsaw transform and optical encryption [J].
Abou Elazm, Lamiaa A. ;
Ibrahim, Sameh ;
Egila, Mohamed G. ;
Shawky, H. ;
Elsaid, Mohamed K. H. ;
El-Shafai, Walid ;
Abd El-Samie, Fathi E. .
MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (19-20) :14053-14078
[2]   Robust hybrid watermarking techniques for different color imaging systems [J].
Al-Afandy, Khalid A. ;
El-Shafai, Walid ;
El-Rabaie, El-Sayed M. ;
Abd El-Samie, Fathi E. ;
Faragallah, Osama S. ;
El-Mhalaway, Ahmed ;
Shehata, Ahmed M. ;
El-Banby, Ghada M. ;
El-Halawany, Mohamed M. .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (19) :25709-25759
[3]   Optical PTFT Asymmetric Cryptosystem-Based Secure and Efficient Cancelable Biometric Recognition System [J].
Alarifi, Abdulaziz ;
Amoon, Mohammed ;
Aly, Moustafa H. ;
El-Shafai, Walid .
IEEE ACCESS, 2020, 8 :221246-221268
[4]   A Novel Hybrid Cryptosystem for Secure Streaming of High Efficiency H.265 Compressed Videos in IoT Multimedia Applications [J].
Alarifi, Abdulaziz ;
Sankar, Syam ;
Altameem, Torki ;
Jithin, K. C. ;
Amoon, Mohammed ;
El-Shafai, Walid .
IEEE ACCESS, 2020, 8 :128548-128573
[5]  
Algarni A., 2020, ENTROPY-SWITZ, V22, P1
[6]   SVD-based robust image steganographic scheme using RIWT and DCT for secure transmission of medical images [J].
Arunkumar, S. ;
Subramaniyaswamy, V ;
Vijayakumar, V. ;
Chilamkurti, Naveen ;
Logesh, R. .
MEASUREMENT, 2019, 139 :426-437
[7]   Security of 3D-HEVC transmission based on fusion and watermarking techniques [J].
El-Shafai, W. ;
El-Rabaie, S. ;
El-Halawany, M. M. ;
Abd El-Samie, F. E. .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (19) :27211-27244
[8]   Encoder-independent decoder-dependent depth-assisted error concealment algorithm for wireless 3D video communication [J].
El-Shafai, W. ;
El-Rabaie, S. ;
El-Halawany, M. M. ;
Abd El-Samie, Fathi E. .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (11) :13145-13172
[9]   Efficient hybrid watermarking schemes for robust and secure 3D-MVC communication [J].
El-Shafai, W. ;
El-Rabaie, S. ;
El-Halawany, M. M. ;
Abd El-Samie, Fathi E. .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (04)
[10]   Efficient and Secure Cancelable Biometric Authentication Framework Based on Genetic Encryption Algorithm [J].
El-Shafai, Walid ;
Mohamed, Fatma A. Hossam Eldein ;
Elkamchouchi, Hassan M. A. ;
Abd-Elnaby, Mohammed ;
Elshafee, Ahmed .
IEEE ACCESS, 2021, 9 :77675-77692