| Literature DB >> 35455201 |
Hanaa A Abdallah1, Dalia H ElKamchouchi1.
Abstract
Digital Signature using Self-Image signing is introduced in this paper. This technique is used to verify the integrity and originality of images transmitted over insecure channels. In order to protect the user's medical images from changing or modifying, the images must be signed. The proposed approach uses the Discrete Wavelet Transform to subdivide a picture into four bands and the Discrete Cosine Transform DCT is used to embed a mark from each sub-band to another sub-band of DWT according to a determined algorithm. To increase the security, the marked image is then encrypted using Double Random Phase Encryption before transmission over the communication channel. By verifying the presence of the mark, the authority of the sender is verified at the receiver. Authorized users' scores should, in theory, always be higher than illegal users' scores. If this is the case, a single threshold might be used to distinguish between authorized and unauthorized users by separating the two sets of scores. The results are compared to those obtained using an approach that does not employ DWT.Entities:
Keywords: authentication; digital signature; discrete cosine transform; discrete wavelet transform; double-random-phase encryption; encryption
Year: 2022 PMID: 35455201 PMCID: PMC9025103 DOI: 10.3390/e24040538
Source DB: PubMed Journal: Entropy (Basel) ISSN: 1099-4300 Impact factor: 2.524
Figure 1First-level discrete wavelet decomposition using filtering approach.
Figure 2Signing process.
Figure 3Verification process.
Results of marking and encrypting a medical image.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
The effect of AWGN noise on DRPE-encrypted images.
| AWGN (SNR) | Correlation between Extracted blocks and Original Blocks |
|---|---|
|
|
|
|
| |
|
| |
|
| |
|
|
|
|
| |
|
| |
|
| |
|
|
|
|
| |
|
| |
|
| |
|
|
|
|
| |
|
| |
|
| |
|
|
|
|
| |
|
| |
|
|
Correlation between the original image and the marked image.
| Original Image | Original Image with No Mark | Correlation between Extracted Blocks and Original Blocks in Image with No Mark |
|---|---|---|
|
|
|
|
Figure 4Block-based correlation.
Horizontal correlation between the original image and the encrypted image.
| Original Image | Original Image with Mark |
|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Comparative study with other techniques.
| Gaussian Noise | CR (Correlation) | |||
|---|---|---|---|---|
| Proposed Scheme | [ | [ | [ | |
| Gaussian noise 0.5 | 0.75 | 0.63 | 0.58 | 0.28 |
Comparative study with other techniques of marking [26].
| Correlation (cr) | |||||||||
|---|---|---|---|---|---|---|---|---|---|
| DWT | SVD | DWT Based SVD | DT-CWT Based SVD | ||||||
| cr1 | cr2 | cr1 | cr1 | cr2 | cr1 | cr2 | cr3 | cr4 | |
| No attack | 0.95 | 0.96 | 0.99 | 0.99 | 0.98 | 0.9996 | 0.9996 | 0.9996 | 0.9997 |
| Rotation angel | |||||||||
| −90 | 0.09 | 0.1 | 0.99 | 0.34 | 0.25 | 0.8253 | 0.9551 | 0.8527 | 0.9763 |
| −1 | 0.12 | 0.1 | 0.44 | 0.65 | 0.71 | 0.9655 | 0.9340 | 0.9898 | 0.9655 |
| Noise variance | |||||||||
| 0.1 | 0.05 | 0.06 | 0.04 | 0.13 | 0.18 | 0.3129 | 0.3353 | 0.3613 | 0.3926 |
| 0.5 | 0.03 | 0.04 | 0.002 | 0.1 | 0.14 | 0.2242 | 0.2393 | 0.2486 | 0.2703 |
| Resizing ratio | |||||||||
| 0.7 | 0.21 | 0.22 | 0.74 | 0.72 | 0.9 | 0.9766 | 0.9740 | 0.9866 | 0.9896 |
| 0.9 | 0.35 | 0.35 | 0.95 | 0.94 | 0.97 | 0.9873 | 0.9956 | 0.9960 | 0.9973 |
| Compression quality | |||||||||
| 10% | 0.3 | 0.26 | 0.81 | 0.97 | 0.97 | 0.9875 | 0.9906 | 0.9931 | 0.9937 |
| 30% | 0.55 | 0.48 | 0.93 | 0.97 | 0.98 | 0.9992 | 0.9978 | 0.9991 | 0.9985 |
| Cropping ratio | |||||||||
| 512–300 | 0.23 | 0.16 | −0.73 | 0.38 | 0.22 | 0.7600 | 0.6567 | 0.87 | 0.7719 |
| 512–100 | 0.19 | 0.13 | −0.87 | 0.21 | 0.09 | 0.6317 | 0.5882 | 0.6970 | 0.7139 |
Figure 5PTD and PFD using digital signature (a) PTD and (b) PFD.