On the Security of Zhou et al.'s Authentication and Integrity Scheme for Digital Mammography Images

被引:0
|
作者
Goh, A. W. T. [1 ]
Razali, E. [1 ]
Phan, R. C. W. [2 ]
Wong, M. L. D. [1 ]
机构
[1] Swinburne Univ Technol, Informat Secur Res Lab, Sarawak, Malaysia
[2] Ecole Polytech Fed Lausanne, Secur & Cryptog Lab, Lausanne, Switzerland
关键词
Authentication; integrity; watermarking; security and multimedia protection; telemammography;
D O I
暂无
中图分类号
R318 [生物医学工程];
学科分类号
0831 ;
摘要
The security of an authentication and integrity scheme for digital mammography images is a critical issue to ensure patients' privacy are protected. In [1], Zhou et al claimed that their scheme is effective in a telemammography environment. After careful reviewing, we outline five weaknesses of the proposed scheme that could lead to a possible threat of the application during practical implementations. These flaws mainly lie in the cryptographic primitives used. We also recommend viable countermeasures and propose better cryptographic primitives for the improvements of the scheme.
引用
收藏
页码:871 / +
页数:2
相关论文
共 50 条
  • [1] Cryptoanalysis on Zhou et al.s' User Authentication Scheme
    Chou, Jue-Sam
    Hou, Xian-Wu
    Chen, Yalin
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (8B): : 112 - 115
  • [2] Security of Shen et al.'s timestamp-based password authentication scheme
    Yoon, EJ
    Ryu, EK
    Yoo, KY
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 4, 2004, 3046 : 665 - 671
  • [3] Security Issues of Chen et al.'s Dynamic ID-based Authentication Scheme
    Khan, Muhammad Khurram
    Kumari, Saru
    Wang, Xiaomin
    Kumar, Rahul
    [J]. 2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM), 2014, : 125 - +
  • [4] Security of Chien et al.'s remote user authentication scheme using smart cards
    Hsu, CL
    [J]. COMPUTER STANDARDS & INTERFACES, 2004, 26 (03) : 167 - 169
  • [5] Drawbacks of Liao et al.'s password authentication scheme
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. INTERNATIONAL CONFERENCE ON NEXT GENERATION WEB SERVICES PRACTICES, PROCEEDINGS, 2006, : 101 - +
  • [6] The Weakness of Moon et al.'s Password Authentication Scheme
    Irawan, Bam-bang
    Hwang, Min-shiang
    [J]. 3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2018), 2018, 1069
  • [7] Security improvement on Chien et al.'s remote user authentication scheme using smart cards
    Duan, Xiaoyi
    Liu, JianWei
    Zhang, Qishan
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1133 - 1135
  • [8] Zhou et al. reply
    Zhifeng Zhou
    Guanshan Zhu
    Ahmad R. Hariri
    Mary-Anne Enoch
    David Scott
    Rajita Sinha
    Matti Virkkunen
    Deborah C. Mash
    Robert H. Lipsky
    Xian-Zhang Hu
    Colin A. Hodgkinson
    Ke Xu
    Beata Buzas
    Qiaoping Yuan
    Pei-Hong Shen
    Robert E. Ferrell
    Stephen B. Manuck
    Sarah M. Brown
    Richard L. Hauger
    Christian S. Stohler
    Jon-Kar Zubieta
    David Goldman
    [J]. Nature, 2009, 458 (7238) : E7 - E7
  • [10] Zhou et al. reply
    Kaixin Zhou
    Celine Bellenguez
    Calum Sutherland
    Grahame Hardie
    Colin Palmer
    Peter Donnelly
    Ewan Pearson
    [J]. Nature Genetics, 2012, 44 (4) : 361 - 362