Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Research Article
Authors: Reyad, Omara; b; * | Hamed, Kadryc; d | Karar, Mohamed Esmaila; e
Affiliations: [a] College of Computing and Information Technology, Shaqra University, Saudi Arabia | [b] Faculty of Science, Sohag University, Egypt | [c] College of Sciences and Humanities, Shaqra University, Afif, Saudi Arabia | [d] Faculty of Computers and Information, Minia University, Egypt | [e] Faculty of Electronic Engineering, Menoufia University, Egypt
Correspondence: [*] Corresponding author. Omar Reyad. E-mail: [email protected].
Abstract: Bit-string generator (BSG) is based on the hardness of known number theoretical problems, such as the discrete logarithm problem with the elliptic curve (ECDLP). Such type of generators will have good randomness and unpredictability properties as it is challenged to find a solution regarding this mathematical dilemma. Hash functions in turn play a remarkable role in many cryptographic tasks to accomplish different security levels. Hash-enhanced elliptic curve bit-string generator (HEECBSG) mechanism is proposed in this study based on the ECDLP and secure hash function. The cryptographic hash function is used to achieve integrity and security of the obtained bit-strings for highly sensitive plain data. The main contribution of the proposed HEECBSG is transforming the x-coordinate of the elliptic curve points using a hash function H to generate bit-strings of any desirable length. The obtained pseudo-random bits are tested by the NIST test suite to analyze and verify its statistical and randomness properties. The resulted bit-string is utilized here for encrypting various medical images of the vital organs, i.e. the brain, bone, fetuses, and lungs. Then, extensive evaluation metrics have been applied to analyze the successful performance of the cipherimage, including key-space analysis, histogram analysis, correlation analysis, entropy analysis and sensitivity analysis. The results demonstrated that our proposed HEECBSG mechanism is feasible for achieving security and privacy purposes of the medical image transmission over unsecure communication networks.
Keywords: Elliptic curve cryptography, hash function, bit-string generator, medical image encryption, security analysis
DOI: 10.3233/JIFS-201146
Journal: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 5, pp. 7795-7806, 2020
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]