A study on secured encryption of medical images using significant visual cryptography

被引:0
|
作者
Vijayalaxmi, H. M. [1 ,2 ]
Rao, Arjun Sunil [3 ]
Khan, A. M. [2 ]
Kotyan, Deeksha [1 ]
Disha, D. [1 ]
Pratheeksha, R. [1 ]
Rao, Chinmayee [1 ]
机构
[1] St Joseph Engn Coll, Dept Elect & Commun Engn, Mangaluru 575028, Karnataka, India
[2] Mangalore Univ, Dept Elect, Mangalagangothri 574199, Karnataka, India
[3] Manipal Inst Technol MIT, Manipal Acad Higher Educ MAHE, Dept Elect & Commun Engn, Manipal 576104, Karnataka, India
来源
ENGINEERING RESEARCH EXPRESS | 2024年 / 6卷 / 02期
关键词
medical image communication; region of non-interest; integrity; steganography; significant visual cryptography;
D O I
10.1088/2631-8695/ad3dad
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The medical images of people are important and sensitive and cannot be shared with the public considering privacy measures. Maintaining the confidentiality of the medical image is essential, and leakage of such information can cause great loss. Therefore, the information has to be secured while being transferred through a third party, which can be any network medium. Thus, there is a need for developing a robust encryption algorithm. These algorithms improve the security of the ongoing pictures by compromising the nature of the picture and utilizing complex calculations. Algorithms that work on the nature of the picture by utilizing complex cycles, for example, error diffusion, halftoning, wavelet transform, and dithering, lead to time complexity. Thus, a compact and efficient cryptographic algorithm is proposed with fewer mathematical computations that ensure the secured transmission and reception of medical images through the medium using Significant Visual Cryptography (SVC). In SVC, initially, the quality of the secret images (SI) is improved by using the Error Abatement Technique (EAT). The output of EAT is used to generate random share values, which are then implanted in cover pictures. The shares that are transmitted do not reveal the secret information present in the original image because of the steganography features involved in this technique. The integrated check value (ICV) is calculated over the region of interest (ROI) at the encryption and decryption sides to provide additional security. Quality and security analyses have been carried out to ensure the robustness of the algorithm. The detailed study proved that the proposed algorithm beat the constraints of the current calculations. The concept of checking the integrity value and steganography features enhanced the effectiveness of the algorithm.
引用
收藏
页数:19
相关论文
共 50 条
  • [1] Combining Cryptography and Digital Watermarking for Secured Transmission of Medical Images
    Al-Haj, Ali
    Hussein, Noor
    Abandah, Gheith
    [J]. PROCEEDINGS OF 2016 2ND INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM2016), 2016,
  • [2] Security and Privacy for Medical Images Using Chaotic Visual Cryptography
    Abdul, Wadood
    Ali, Zulfiqar
    Ghouzali, Sanaa
    Alsulaiman, Mansour
    [J]. JOURNAL OF MEDICAL IMAGING AND HEALTH INFORMATICS, 2017, 7 (06) : 1296 - 1301
  • [3] Protecting Medical Images in Cloud Using Visual Cryptography Scheme
    Marwan, Mbarek
    Kartit, Ali
    Ouahmane, Hassan
    [J]. PROCEEDINGS OF 2017 3RD INTERNATIONAL CONFERENCE OF CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2017, : 39 - 44
  • [4] Elliptic Curve Cryptography for Secured Text Encryption
    Keerthi, K.
    Surendiran, B.
    [J]. PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON CIRCUIT ,POWER AND COMPUTING TECHNOLOGIES (ICCPCT), 2017,
  • [5] Evaluation of correlation in optical encryption by using visual cryptography
    Yi, SY
    Ryu, CS
    Ryu, DH
    Lee, SH
    [J]. OPTICAL PATTERN RECOGNITION XII, 2001, 4387 : 238 - 246
  • [6] Encryption of optical image using BCGH and visual cryptography
    Yi, SY
    Ryu, CS
    Kim, DG
    Lee, SH
    [J]. 18TH CONGRESS OF THE INTERNATIONAL COMMISSION FOR OPTICS: OPTICS FOR THE NEXT MILLENNIUM, TECHNICAL DIGEST, 1999, 3749 : 276 - 277
  • [7] Medical Images Encryption Based on Elliptic Curve Cryptography and Chaos Theory
    Benssalah, Mustapha
    Rhaskali, Yasser
    Azzaz, Mohamed Salah
    [J]. 2018 INTERNATIONAL CONFERENCE ON SMART COMMUNICATIONS IN NETWORK TECHNOLOGIES (SACONET), 2018, : 222 - 226
  • [8] Selective medical image encryption using DNA cryptography
    Akkasaligar, Prema T.
    Biradar, Sumangala
    [J]. INFORMATION SECURITY JOURNAL, 2020, 29 (02): : 91 - 101
  • [9] Secured Transmission of Sensitive Images of Skin Diseases Using Steganography and Cryptography
    Hossain, Kunal
    Jana, Susovan
    Mukherjee, Saswati
    Parekh, Ranjan
    [J]. 2017 IEEE CALCUTTA CONFERENCE (CALCON), 2017, : 95 - 99
  • [10] Smartphone application for medical images secured exchange based on encryption using the matrix product and the exclusive addition
    Boussif, Mohamed
    Aloui, Noureddine
    Cherif, Adnane
    [J]. IET IMAGE PROCESSING, 2017, 11 (11) : 1020 - 1026