scholarly journals Security Analysis of Medical Images using ECC over RSA

2021 ◽  
Vol 23 (05) ◽  
pp. 356-367
Author(s):  
Usha Verma ◽  
◽  
Neelam Sharma ◽  

The security of medical images is very important to maintain the confidentiality and privacy of patient information. Medical practitioners are required to adopt policies for the security of the access of patient’s electronic information. This paper provides the security analysis of the Medical Images based on Elliptic curve cryptography. Elliptic curve cryptography (ECC) is a complex method and involves intense computation which makes it robust for the intruder attack. In this paper, ECC based Medical Image Encryption algorithm is performed on varieties of medical images like MRI, CT scan and X-ray. Security analysis is presented based on Histogram, Entropy, NPCR and UACI measures and compared with traditional method RSA. Histogram after encryption using ECC has uniform distribution which reflects that the information of original medical image is hidden properly. Entropy and NPCR achieved are 7.86 – 7.99 and 99.62 – 99.64 % respectively which are very close to their ideal values. Results reveal that ECC is more powerful and useful for medical image authentication and key distribution. However, it can be used for exchange of secret key rather than encryption.

2021 ◽  
Vol 10 (11) ◽  
pp. 3439-3447
Author(s):  
T. J. Wong ◽  
L. F. Koo ◽  
F. H. Naning ◽  
A. F. N. Rasedee ◽  
M. M. Magiman ◽  
...  

The public key cryptosystem is fundamental in safeguard communication in cyberspace. This paper described a new cryptosystem analogous to El-Gamal encryption scheme, which utilizing the Lucas sequence and Elliptic Curve. Similar to Elliptic Curve Cryptography (ECC) and Rivest-Shamir-Adleman (RSA), the proposed cryptosystem requires a precise hard mathematical problem as the essential part of security strength. The chosen plaintext attack (CPA) was employed to investigate the security of this cryptosystem. The result shows that the system is vulnerable against the CPA when the sender decrypts a plaintext with modified public key, where the cryptanalyst able to break the security of the proposed cryptosystem by recovering the plaintext even without knowing the secret key from either the sender or receiver.


2012 ◽  
Vol 4 (3) ◽  
pp. 106-123 ◽  
Author(s):  
Mohammed A. Mahdi ◽  
Mohamed M. Abd-Eld ◽  
Salwa S. Elgamal ◽  
Tat-Chee Wan

2017 ◽  
Vol 41 (9) ◽  
Author(s):  
Rohit Thanki ◽  
Surekha Borra ◽  
Vedvyas Dwivedi ◽  
Komal Borisagar

he proposed paper work is implemented using Stationary Wavelet Transformation (SWT) with Singular Value Decomposition (SVD).Even though, there are many other transformations, the Stationary Wavelet Transformation method is chosen for its shift invariance property. The designed method has three steps; the first step is the decomposing of the Medical image into sub-bands using SWT to find the value of sub band and as a second step is to apply SVD, third step will combine both the images with scaling factor. The experiments were conducted over gray scale of MRI and CT Medical images. The statistics of proposed method indicates that imperceptibility of Watermarked Medical images have a Peak Signal to Noise Ratio (PSNR) value of 50 DB for medical images. The robustness is ensured by having Correlation Coefficient (CC) of 1 for the retrieved watermark images. Security for the watermark is extended by encrypting the watermark with chaotic sequence.


Sign in / Sign up

Export Citation Format

Share Document