This paper presents a robust multi-stage security solution based on fusion,encryption,and watermarking processes to transmit color healthcare images,efficiently.The presented solution depends on the features of discre...This paper presents a robust multi-stage security solution based on fusion,encryption,and watermarking processes to transmit color healthcare images,efficiently.The presented solution depends on the features of discrete cosine transform(DCT),lifting wavelet transform(LWT),and singular value decomposition(SVD).The primary objective of this proposed solution is to ensure robustness for the color medical watermarked images against transmission attacks.During watermark embedding,the host color medical image is transformed into four sub-bands by employing three stages of LWT.The resulting low-frequency sub-band is then transformed by employing three stages of DCT followed by SVD operation.Furthermore,a fusion process is used for combining different watermarks into a single watermark image.This single fused image is then ciphered using Deoxyribose Nucleic Acid(DNA)encryption to strengthen the security.Then,the DNA-ciphered fused watermark is embedded in the host medical image by applying the suggested watermarking technique to obtain the watermarked image.The main contribution of this work is embedding multiple watermarks to prevent identity theft.In the presence of different multimedia attacks,several simulation tests on different colormedical images have been performed.The results prove that the proposed security solution achieves a decent imperceptibility quality with high Peak Signal-to-Noise Ratio(PSNR)values and high correlation between the extracted and original watermark images.Moreover,the watermark image extraction process succeeds in achieving high efficiency in the presence of attacks compared with related works.展开更多
A novel color image encryption algorithm based on dynamic deoxyribonucleic acid(DNA)encoding and chaos is presented.A three-neuron fractional-order discrete Hopfield neural network(FODHNN)is employed as a pseudo-rando...A novel color image encryption algorithm based on dynamic deoxyribonucleic acid(DNA)encoding and chaos is presented.A three-neuron fractional-order discrete Hopfield neural network(FODHNN)is employed as a pseudo-random chaotic sequence generator.Its initial value is obtained with the secret key generated by a fiveparameter external key and a hash code of the plain image.The external key includes both the FODHNN discrete step size and order.The hash is computed with the SHA-2 function.This ensures a large secret key space and improves the algorithm sensitivity to the plain image.Furthermore,a new three-dimensional projection confusion method is proposed to scramble the pixels among red,green,and blue color components.DNA encoding and diffusion are used to diffuse the image information.Pseudo-random sequences generated by FODHNN are employed to determine the encoding rules for each pixel and to ensure the diversity of the encoding methods.Finally,confusion II and XOR are used to ensure the security of the encryption.Experimental results and the security analysis show that the proposed algorithm has better performance than those reported in the literature and can resist typical attacks.展开更多
文摘This paper presents a robust multi-stage security solution based on fusion,encryption,and watermarking processes to transmit color healthcare images,efficiently.The presented solution depends on the features of discrete cosine transform(DCT),lifting wavelet transform(LWT),and singular value decomposition(SVD).The primary objective of this proposed solution is to ensure robustness for the color medical watermarked images against transmission attacks.During watermark embedding,the host color medical image is transformed into four sub-bands by employing three stages of LWT.The resulting low-frequency sub-band is then transformed by employing three stages of DCT followed by SVD operation.Furthermore,a fusion process is used for combining different watermarks into a single watermark image.This single fused image is then ciphered using Deoxyribose Nucleic Acid(DNA)encryption to strengthen the security.Then,the DNA-ciphered fused watermark is embedded in the host medical image by applying the suggested watermarking technique to obtain the watermarked image.The main contribution of this work is embedding multiple watermarks to prevent identity theft.In the presence of different multimedia attacks,several simulation tests on different colormedical images have been performed.The results prove that the proposed security solution achieves a decent imperceptibility quality with high Peak Signal-to-Noise Ratio(PSNR)values and high correlation between the extracted and original watermark images.Moreover,the watermark image extraction process succeeds in achieving high efficiency in the presence of attacks compared with related works.
基金Project supported by the National Natural Science Foundation of China(No.11971032)the Science and Technology Program of Guangzhou,China(No.201707010031)。
文摘A novel color image encryption algorithm based on dynamic deoxyribonucleic acid(DNA)encoding and chaos is presented.A three-neuron fractional-order discrete Hopfield neural network(FODHNN)is employed as a pseudo-random chaotic sequence generator.Its initial value is obtained with the secret key generated by a fiveparameter external key and a hash code of the plain image.The external key includes both the FODHNN discrete step size and order.The hash is computed with the SHA-2 function.This ensures a large secret key space and improves the algorithm sensitivity to the plain image.Furthermore,a new three-dimensional projection confusion method is proposed to scramble the pixels among red,green,and blue color components.DNA encoding and diffusion are used to diffuse the image information.Pseudo-random sequences generated by FODHNN are employed to determine the encoding rules for each pixel and to ensure the diversity of the encoding methods.Finally,confusion II and XOR are used to ensure the security of the encryption.Experimental results and the security analysis show that the proposed algorithm has better performance than those reported in the literature and can resist typical attacks.