A new secure transmission scheme between senders and receivers using HVCHC without any loss

被引:11
作者
Almutairi, Saad [1 ]
Manimurugan, S. [2 ]
Aborokbah, Majed [1 ]
机构
[1] Univ Tabuk, Fac Comp & Informat Technol, Dept Comp Sci, Tabuk, Saudi Arabia
[2] Univ Tabuk, Fac Comp & Informat Technol, Dept Comp Engn, Tabuk, Saudi Arabia
关键词
Transmission; Visual cryptography; Hill cipher; Medical images; Character conversion; MODIFIED HILL CIPHER; VISUAL CRYPTOGRAPHY; WATERMARKING SCHEME; IMAGE TRANSMISSION;
D O I
10.1186/s13638-019-1399-z
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents a novel secure medical image transmission scheme using hybrid visual cryptography and Hill cipher (HVCHC) between sender and receiver. The gray scale medical images have been considered as a secret image and split into different shares by visual cryptography (VC) encryption process. The split shares are once again encoded by Hill cipher (HC) encode process for improving the efficiency of the proposed method. In this process, the encrypted medical image (shares) pixels are converted as characters based on the character determination (CD) and lookup tables. In result, a secret image is converted into characters. These characters are sent to the receiver/authenticated person for the reconstruction process. In receiver side, the ciphertext has been decoded by HC decode process for reconstructing the shares. The reconstructed shares are decrypted by the VC decryption process for retaining the original secret medical image. The proposed algorithm has provided better CC, less execution time, higher confidentiality, integrity, and authentication (CIA). Therefore, using this proposed method, cent percent of the original secret medical image can be obtained and the secret image can be prevented from the interception of intruders/third parties.
引用
收藏
页数:15
相关论文
共 28 条
[1]   Privacy Protection of Biometric Traits using Modified Hill Cipher with Involutory Key and Robust Cryptosystem [J].
Acharya, Bibhudendra ;
Sharma, Mukul Dhar ;
Tiwari, Sourabh ;
Minz, Vinay Kumar .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE AND EXHIBITION ON BIOMETRICS TECHNOLOGY, 2010, 2 :242-247
[2]  
Al-Mutairi S, 2017, INT J ADV APPL SCI, V4, P52, DOI 10.21833/ijaas.2017.02.010
[3]  
Almutairi S, 2016, INT J COMPUTER SCI I, V14, P446
[4]   A new visual cryptography based watermarking scheme using DWT and SIFT for multiple cover images [J].
Amiri, Tayebe ;
Moghaddam, Mohsen Ebrahimi .
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (14) :8527-8543
[5]  
[Anonymous], 1994, WORKSHOP THEORY APPL, DOI 10.1007/BFb0053419
[6]  
[Anonymous], 1931, AM MATH MON
[7]   Colored visual cryptography without color darkening [J].
Cimato, S. ;
De Prisco, R. ;
De Santis, A. .
THEORETICAL COMPUTER SCIENCE, 2007, 374 (1-3) :261-276
[8]   Probabilistic visual cryptography schemes [J].
Cimato, S ;
De Prisco, R ;
De Santis, A .
COMPUTER JOURNAL, 2006, 49 (01) :97-107
[9]   Optimal colored threshold visual cryptography schemes [J].
Cimato, S ;
De Prisco, R ;
De Santis, A .
DESIGNS CODES AND CRYPTOGRAPHY, 2005, 35 (03) :311-335
[10]   Ideal contrast visual cryptography schemes with reversing [J].
Cimato, S ;
De Santis, A ;
Ferrara, AL ;
Masucci, B .
INFORMATION PROCESSING LETTERS, 2005, 93 (04) :199-206