“…They examined two different encryption algorithms and three different compression schemes and found Chaotic-LZW (Lempel-Ziv-Welch) to be the most efficient. In [18], Nadir et al presented an innovative procedure designed for embedding a ciphered electronic record for a patient by means of the Discrete Cosine Transform (DCT), where the medical image resultant is decomposed by means of the Discrete Wavelet Transform (DWT), then, the electronic record of the patient will be ciphered by means of the Elgamal cryptosystem, subsequently applying the Arnold map in order to increase the levels of unpredictability and randomness, which increase the system complexity. Recently, in 2022, ref.…”
Digital Signature using Self-Image signing is introduced in this paper. This technique is used to verify the integrity and originality of images transmitted over insecure channels. In order to protect the user’s medical images from changing or modifying, the images must be signed. The proposed approach uses the Discrete Wavelet Transform to subdivide a picture into four bands and the Discrete Cosine Transform DCT is used to embed a mark from each sub-band to another sub-band of DWT according to a determined algorithm. To increase the security, the marked image is then encrypted using Double Random Phase Encryption before transmission over the communication channel. By verifying the presence of the mark, the authority of the sender is verified at the receiver. Authorized users’ scores should, in theory, always be higher than illegal users’ scores. If this is the case, a single threshold might be used to distinguish between authorized and unauthorized users by separating the two sets of scores. The results are compared to those obtained using an approach that does not employ DWT.
“…They examined two different encryption algorithms and three different compression schemes and found Chaotic-LZW (Lempel-Ziv-Welch) to be the most efficient. In [18], Nadir et al presented an innovative procedure designed for embedding a ciphered electronic record for a patient by means of the Discrete Cosine Transform (DCT), where the medical image resultant is decomposed by means of the Discrete Wavelet Transform (DWT), then, the electronic record of the patient will be ciphered by means of the Elgamal cryptosystem, subsequently applying the Arnold map in order to increase the levels of unpredictability and randomness, which increase the system complexity. Recently, in 2022, ref.…”
Digital Signature using Self-Image signing is introduced in this paper. This technique is used to verify the integrity and originality of images transmitted over insecure channels. In order to protect the user’s medical images from changing or modifying, the images must be signed. The proposed approach uses the Discrete Wavelet Transform to subdivide a picture into four bands and the Discrete Cosine Transform DCT is used to embed a mark from each sub-band to another sub-band of DWT according to a determined algorithm. To increase the security, the marked image is then encrypted using Double Random Phase Encryption before transmission over the communication channel. By verifying the presence of the mark, the authority of the sender is verified at the receiver. Authorized users’ scores should, in theory, always be higher than illegal users’ scores. If this is the case, a single threshold might be used to distinguish between authorized and unauthorized users by separating the two sets of scores. The results are compared to those obtained using an approach that does not employ DWT.
“…After comparison, among the cryptographic algorithms, the ElGamal Encryption Algorithm is more compatible with the use of image encryption. Nouioua et al [22], Laiphrakpam et al [23], and Hashim et al [24] all proposed modifications to the ElGamal Encryption Algorithms and gave us some new ideas. However, the use of a single cryptographic algorithm to guarantee security creates the problem of an excessive volume of keys, which makes the transmission of keys and ciphertexts difficult, and there are shortcomings in this type of approach.…”
The scientific study of privacy-preserving biometrics, represented by the palmprint, face, and iris, has grown tremendously. That being said, there has not been much attention paid to the proper preservation, transmission, and authentication of biometric images used in everyday applications. In this paper, we propose a new complete model for encrypting and decrypting biometric images, including their signing and authentication, using a nested algorithm of 3D Arnold Transform. In addition, the ElGamal Encryption Algorithm for the encryption part and the ElGamal Digital Signature for the signature part are applied. The model is mainly based on the Arnold Transform and Public-Key Cryptosystem, which are convenient for key transfer and fully functional. Here, the model succeeds in encrypting and securing the authentication process for privacy-preserving biometric images. Various tests have been carried out to demonstrate the feasibility and security of the proposed model and have been compared with existing encryption methods to achieve better results. Moreover, the proposed model can also be extended to the storage, transmission, and authentication of biometric data for daily use.
“…In this sense, Cryptography provides symmetric and asymmetric schemes for protecting data before storing and transmitting it. For this reason, many robust cryptosystems have emerged to cipher images [2][3][4][5][6]. Furthermore, the study of hybrid algorithms has increased since the benefits of including the strengths of symmetric and asymmetric cryptosystems simultaneously.…”
Images with sensitive content require encryption for storage and transmission. Symmetric schemes can cipher them, while an asymmetric cryptosystem can distribute the secret key safely. For this reason, we propose a dynamic hybrid cryptosystem, which ciphers images and transfers its private keys. It has a symmetric algorithm that applies the Lorenz equations for generating different boxes and permutations in every encryption process and round. Since the secret key concatenates two private numbers, an asymmetric algorithm is included for its key distribution. The proposal uses the Diffie–Hellman protocol with ElGamal for obtaining a seed and building 128 strings. Then, the SHA-512 is applied in each of them a number of times associated with the secret key value in its blockchain representation. The resultant strings are concatenated to conform to the public key. Finally, the tests indicate that the cryptosystem resists differential, linear, algebraic, and brute-force attacks. Its cipher quality is high according to the entropy, correlation, DFT, NPCR, UACI, AC, texture analysis, and goodness of fit test. Additionally, occlusion, additive, multiplicative, and the proposed χ2 noise attacks are simulated on encrypted images. Finally, the sharpness loss is measured with the Similarity Parameter and improved with a filter 5 × 5.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.