Novel Hybrid Fusion-Based Technique for Securing Medical Images

Faculty Engineering Year: 2022
Type of Publication: ZU Hosted Pages:
Authors:
Journal: Electronics MDPI Volume:
Keywords : Novel Hybrid Fusion-Based Technique , Securing Medical    
Abstract:
The security of images has gained great interest in modern communication systems. This is due to the massive critical applications that are based on images. Medical imaging is at the top of these applications. However, the rising number of heterogenous attacks push toward the development of securing algorithms and methods for imaging systems. To this end, this work considers developing a novel authentication, intellectual property protection, ownership, and security technique for imaging systems, mainly for medical imaging. The developed algorithm includes two security modules for safeguarding various picture kinds. The first unit is accomplished by applying watermarking authentication in the frequency domain. The singular value decomposition (SVD) is performed for the host image’s discrete cosine transform (DCT) coefficients. The singular values (S) are divided into 64 × 64 non-overlapping blocks, followed by embedding the watermark in each block to be robust to any attack. The second unit is made up of two encryption layers to provide double-layer security to the watermarked image. The double random phase encryption (DRPE) and chaotic encryption have been tested and examined in the encryption unit. The suggested approach is resistant to common image processing attacks, including rotation, cropping, and adding Gaussian noise, according to the findings of the experiments. The encryption of watermarked images in the spatial and DCT domains and fused watermarked images in the DCT domain are all discussed. The transparency and security of the method are assessed using various measurements. The proposed approach achieves high-quality reconstructed watermarks and high security by using encryption to images and achieves robustness against any obstructive attacks. The developed hybrid algorithm recovers the watermark even in the presence of an attack with a correlation near 0.8.
   
     
 
       

Author Related Publications

  • AbdulHamid Ashraf Atiyah AbdalMuttalib, "Multilevel Hierarchical Clustering protocol for wireless sensor networks", The Sixth International Conference on Intelligent Computing and Information Systems (ICICIS 2013), Dec. 14-16, 2013, Cairo, Egypt, 2013 More
  • AbdulHamid Ashraf Atiyah AbdalMuttalib, "IoT-Based Reusable Medical Suit for Daily Life Use in the Era of COVID-19", Tech Science Press (TSP), 2021 More
  • AbdulHamid Ashraf Atiyah AbdalMuttalib, "Seamless handover scheme for MEC/SDN-based vehicular networks", MDPI, 2022 More
  • AbdulHamid Ashraf Atiyah AbdalMuttalib, "Distributed edge computing with blockchain technology to enable ultra-reliable low-latency V2X communications", MDPI, 2022 More
  • AbdulHamid Ashraf Atiyah AbdalMuttalib, "Drone-based AI/IoT Framework for Monitoring, Tracking and Fighting Pandemics", Tech Science Press (TSP), 2022 More

Department Related Publications

  • Abdelhamied Abdelmoniem Mohamed Shalan, "Design and Simulation of A single Feed Dual-Band U-Slot Patch Antenna", لايوجد, 1900 More
  • Abdelhamied Abdelmoniem Mohamed Shalan, "Wideband Overlappled Patches Microstrip Antennas", لايوجد, 1900 More
  • Abdelhamied Abdelmoniem Mohamed Shalan, " S. H. Zainud-Deen, M. N. I. Fahmy, and A. A. M. Shaalan, "On the Elimination of Backscattering from A Straight Wire Systems, Symposium on Antenna Technology and Applied Electromagnetics, ATEM, Canada, 1992", لايوجد, 1900 More
  • Mohamed Sharaf Ismail Sayed , "Low Complexity Contrast Enhancement Algorithm for Nighttime Visual Surveillance", International Conference on Intelligent Systems Design and Applications ISDA, 2010 More
  • Saleh Ibrahiem Saied Saleh, "ISI Tolerance of Cyclic Prefix Free Coherent Optical OFDM Communication systems", ITG, 2013 More
Tweet