2022
DOI: 10.3390/e24040538
|View full text |Cite
|
Sign up to set email alerts
|

Signing and Verifying Encrypted Medical Images Using Double Random Phase Encryption

Abstract: Digital Signature using Self-Image signing is introduced in this paper. This technique is used to verify the integrity and originality of images transmitted over insecure channels. In order to protect the user’s medical images from changing or modifying, the images must be signed. The proposed approach uses the Discrete Wavelet Transform to subdivide a picture into four bands and the Discrete Cosine Transform DCT is used to embed a mark from each sub-band to another sub-band of DWT according to a determined al… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…2 of 20 parallel environment; [11][12][13] developed algorithms based on the digital signature and ElGamal, they only mention some attacks that can intervene, without applying any of these, such as the discrete logarithm problem, when a cryptosystem is used, in a nutshell, they do not mention the procedures that try to know the value of the private key when the public key is known. In DSAπ the randomness of the signature is evaluated according to the following parameters: correlation coefficient, entropy, discrete Fourier transform, and the goodness-of-fit test; However, in other research, sometimes entropy is used, on occasions the correlation coefficient is used, and not often none of them [14][15][16][17]. It is important to note that two characteristics that make the proposal of this research different from others are the following: the number π and a substitution box (S-box 8× 8) [18,19].…”
Section: Introductionmentioning
confidence: 99%
“…2 of 20 parallel environment; [11][12][13] developed algorithms based on the digital signature and ElGamal, they only mention some attacks that can intervene, without applying any of these, such as the discrete logarithm problem, when a cryptosystem is used, in a nutshell, they do not mention the procedures that try to know the value of the private key when the public key is known. In DSAπ the randomness of the signature is evaluated according to the following parameters: correlation coefficient, entropy, discrete Fourier transform, and the goodness-of-fit test; However, in other research, sometimes entropy is used, on occasions the correlation coefficient is used, and not often none of them [14][15][16][17]. It is important to note that two characteristics that make the proposal of this research different from others are the following: the number π and a substitution box (S-box 8× 8) [18,19].…”
Section: Introductionmentioning
confidence: 99%
“…For obvious reasons medical images are private to the patient and authorized medical personnel and should be protected from unauthorized viewers. One method to protect such images is using cryptography including traditional symmetric cryptosystems and biometrics [ 19 , 20 , 21 ]. Digital content, in particular this related to medical images, is more and more often protected by a combination of tools, such as encryption and watermarking.…”
Section: Introductionmentioning
confidence: 99%