<p>This paper introduces an effective image encryption approach that merges a chaotic map and polynomial with a block cipher. According to this scheme, there are three levels of encryption. In the first level, pixel positions of the image are scuffled into blocks randomly based on a chaotic map. In the second level, the polynomials are constructed by taking N unused pixels from the permuted blocks as polynomial coefficients. Finally, the third level a proposed secret-key block cipher called extended of tiny encryption algorithm (ETEA) is used. The proposed ETEA algorithm increased the block size from 64-bit to 256-bit by using F-function in type three Feistel network design. The key schedule generation is very straightforward through admixture the entire major subjects in the identical manner for every round. The proposed ETEA algorithm is word-oriented, where wholly internal operations are executed on words of 32 bits. So, it is possible to efficiently implement the proposed algorithm on smart cards. The results of the experimental demonstration that the proposed encryption algorithm for all methods are efficient and have high security features through statistical analysis using histograms, correlation, entropy, randomness tests, and the avalanche effect.</p>
In telemedicine, the medical data are shared and distributed between the whole world with different specialists and for many purposes through an unsafe medium. So protecting the medical data during the transmissions becomes an important issue. Many image secret sharing schemes with steganography have been proposed. Unfortunately, each of these schemes has one or more drawbacks. First, the large size of a stego images. Second, the visual quality of the stego images evaluated by the peak signal-to-noise ratio (PSNR) is degraded too much. To overcome such drawbacks, a new scheme based on secret sharing and IWT is proposed in this paper. The new scheme can optimize both the size of the stego images and its quality. The proposal scheme involves a dispersion of medical image into shadow images using Lin and Thien’s technique. The size of each shadow size is reduces to 1/k from the overall of the secret image size and k is the number of shadows. After that, the shadows are embedded in a host image by using Integer wavelet transform (IWT) technique. In the reconstruction the secret medical image is reconstruct by pooling at least k shadows The experimental results of the proposed algorithm are shown for many medical images the effectiveness of analyzed with the help of the peak signal-to-noise ratio and normalized correlation.
Biometric technique includes of uniquely identifying person based on their physical or behavioural characteristics. It is mainly used for authentication. Storing the template in the database is not a safe approach, because it can be stolen or be tampered with. Due to its importance the template needs to be protected. To treat this safety issue, the suggested system employed a method for securely storing the iris template in the database which is a merging approach for secret image sharing and hiding to enhance security and protect the privacy by decomposing the template into two independent host (public) iris images. The original template can be reconstructed only when both host images are available. Either host image does not expose the identity of the original biometric image. The security and privacy in biometrics-based authentication system is augmented by storing the data in the form of shadows at separated places instead of whole data at one. The proposed biometric recognition system includes iris segmentation algorithms, feature extraction algorithms, a (2, 2) secret sharing and hiding. The experimental results are conducted on standard colour UBIRIS v1 data set. The results indicate that the biometric template protection methods are capable of offering a solution for vulnerability that threatens the biometric template.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.