The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2021 44th International Conference on Telecommunications and Signal Processing (TSP) 2021
DOI: 10.1109/tsp52935.2021.9522620
|View full text |Cite
|
Sign up to set email alerts
|

Medical Image Watermarking Scheme in Transform Domain based on Asymmetric crypto-system and Arnold Chaotic Map

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 16 publications
0
1
0
Order By: Relevance
“…They examined two different encryption algorithms and three different compression schemes and found Chaotic-LZW (Lempel-Ziv-Welch) to be the most efficient. In [18], Nadir et al presented an innovative procedure designed for embedding a ciphered electronic record for a patient by means of the Discrete Cosine Transform (DCT), where the medical image resultant is decomposed by means of the Discrete Wavelet Transform (DWT), then, the electronic record of the patient will be ciphered by means of the Elgamal cryptosystem, subsequently applying the Arnold map in order to increase the levels of unpredictability and randomness, which increase the system complexity. Recently, in 2022, ref.…”
Section: Related Workmentioning
confidence: 99%
“…They examined two different encryption algorithms and three different compression schemes and found Chaotic-LZW (Lempel-Ziv-Welch) to be the most efficient. In [18], Nadir et al presented an innovative procedure designed for embedding a ciphered electronic record for a patient by means of the Discrete Cosine Transform (DCT), where the medical image resultant is decomposed by means of the Discrete Wavelet Transform (DWT), then, the electronic record of the patient will be ciphered by means of the Elgamal cryptosystem, subsequently applying the Arnold map in order to increase the levels of unpredictability and randomness, which increase the system complexity. Recently, in 2022, ref.…”
Section: Related Workmentioning
confidence: 99%
“…After comparison, among the cryptographic algorithms, the ElGamal Encryption Algorithm is more compatible with the use of image encryption. Nouioua et al [22], Laiphrakpam et al [23], and Hashim et al [24] all proposed modifications to the ElGamal Encryption Algorithms and gave us some new ideas. However, the use of a single cryptographic algorithm to guarantee security creates the problem of an excessive volume of keys, which makes the transmission of keys and ciphertexts difficult, and there are shortcomings in this type of approach.…”
Section: Introductionmentioning
confidence: 99%
“…In this sense, Cryptography provides symmetric and asymmetric schemes for protecting data before storing and transmitting it. For this reason, many robust cryptosystems have emerged to cipher images [2][3][4][5][6]. Furthermore, the study of hybrid algorithms has increased since the benefits of including the strengths of symmetric and asymmetric cryptosystems simultaneously.…”
Section: Introductionmentioning
confidence: 99%