期刊文献+
共找到15篇文章
< 1 >
每页显示 20 50 100
Security in Wireless Mesh Neworks: Challenges and Solutions 被引量:3
1
作者 Yi Ping Xing Hongkai +1 位作者 Wu Yue Li Jianhua 《China Communications》 SCIE CSCD 2009年第3期134-143,共10页
Wireless mesh network is a new emerging field with its potential applications in extremely unpredictable and dynamic environments.However,it is particularly vulnerable due to its features of open medium,dynamic changi... Wireless mesh network is a new emerging field with its potential applications in extremely unpredictable and dynamic environments.However,it is particularly vulnerable due to its features of open medium,dynamic changing topology, cooperative routing algorithms.The article surveys the state of the art in security for wireless mesh networks.Firstly,we analyze various possible threats to security in wireless mesh networks.Secondly,we introduce some representative solutions to these threats,including solutions to the problems of key management,secure network routing,and intrusion detection.We also provide a comparison and discussion of their respective merits and drawbacks,and propose some improvements for these drawbacks.Finally,we also discuss the remaining challenges in the area. 展开更多
关键词 network security wireless mesh networks key management secure network routing intrusion detection
在线阅读 下载PDF
A Hybrid Security Framework for Medical Image Communication
2
作者 Walid El-Shafai Hayam A.Abd El-Hameed +3 位作者 Ashraf A.M.Khalaf Naglaa F.Soliman Amel A.Alhussan Fathi E.Abd El-Samie 《Computers, Materials & Continua》 SCIE EI 2022年第11期2713-2730,共18页
Authentication of the digital image has much attention for the digital revolution.Digital image authentication can be verified with image watermarking and image encryption schemes.These schemes are widely used to prot... Authentication of the digital image has much attention for the digital revolution.Digital image authentication can be verified with image watermarking and image encryption schemes.These schemes are widely used to protect images against forgery attacks,and they are useful for protecting copyright and rightful ownership.Depending on the desirable applications,several image encryption and watermarking schemes have been proposed to moderate this attention.This framework presents a new scheme that combines a Walsh Hadamard Transform(WHT)-based image watermarking scheme with an image encryption scheme based on Double Random Phase Encoding(DRPE).First,on the sender side,the secret medical image is encrypted using DRPE.Then the encrypted image is watermarking based on WHT.The combination between watermarking and encryption increases the security and robustness of transmitting an image.The performance evaluation of the proposed scheme is obtained by testing Structural Similarity Index(SSIM),Peak Signal-to-Noise Ratio(PSNR),Normalized cross-correlation(NC),and Feature Similarity Index(FSIM). 展开更多
关键词 Walsh hadamard transform WATERMARKING ENCRYPTION double random phase encoding structural similarity index
在线阅读 下载PDF
Hybrid of Distributed Cumulative Histograms and Classification Model for Attack Detection 被引量:1
3
作者 Mostafa Nassar Anas M.Ali +5 位作者 Walid El-Shafai Adel Saleeb Fathi E.Abd El-Samie Naglaa F.Soliman Hussah Nasser AlEisa Hossam Eldin H.Ahmed 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期2235-2247,共13页
Traditional security systems are exposed to many various attacks,which represents a major challenge for the spread of the Internet in the future.Innovative techniques have been suggested for detecting attacks using ma... Traditional security systems are exposed to many various attacks,which represents a major challenge for the spread of the Internet in the future.Innovative techniques have been suggested for detecting attacks using machine learning and deep learning.The significant advantage of deep learning is that it is highly efficient,but it needs a large training time with a lot of data.Therefore,in this paper,we present a new feature reduction strategy based on Distributed Cumulative Histograms(DCH)to distinguish between dataset features to locate the most effective features.Cumulative histograms assess the dataset instance patterns of the applied features to identify the most effective attributes that can significantly impact the classification results.Three different models for detecting attacks using Convolutional Neural Network(CNN)and Long Short-Term Memory Network(LSTM)are also proposed.The accuracy test of attack detection using the hybrid model was 98.96%on the UNSW-NP15 dataset.The proposed model is compared with wrapper-based and filter-based Feature Selection(FS)models.The proposed model reduced classification time and increased detection accuracy. 展开更多
关键词 Feature selection DCH LSTM CNN security systems
在线阅读 下载PDF
Cancelable Speaker Identification System Based on Optical-Like Encryption Algorithms 被引量:1
4
作者 Safaa El-Gazar Walid El-Shafai +4 位作者 Ghada El-Banby Hesham F.A.Hamed Gerges M.Salama Mohammed Abd-Elnaby Fathi E.Abd El-Samie 《Computer Systems Science & Engineering》 SCIE EI 2022年第10期87-102,共16页
Biometric authentication is a rapidly growing trend that is gaining increasing attention in the last decades.It achieves safe access to systems using biometrics instead of the traditional passwords.The utilization of ... Biometric authentication is a rapidly growing trend that is gaining increasing attention in the last decades.It achieves safe access to systems using biometrics instead of the traditional passwords.The utilization of a biometric in its original format makes it usable only once.Therefore,a cancelable biometric template should be used,so that it can be replaced when it is attacked.Cancelable biometrics aims to enhance the security and privacy of biometric authentication.Digital encryption is an efficient technique to be used in order to generate cancelable biometric templates.In this paper,a highly-secure encryption algorithm is proposed to ensure secure biometric data in verification systems.The considered biometric in this paper is the speech signal.The speech signal is transformed into its spectrogram.Then,the spectrogram is encrypted using two cascaded optical encryption algorithms.The first algorithm is the Optical Scanning Holography(OSH)for its efficiency as an encryption tool.The OSH encrypted spectrogram is encrypted using Double Random Phase Encoding(DRPE)by implementing two Random Phase Masks(RPMs).After the two cascaded optical encryption algorithms,the cancelable template is obtained.The verification is implemented through correlation estimation between enrolled and test templates in their encrypted format.If the correlation value is larger than a threshold value,the user is authorized.The threshold value can be determined from the genuine and imposter correlation distribution curves as the midpoint between the two curves.The implementation of optical encryption is adopted using its software rather than the optical setup.The efficiency of the proposed cancelable biometric algorithm is illustrated by the simulation results.It can improve the biometric data security without deteriorating the recognition accuracy.Simulation results give close-to-zero This values for the Equal Error Rate(EER)and close-to-one values for the Area under Receiver Operator Characteristic(AROC)curve. 展开更多
关键词 Cancelable biometrics SPECTROGRAM OSH DRPE EER AROC
在线阅读 下载PDF
Hyperspectral Images-Based Crop Classification Scheme for Agricultural Remote Sensing 被引量:1
5
作者 Imran Ali Zohaib Mushtaq +3 位作者 Saad Arif Abeer D.Algarni Naglaa F.Soliman Walid El-Shafai 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期303-319,共17页
Hyperspectral imaging is gaining a significant role in agricultural remote sensing applications.Its data unit is the hyperspectral cube which holds spatial information in two dimensions while spectral band information... Hyperspectral imaging is gaining a significant role in agricultural remote sensing applications.Its data unit is the hyperspectral cube which holds spatial information in two dimensions while spectral band information of each pixel in the third dimension.The classification accuracy of hyperspectral images(HSI)increases significantly by employing both spatial and spectral features.For this work,the data was acquired using an airborne hyperspectral imager system which collected HSI in the visible and near-infrared(VNIR)range of 400 to 1000 nm wavelength within 180 spectral bands.The dataset is collected for nine different crops on agricultural land with a spectral resolution of 3.3 nm wavelength for each pixel.The data was cleaned from geometric distortions and stored with the class labels and annotations of global localization using the inertial navigation system.In this study,a unique pixel-based approach was designed to improve the crops'classification accuracy by using the edge-preserving features(EPF)and principal component analysis(PCA)in conjunction.The preliminary processing generated the high-dimensional EPF stack by applying the edge-preserving filters on acquired HSI.In the second step,this high dimensional stack was treated with the PCA for dimensionality reduction without losing significant spectral information.The resultant feature space(PCA-EPF)demonstrated enhanced class separability for improved crop classification with reduced dimensionality and computational cost.The support vector machines classifier was employed for multiclass classification of target crops using PCA-EPF.The classification performance evaluation was measured in terms of individual class accuracy,overall accuracy,average accuracy,and Cohen kappa factor.The proposed scheme achieved greater than 90%results for all the performance evaluation metrics.The PCA-EPF proved to be an effective attribute for crop classification using hyperspectral imaging in the VNIR range.The proposed scheme is well-suited for practical applications of crops and landfill estimations using agricultural remote sensing methods. 展开更多
关键词 Hyperspectral imaging visible and near-infrared edge preserving feature dimensionality reduction crop classification
在线阅读 下载PDF
An Efficient Medical Image Deep Fusion Model Based on Convolutional Neural Networks 被引量:1
6
作者 Walid El-Shafai Noha A.El-Hag +5 位作者 Ahmed Sedik Ghada Elbanby Fathi E.Abd El-Samie Naglaa F.Soliman Hussah Nasser AlEisa Mohammed E.Abdel Samea 《Computers, Materials & Continua》 SCIE EI 2023年第2期2905-2925,共21页
Medical image fusion is considered the best method for obtaining one image with rich details for efficient medical diagnosis and therapy.Deep learning provides a high performance for several medical image analysis app... Medical image fusion is considered the best method for obtaining one image with rich details for efficient medical diagnosis and therapy.Deep learning provides a high performance for several medical image analysis applications.This paper proposes a deep learning model for the medical image fusion process.This model depends on Convolutional Neural Network(CNN).The basic idea of the proposed model is to extract features from both CT and MR images.Then,an additional process is executed on the extracted features.After that,the fused feature map is reconstructed to obtain the resulting fused image.Finally,the quality of the resulting fused image is enhanced by various enhancement techniques such as Histogram Matching(HM),Histogram Equalization(HE),fuzzy technique,fuzzy type,and Contrast Limited Histogram Equalization(CLAHE).The performance of the proposed fusion-based CNN model is measured by various metrics of the fusion and enhancement quality.Different realistic datasets of different modalities and diseases are tested and implemented.Also,real datasets are tested in the simulation analysis. 展开更多
关键词 Image fusion CNN deep learning feature extraction evaluation metrics medical diagnosis
在线阅读 下载PDF
Efficient Segmentation Approach for Different Medical Image Modalities
7
作者 Walid El-Shafai Amira A.Mahmoud +6 位作者 El-Sayed M.El-Rabaie Taha E.Taha Osama F.Zahran Adel S.El-Fishawy Naglaa F.Soliman Amel A.Alhussan Fathi E.Abd El-Samie 《Computers, Materials & Continua》 SCIE EI 2022年第11期3119-3135,共17页
This paper presents a study of the segmentation of medical images.The paper provides a solid introduction to image enhancement along with image segmentation fundamentals.In the first step,the morphological operations ... This paper presents a study of the segmentation of medical images.The paper provides a solid introduction to image enhancement along with image segmentation fundamentals.In the first step,the morphological operations are employed to ensure image detail protection and noise-immunity.The objective of using morphological operations is to remove the defects in the texture of the image.Secondly,the Fuzzy C-Means(FCM)clustering algorithm is used to modify membership function based only on the spatial neighbors instead of the distance between pixels within local spatial neighbors and cluster centers.The proposed technique is very simple to implement and significantly fast since it is not necessary to compute the distance between the neighboring pixels and the cluster centers.It is also efficient when dealing with noisy images because of its ability to efficiently improve the membership partition matrix.Simulation results are performed on different medical image modalities.Ultrasonic(Us),X-ray(Mammogram),Computed Tomography(CT),Positron Emission Tomography(PET),and Magnetic Resonance(MR)images are the main medical image modalities used in this work.The obtained results illustrate that the proposed technique can achieve good results with a short time and efficient image segmentation.Simulation results on different image modalities show that the proposed technique can achieve segmentation accuracies of 98.83%,99.71%,99.83%,99.85%,and 99.74%for Us,Mammogram,CT,PET,and MRI images,respectively. 展开更多
关键词 Image segmentation ULTRASONIC MAMMOGRAM CT PET MRI morphological operations FCM active contours
在线阅读 下载PDF
Hybrid Segmentation Approach for Different Medical Image Modalities
8
作者 Walid El-Shafai Amira A.Mahmoud +6 位作者 El-Sayed M.El-Rabaie Taha E.Taha Osama F.Zahran Adel S.El-Fishawy Naglaa F.Soliman Amel A.Alhussan Fathi E.Abd El-Samie 《Computers, Materials & Continua》 SCIE EI 2022年第11期3454-3471,共18页
The segmentation process requires separating the image region into sub-regions of similar properties.Each sub-region has a group of pixels having the same characteristics,such as texture or intensity.This paper sugges... The segmentation process requires separating the image region into sub-regions of similar properties.Each sub-region has a group of pixels having the same characteristics,such as texture or intensity.This paper suggests an efficient hybrid segmentation approach for different medical image modalities based on particle swarm optimization(PSO)and improved fast fuzzy C-means clustering(IFFCM)algorithms.An extensive comparative study on different medical images is presented between the proposed approach and other different previous segmentation techniques.The existing medical image segmentation techniques incorporate clustering,thresholding,graph-based,edge-based,active contour,region-based,and watershed algorithms.This paper extensively analyzes and summarizes the comparative investigation of these techniques.Finally,a prediction of the improvement involves the combination of these techniques is suggested.The obtained results demonstrate that the proposed hybrid medical image segmentation approach provides superior outcomes in terms of the examined evaluation metrics compared to the preceding segmentation techniques. 展开更多
关键词 Image segmentation ultrasonic images X-ray images CT images PET images MR images fuzzy c-mean morphological operations active contour
在线阅读 下载PDF
Deep CNN Model for Multimodal Medical Image Denoising
9
作者 Walid El-Shafai Amira A.Mahmoud +7 位作者 Anas M.Ali El-Sayed M.El-Rabaie Taha E.Taha Osama F.Zahran Adel S.El-Fishawy Naglaa F.Soliman Amel A.Alhussan Fathi E.Abd El-Samie 《Computers, Materials & Continua》 SCIE EI 2022年第11期3795-3814,共20页
In the literature,numerous techniques have been employed to decrease noise in medical image modalities,including X-Ray(XR),Ultrasonic(Us),Computed Tomography(CT),Magnetic Resonance Imaging(MRI),and Positron Emission T... In the literature,numerous techniques have been employed to decrease noise in medical image modalities,including X-Ray(XR),Ultrasonic(Us),Computed Tomography(CT),Magnetic Resonance Imaging(MRI),and Positron Emission Tomography(PET).These techniques are organized into two main classes:the Multiple Image(MI)and the Single Image(SI)techniques.In the MI techniques,images usually obtained for the same area scanned from different points of view are used.A single image is used in the entire procedure in the SI techniques.SI denoising techniques can be carried out both in a transform or spatial domain.This paper is concerned with single-image noise reduction techniques because we deal with single medical images.The most well-known spatial domain noise reduction techniques,including Gaussian filter,Kuan filter,Frost filter,Lee filter,Gabor filter,Median filter,Homomorphic filter,Speckle reducing anisotropic diffusion(SRAD),Nonlocal-Means(NL-Means),and Total Variation(TV),are studied.Also,the transform domain noise reduction techniques,including wavelet-based and Curvelet-based techniques,and some hybridization techniques are investigated.Finally,a deep(Convolutional Neural Network)CNN-based denoising model is proposed to eliminate Gaussian and Speckle noises in different medical image modalities.This model utilizes the Batch Normalization(BN)and the ReLU as a basic structure.As a result,it attained a considerable improvement over the traditional techniques.The previously mentioned techniques are evaluated and compared by calculating qualitative visual inspection and quantitative parameters like Peak Signal-to-Noise Ratio(PSNR),Correlation Coefficient(Cr),and system complexity to determine the optimum denoising algorithm to be applied universally.Based on the quality metrics,it is demonstrated that the proposed deep CNN-based denoising model is efficient and has superior denoising performance over the traditionaldenoising techniques. 展开更多
关键词 Image enhancement medical imaging speckle noise Gaussian noise denoising filters CNN denoising
在线阅读 下载PDF
Emotion Recognition from Occluded Facial Images Using Deep Ensemble Model
10
作者 Zia Ullah Muhammad Ismail Mohmand +5 位作者 Sadaqat ur Rehman Muhammad Zubair Maha Driss Wadii Boulila Rayan Sheikh Ibrahim Alwawi 《Computers, Materials & Continua》 SCIE EI 2022年第12期4465-4487,共23页
Facial expression recognition has been a hot topic for decades,but high intraclass variation makes it challenging.To overcome intraclass variation for visual recognition,we introduce a novel fusion methodology,in whic... Facial expression recognition has been a hot topic for decades,but high intraclass variation makes it challenging.To overcome intraclass variation for visual recognition,we introduce a novel fusion methodology,in which the proposed model first extract features followed by feature fusion.Specifically,RestNet-50,VGG-19,and Inception-V3 is used to ensure feature learning followed by feature fusion.Finally,the three feature extraction models are utilized using Ensemble Learning techniques for final expression classification.The representation learnt by the proposed methodology is robust to occlusions and pose variations and offers promising accuracy.To evaluate the efficiency of the proposed model,we use two wild benchmark datasets Real-world Affective Faces Database(RAF-DB)and AffectNet for facial expression recognition.The proposed model classifies the emotions into seven different categories namely:happiness,anger,fear,disgust,sadness,surprise,and neutral.Furthermore,the performance of the proposed model is also compared with other algorithms focusing on the analysis of computational cost,convergence and accuracy based on a standard problem specific to classification applications. 展开更多
关键词 Ensemble learning emotion recognition feature fusion OCCLUSION
在线阅读 下载PDF
Securing Healthcare Data in IoMT Network Using Enhanced Chaos Based Substitution and Diffusion
11
作者 Musheer Ahmad Reem Ibrahim Alkanhel +3 位作者 Naglaa FSoliman Abeer D.Algarni Fathi E.Abd El-Samie Walid El-Shafai 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2361-2380,共20页
Patient privacy and data protection have been crucial concerns in Ehealthcare systems for many years.In modern-day applications,patient data usually holds clinical imagery,records,and other medical details.Lately,the ... Patient privacy and data protection have been crucial concerns in Ehealthcare systems for many years.In modern-day applications,patient data usually holds clinical imagery,records,and other medical details.Lately,the Internet of Medical Things(IoMT),equipped with cloud computing,has come out to be a beneficial paradigm in the healthcare field.However,the openness of networks and systems leads to security threats and illegal access.Therefore,reliable,fast,and robust security methods need to be developed to ensure the safe exchange of healthcare data generated from various image sensing and other IoMT-driven devices in the IoMT network.This paper presents an image protection scheme for healthcare applications to protect patients’medical image data exchanged in IoMT networks.The proposed security scheme depends on an enhanced 2D discrete chaotic map and allows dynamic substitution based on an optimized highly-nonlinear S-box and diffusion to gain an excellent security performance.The optimized S-box has an excellent nonlinearity score of 112.The new image protection scheme is efficient enough to exhibit correlation values less than 0.0022,entropy values higher than 7.999,and NPCR values around 99.6%.To reveal the efficacy of the scheme,several comparison studies are presented.These comparison studies reveal that the novel protection scheme is robust,efficient,and capable of securing healthcare imagery in IoMT systems. 展开更多
关键词 Secure communication healthcare data encryption Internet of Medical Things(IoMT) discrete chaotic map substitution box(S-box)
在线阅读 下载PDF
An Immutable Framework for Smart Healthcare Using Blockchain Technology
12
作者 Faneela Muazzam A.Khan +3 位作者 Suliman A.Alsuhibany Walid El-Shafai Mujeeb Ur Rehman Jawad Ahmad 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期165-179,共15页
The advancements in sensing technologies,information processing,and communication schemes have revolutionized the healthcare sector.Electronic Healthcare Records(EHR)facilitate the patients,doctors,hospitals,and other... The advancements in sensing technologies,information processing,and communication schemes have revolutionized the healthcare sector.Electronic Healthcare Records(EHR)facilitate the patients,doctors,hospitals,and other stakeholders to maintain valuable data and medical records.The traditional EHRs are based on cloud-based architectures and are susceptible to multiple cyberattacks.A single attempt of a successful Denial of Service(DoS)attack can compromise the complete healthcare system.This article introduces a secure and immutable blockchain-based framework for the Internet of Medical Things(IoMT)to address the stated challenges.The proposed architecture is on the idea of a lightweight private blockchain-based network that facilitates the users and hospitals to perform multiple healthcare-related operations in a secure and trustworthy manner.The efficacy of the proposed framework is evaluated in the context of service execution time and throughput.The experimental outcomes indicate that the proposed design attained lower service execution time and higher throughput under different control parameters. 展开更多
关键词 Blockchain technology healthcare applications cybersecurity services IoMT DOS EHR
在线阅读 下载PDF
Optical Ciphering Scheme for Cancellable Speaker Identification System
13
作者 Walid El-Shafai Marwa A.Elsayed +5 位作者 Mohsen A.Rashwan Moawad I.Dessouky Adel S.El-Fishawy Naglaa F.Soliman Amel A.Alhussan Fathi EAbd El-Samie 《Computer Systems Science & Engineering》 SCIE EI 2023年第4期563-578,共16页
Most current security and authentication systems are based on personal biometrics.The security problem is a major issue in the field of biometric systems.This is due to the use in databases of the original biometrics.... Most current security and authentication systems are based on personal biometrics.The security problem is a major issue in the field of biometric systems.This is due to the use in databases of the original biometrics.Then biometrics will forever be lost if these databases are attacked.Protecting privacy is the most important goal of cancelable biometrics.In order to protect privacy,therefore,cancelable biometrics should be non-invertible in such a way that no information can be inverted from the cancelable biometric templates stored in personal identification/verification databases.One methodology to achieve non-invertibility is the employment of non-invertible transforms.This work suggests an encryption process for cancellable speaker identification using a hybrid encryption system.This system includes the 3D Jigsaw transforms and Fractional Fourier Transform(FrFT).The proposed scheme is compared with the optical Double Random Phase Encoding(DRPE)encryption process.The evaluation of simulation results of cancellable biometrics shows that the algorithm proposed is secure,authoritative,and feasible.The encryption and cancelability effects are good and reveal good performance.Also,it introduces recommended security and robustness levels for its utilization for achieving efficient cancellable biometrics systems. 展开更多
关键词 Cancellable biometrics jigsaw transform FrFT DRPE speaker identification
在线阅读 下载PDF
Efficient Hardware Design of a Secure Cancellable Biometric Cryptosystem
14
作者 Lamiaa A.Abou Elazm Walid El-Shafai +6 位作者 Sameh Ibrahim Mohamed G.Egila H.Shawkey Mohamed K.H.Elsaid Naglaa F.Soliman Hussah Nasser AlEisa Fathi E.Abd El-Samie 《Intelligent Automation & Soft Computing》 SCIE 2023年第4期929-955,共27页
Biometric security is a growing trend,as it supports the authentication of persons using confidential biometric data.Most of the transmitted data in multi-media systems are susceptible to attacks,which affect the secur... Biometric security is a growing trend,as it supports the authentication of persons using confidential biometric data.Most of the transmitted data in multi-media systems are susceptible to attacks,which affect the security of these sys-tems.Biometric systems provide sufficient protection and privacy for users.The recently-introduced cancellable biometric recognition systems have not been investigated in the presence of different types of attacks.In addition,they have not been studied on different and large biometric datasets.Another point that deserves consideration is the hardware implementation of cancellable biometric recognition systems.This paper presents a suggested hybrid cancellable biometric recognition system based on a 3D chaotic cryptosystem.The rationale behind the utilization of the 3D chaotic cryptosystem is to guarantee strong encryption of biometric templates,and hence enhance the security and privacy of users.The suggested cryptosystem adds significant permutation and diffusion to the encrypted biometric templates.We introduce some sort of attack analysis in this paper to prove the robustness of the proposed cryptosystem against attacks.In addition,a Field Programmable Gate Array(FPGA)implementation of the pro-posed system is introduced.The obtained results with the proposed cryptosystem are compared with those of the traditional encryption schemes,such as Double Random Phase Encoding(DRPE)to reveal superiority,and hence high recogni-tion performance of the proposed cancellable biometric recognition system.The obtained results prove that the proposed cryptosystem enhances the security and leads to better efficiency of the cancellable biometric recognition system in the presence of different types of attacks. 展开更多
关键词 Information security cancellable biometric recognition systems CRYPTANALYSIS 3D chaotic map ENCRYPTION FPGA
在线阅读 下载PDF
Proposed Privacy Preservation Technique for Color Medical Images
15
作者 Walid El-Shafai Hayam A.Abd El-Hameed +4 位作者 Noha A.El-Hag Ashraf A.M.Khalaf Naglaa F.Soliman Hussah Nasser AlEisa Fathi E.Abd El-Samie 《Intelligent Automation & Soft Computing》 SCIE 2023年第4期719-732,共14页
Nowadays,the security of images or information is very important.This paper introduces a proposed hybrid watermarking and encryption technique for increasing medical image security.First,the secret medical image is en... Nowadays,the security of images or information is very important.This paper introduces a proposed hybrid watermarking and encryption technique for increasing medical image security.First,the secret medical image is encrypted using Advanced Encryption Standard(AES)algorithm.Then,the secret report of the patient is embedded into the encrypted secret medical image with the Least Significant Bit(LSB)watermarking algorithm.After that,the encrypted secret medical image with the secret report is concealed in a cover medical image,using Kekre’s Median Codebook Generation(KMCG)algorithm.Afterwards,the stego-image obtained is split into 16 parts.Finally,it is sent to the receiver.We adopt this strategy to send the secret medical image and report over a network securely.The proposed technique is assessed with different encryption quality metrics including Peak Signal-to-Noise Ratio(PSNR),Correlation Coefficient(Cr),Fea-ture Similarity Index Metric(FSIM),and Structural Similarity Index Metric(SSIM).Histogram estimation is used to confirm the matching between the secret medical image before and after transmission.Simulation results demonstrate that the proposed technique achieves good performance with high quality of the received medical image and clear image details in a very short processing time. 展开更多
关键词 LSB steganography AES algorithm KMCG algorithm
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部