A new secure transmission scheme between senders and receivers using HVCHC without any loss

This paper presents a novel secure medical image transmission scheme using hybrid visual cryptography and Hill cipher (HVCHC) between sender and receiver. The gray scale medical images have been considered as a secret image and split into different shares by visual cryptography (VC) encryption proce...

Full description

Saved in:
Bibliographic Details
Published inEURASIP journal on wireless communications and networking Vol. 2019; no. 1; pp. 1 - 15
Main Authors Almutairi, Saad, S, Manimurugan, Aborokbah, Majed
Format Journal Article
LanguageEnglish
Published Cham Springer International Publishing 05.04.2019
Springer Nature B.V
SpringerOpen
Subjects
Online AccessGet full text

Cover

Loading…
Abstract This paper presents a novel secure medical image transmission scheme using hybrid visual cryptography and Hill cipher (HVCHC) between sender and receiver. The gray scale medical images have been considered as a secret image and split into different shares by visual cryptography (VC) encryption process. The split shares are once again encoded by Hill cipher (HC) encode process for improving the efficiency of the proposed method. In this process, the encrypted medical image (shares) pixels are converted as characters based on the character determination (CD) and lookup tables. In result, a secret image is converted into characters. These characters are sent to the receiver/authenticated person for the reconstruction process. In receiver side, the ciphertext has been decoded by HC decode process for reconstructing the shares. The reconstructed shares are decrypted by the VC decryption process for retaining the original secret medical image. The proposed algorithm has provided better CC, less execution time, higher confidentiality, integrity, and authentication (CIA). Therefore, using this proposed method, cent percent of the original secret medical image can be obtained and the secret image can be prevented from the interception of intruders/third parties.
AbstractList Abstract This paper presents a novel secure medical image transmission scheme using hybrid visual cryptography and Hill cipher (HVCHC) between sender and receiver. The gray scale medical images have been considered as a secret image and split into different shares by visual cryptography (VC) encryption process. The split shares are once again encoded by Hill cipher (HC) encode process for improving the efficiency of the proposed method. In this process, the encrypted medical image (shares) pixels are converted as characters based on the character determination (CD) and lookup tables. In result, a secret image is converted into characters. These characters are sent to the receiver/authenticated person for the reconstruction process. In receiver side, the ciphertext has been decoded by HC decode process for reconstructing the shares. The reconstructed shares are decrypted by the VC decryption process for retaining the original secret medical image. The proposed algorithm has provided better CC, less execution time, higher confidentiality, integrity, and authentication (CIA). Therefore, using this proposed method, cent percent of the original secret medical image can be obtained and the secret image can be prevented from the interception of intruders/third parties.
This paper presents a novel secure medical image transmission scheme using hybrid visual cryptography and Hill cipher (HVCHC) between sender and receiver. The gray scale medical images have been considered as a secret image and split into different shares by visual cryptography (VC) encryption process. The split shares are once again encoded by Hill cipher (HC) encode process for improving the efficiency of the proposed method. In this process, the encrypted medical image (shares) pixels are converted as characters based on the character determination (CD) and lookup tables. In result, a secret image is converted into characters. These characters are sent to the receiver/authenticated person for the reconstruction process. In receiver side, the ciphertext has been decoded by HC decode process for reconstructing the shares. The reconstructed shares are decrypted by the VC decryption process for retaining the original secret medical image. The proposed algorithm has provided better CC, less execution time, higher confidentiality, integrity, and authentication (CIA). Therefore, using this proposed method, cent percent of the original secret medical image can be obtained and the secret image can be prevented from the interception of intruders/third parties.
ArticleNumber 88
Author S, Manimurugan
Almutairi, Saad
Aborokbah, Majed
Author_xml – sequence: 1
  givenname: Saad
  surname: Almutairi
  fullname: Almutairi, Saad
  organization: Department of Computer Science, Faculty of Computers and Information Technology, University of Tabuk
– sequence: 2
  givenname: Manimurugan
  orcidid: 0000-0003-1837-6797
  surname: S
  fullname: S, Manimurugan
  email: smanimurugan@yahoo.co.in
  organization: Department of Computer Engineering, Faculty of Computers and Information Technology, University of Tabuk
– sequence: 3
  givenname: Majed
  surname: Aborokbah
  fullname: Aborokbah, Majed
  organization: Department of Computer Science, Faculty of Computers and Information Technology, University of Tabuk
BookMark eNp9UUtrVDEYDdKCff0AdwHXV_O6jyzLoE6h0I266SLk8WWaYSapSa5D--vNeKWKoKvvwTnne5xzdBJTBITeUPKO0ml4Xygf-NQRKjvKpeyeX6EzOkxjR4WUJ3_kr9F5KVtCOBeSnaH7axzhgAvYOQOuWceyD6WEFHGxD7AHbKAeAFoJ0UEuWEeHM1gI34_VXELc4PXX1XqFD6E-pLk2xBPepVIu0anXuwJXv-IF-vLxw-fVuru9-3Szur7trGB97SSwEYSRdiCeesYF4Y5TL6ZBmt5pLiZiBmaI9cZ77nrmLeXAnTaC9457foFuFl2X9FY95rDX-UklHdTPRsobpXMNdgdqon1vDTFWGyMG57XgjNixHyhtHaKb1ttF6zGnbzOUqrZpzrGtrxgjnPGxp6Sh6IKyud2Zwb9MpUQd_VCLH6r5oY5-qOfGGf_i2FB1bZ9uXw-7_zLZwixtStxA_r3Tv0k_ABATotg
CitedBy_id crossref_primary_10_1016_j_bspc_2021_102465
crossref_primary_10_1007_s12652_021_02990_8
crossref_primary_10_1007_s11227_021_03928_9
crossref_primary_10_1016_j_comnet_2024_110501
crossref_primary_10_1155_2023_5881769
crossref_primary_10_1007_s11277_021_09013_x
crossref_primary_10_32628_CSEIT2490214
crossref_primary_10_1016_j_micpro_2020_103261
crossref_primary_10_1142_S0218488523400081
Cites_doi 10.1007/s10623-003-6741-z
10.1016/j.protcy.2012.05.016
10.1007/s11042-015-2770-7
10.1007/s11042-015-2779-y
10.4018/IJDCF.2016070106
10.1080/00029890.1929.11986963
10.1016/j.ijleo.2015.07.117
10.1016/j.tcs.2015.09.016
10.1093/comjnl/bxh152
10.1016/j.procs.2010.11.031
10.1016/j.tcs.2013.09.005
10.1080/00029890.1931.11987161
10.1016/j.tcs.2007.01.006
10.9790/0661-1121014
10.1016/j.image.2016.09.001
10.4018/IJDCF.2015010102
10.1016/j.ipl.2004.10.011
10.21833/ijaas.2017.02.010
ContentType Journal Article
Copyright The Author(s). 2019
EURASIP Journal on Wireless Communications and Networking is a copyright of Springer, (2019). All Rights Reserved. © 2019. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: The Author(s). 2019
– notice: EURASIP Journal on Wireless Communications and Networking is a copyright of Springer, (2019). All Rights Reserved. © 2019. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID C6C
AAYXX
CITATION
3V.
7SC
7SP
7XB
8AL
8FD
8FE
8FG
8FK
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
L7M
L~C
L~D
M0N
P5Z
P62
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
Q9U
DOA
DOI 10.1186/s13638-019-1399-z
DatabaseName Springer Nature OA Free Journals
CrossRef
ProQuest Central (Corporate)
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
ProQuest Central (purchase pre-March 2016)
Computing Database (Alumni Edition)
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Central
Technology collection
ProQuest One
ProQuest Central Korea
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Computing Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
ProQuest Central Basic
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Publicly Available Content Database
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Central Korea
ProQuest Central (New)
Advanced Technologies Database with Aerospace
Advanced Technologies & Aerospace Collection
ProQuest Computing
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
Electronics & Communications Abstracts
ProQuest Technology Collection
ProQuest SciTech Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
DatabaseTitleList

Publicly Available Content Database
Database_xml – sequence: 1
  dbid: C6C
  name: Springer Nature OA Free Journals
  url: http://www.springeropen.com/
  sourceTypes: Publisher
– sequence: 2
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 3
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1687-1499
EndPage 15
ExternalDocumentID oai_doaj_org_article_8155cb0bcabb46dfa4320c75611abb0a
10_1186_s13638_019_1399_z
GroupedDBID -A0
.4S
.DC
0R~
29G
2WC
3V.
4.4
40G
5GY
5VS
6OB
8FE
8FG
8R4
8R5
AAFWJ
AAJSJ
AAKKN
AAKPC
ABDBF
ABEEZ
ABFTD
ABUWG
ACACY
ACGFS
ACUHS
ACULB
ADBBV
ADDVE
ADINQ
ADMLS
AENEX
AFGXO
AFKRA
AFPKN
AHBYD
AHYZX
ALMA_UNASSIGNED_HOLDINGS
AMKLP
ARAPS
ARCSS
AZQEC
BCNDV
BENPR
BGLVJ
BPHCQ
C24
C6C
CCPQU
CS3
DU5
DWQXO
E3Z
EAD
EAP
EAS
EBLON
EBS
EDO
EJD
EMK
ESX
GNUQQ
GROUPED_DOAJ
HCIFZ
HZ~
I-F
K6V
K7-
KQ8
M0N
M~E
OK1
P2P
P62
PIMPY
PQQKQ
PROAC
Q2X
RHU
RNS
RSV
SEG
SOJ
TUS
U2A
XSB
AASML
AAYXX
CITATION
OVT
PHGZM
PHGZT
7SC
7SP
7XB
8AL
8FD
8FK
JQ2
L7M
L~C
L~D
PKEHL
PQEST
PQGLB
PQUKI
PRINS
Q9U
PUEGO
ID FETCH-LOGICAL-c425t-9e27e4b9c60f1f23403d31f4869b5da3480b62b0cfbff3d52fc13e3dab435d3f3
IEDL.DBID BENPR
ISSN 1687-1499
1687-1472
IngestDate Wed Aug 27 01:26:02 EDT 2025
Fri Jul 25 03:03:36 EDT 2025
Thu Apr 24 23:11:01 EDT 2025
Tue Jul 01 00:40:54 EDT 2025
Fri Feb 21 02:35:33 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 1
Keywords Hill cipher
Visual cryptography
Medical images
Character conversion
Transmission
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c425t-9e27e4b9c60f1f23403d31f4869b5da3480b62b0cfbff3d52fc13e3dab435d3f3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0003-1837-6797
OpenAccessLink https://www.proquest.com/docview/2203237510?pq-origsite=%requestingapplication%
PQID 2203237510
PQPubID 237293
PageCount 15
ParticipantIDs doaj_primary_oai_doaj_org_article_8155cb0bcabb46dfa4320c75611abb0a
proquest_journals_2203237510
crossref_primary_10_1186_s13638_019_1399_z
crossref_citationtrail_10_1186_s13638_019_1399_z
springer_journals_10_1186_s13638_019_1399_z
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2019-04-05
PublicationDateYYYYMMDD 2019-04-05
PublicationDate_xml – month: 04
  year: 2019
  text: 2019-04-05
  day: 05
PublicationDecade 2010
PublicationPlace Cham
PublicationPlace_xml – name: Cham
– name: New York
PublicationTitle EURASIP journal on wireless communications and networking
PublicationTitleAbbrev J Wireless Com Network
PublicationYear 2019
Publisher Springer International Publishing
Springer Nature B.V
SpringerOpen
Publisher_xml – name: Springer International Publishing
– name: Springer Nature B.V
– name: SpringerOpen
References NaorMShamirAVisual cryptography, in: advances in cryptology, EUROCRYPT’94, in: LNCS1994112
YanXWangSNiuXThreshold progressive visual cryptography construction with unexpanded sharesMultimed. Tools Appl.2016758657867410.1007/s11042-015-2779-y
Suman ChandrasekharAHPAdarshKSasiSA secure encryption technique based on advanced Hill cipher for a public key cryptosystemIOSR J. Comput. Eng.2013112101410.9790/0661-1121014
KrishnaAVNMadhuravaniKA Modified Hill cipher using randomized approachInt. J. Comput. Netw. Inf. Secur.201255662
AcharyaBSharmaMDTiwariSMinzVKPrivacy protection of biometric traits using modified Hill cipher with Involutory key and robust cryptosystemProcedia Comput. Sci.2010224224710.1016/j.procs.2010.11.031
WangGLiuFYanWQBasic visual cryptography using brailleInt. J. Digit. Crime Forensics201683859310.4018/IJDCF.2016070106
MishraDCSharmaRKRanjanRHanmandluMSecurity of RGB image data by affine hill cipher over SLn(Fq) and Mn(Fq) domains with Arnold transformOptik20151263812382210.1016/j.ijleo.2015.07.117
ManimuruganSNarmathaCPorkumaranKThe new approach of visual cryptography scheme for protecting the grayscale medical imagesJ. Theor. Appl. Inf. Technol.2014693552561
S. Cimato, R. De Prisco, A. De Santis, Visual cryptography for color images, in: visual cryptography and secret image sharing (CRC Press, London, 2012), pp. 31–56 ISBN 978–1–4398-3721-4.
HillLSConcerning certain linear transformation apparatus of cryptographyAm. Math. Mon.193138135154152220110.1080/00029890.1931.11987161
RahmanMNAAbidinAFAYusofMKUsopNSMCryptography: a new approach of classical Hill cipherInt. J. Secur. Its Appl.201372179190
CimatoSDe SantisAFerraraALMasucciBIdeal contrast visual cryptography schemes with reversingInf. Process. Letter200593199206211061110.1016/j.ipl.2004.10.011
ManimuruganSPorkumaranKNarmathaC“The new block pixel Sort algorithm for TVC encrypted medical image”, imaging scienceJournal2014628403414
CimatoSDe PriscoRDe SantisAColored visual cryptography without color darkeningTheor. Comput. Sci.2007374261276231748410.1016/j.tcs.2007.01.006
ShaoZShangYZengRShuHCoatrieuxGWuJRobust watermarking scheme for color image based on quaternion-type moment invariants and visual cryptographySignal Process. Image Commun.201648122110.1016/j.image.2016.09.001
ReddyKAVishnuvardhanBMadhuviswanathamKrishnaAVNA modified Hill cipher based on circulant matricesProcedia Technol2012411411810.1016/j.protcy.2012.05.016
ManimuruganSPorkumaranKFast and efficient secure medical image compression schemesEur. J. Sci Res2011562139150
CimatoSDe PriscoRDe SantisAProbabilistic visual cryptography schemesComput. J.2006499710710.1093/comjnl/bxh152
AmiriTMoghaddamMEA new visual cryptography based watermarking scheme using DWT and SIFT for multiple cover imagesMultimed. Tools Appl.2016758527854310.1007/s11042-015-2770-7
De PriscoRDe SantisAColor visual cryptography schemes for black and white secret imagesTheor. Comput. Sci.20135106286312221210.1016/j.tcs.2013.09.005
SharmaNChirgaiyaSA novel approach to Hill cipherInt. J. Comput. Appl.2014108113437
ManimuruganSNarmathaCSecure and efficient medical image transmission by new tailored visual cryptography scheme with LS compressionsInt. J. Digit. Crime Forensics201571265010.4018/IJDCF.2015010102
Al-MutairiSManimuruganSAn efficient secret image transmission scheme using Dho-encryption techniqueInt. J. Comput. Sci. Inf. Secur20161410446460
ManimuruganSPorkumaranKSecure medical image compression using block pixel Sort algorithmEur. J. Sci. Res.2011562129138
Al-MutairiSManimuruganSThe clandestine image transmission scheme to prevent from the intrudersInt. J. Adv. Appl. Sci.201742526010.21833/ijaas.2017.02.010
CimatoSDe PriscoRDe SantisAOptimal colored threshold visual cryptography schemesDes. Codes Cryptography200535311335215086610.1007/s10623-003-6741-z
YangC-NSunL-ZCaiS-RExtended color visual cryptography for black and white secret imageTheor. Comput. Sci.2016609143161342694610.1016/j.tcs.2015.09.016
HillLSCryptography in an algebraic alphabetAm. Math. Mon.1929366306312152175910.1080/00029890.1929.11986963
C-N Yang (1399_CR11) 2016; 609
S Cimato (1399_CR6) 2006; 49
S Manimurugan (1399_CR20) 2014; 62
T Amiri (1399_CR14) 2016; 75
KA Reddy (1399_CR27) 2012; 4
S Manimurugan (1399_CR13) 2011; 56
G Wang (1399_CR16) 2016; 8
S Al-Mutairi (1399_CR19) 2017; 4
MNA Rahman (1399_CR24) 2013; 7
LS Hill (1399_CR2) 1929; 36
AVN Krishna (1399_CR22) 2012; 5
S Manimurugan (1399_CR17) 2015; 7
S Al-Mutairi (1399_CR18) 2016; 14
X Yan (1399_CR15) 2016; 75
S Cimato (1399_CR5) 2005; 35
AHP Suman Chandrasekhar (1399_CR23) 2013; 11
N Sharma (1399_CR28) 2014; 108
LS Hill (1399_CR3) 1931; 38
S Cimato (1399_CR7) 2005; 93
B Acharya (1399_CR26) 2010; 2
M Naor (1399_CR1) 1994
1399_CR9
S Manimurugan (1399_CR21) 2014; 69
S Manimurugan (1399_CR12) 2011; 56
DC Mishra (1399_CR25) 2015; 126
R Prisco De (1399_CR10) 2013; 510
Z Shao (1399_CR4) 2016; 48
S Cimato (1399_CR8) 2007; 374
References_xml – reference: SharmaNChirgaiyaSA novel approach to Hill cipherInt. J. Comput. Appl.2014108113437
– reference: CimatoSDe PriscoRDe SantisAProbabilistic visual cryptography schemesComput. J.2006499710710.1093/comjnl/bxh152
– reference: KrishnaAVNMadhuravaniKA Modified Hill cipher using randomized approachInt. J. Comput. Netw. Inf. Secur.201255662
– reference: ManimuruganSNarmathaCSecure and efficient medical image transmission by new tailored visual cryptography scheme with LS compressionsInt. J. Digit. Crime Forensics201571265010.4018/IJDCF.2015010102
– reference: CimatoSDe PriscoRDe SantisAOptimal colored threshold visual cryptography schemesDes. Codes Cryptography200535311335215086610.1007/s10623-003-6741-z
– reference: HillLSCryptography in an algebraic alphabetAm. Math. Mon.1929366306312152175910.1080/00029890.1929.11986963
– reference: CimatoSDe PriscoRDe SantisAColored visual cryptography without color darkeningTheor. Comput. Sci.2007374261276231748410.1016/j.tcs.2007.01.006
– reference: S. Cimato, R. De Prisco, A. De Santis, Visual cryptography for color images, in: visual cryptography and secret image sharing (CRC Press, London, 2012), pp. 31–56 ISBN 978–1–4398-3721-4.
– reference: MishraDCSharmaRKRanjanRHanmandluMSecurity of RGB image data by affine hill cipher over SLn(Fq) and Mn(Fq) domains with Arnold transformOptik20151263812382210.1016/j.ijleo.2015.07.117
– reference: AcharyaBSharmaMDTiwariSMinzVKPrivacy protection of biometric traits using modified Hill cipher with Involutory key and robust cryptosystemProcedia Comput. Sci.2010224224710.1016/j.procs.2010.11.031
– reference: WangGLiuFYanWQBasic visual cryptography using brailleInt. J. Digit. Crime Forensics201683859310.4018/IJDCF.2016070106
– reference: Al-MutairiSManimuruganSThe clandestine image transmission scheme to prevent from the intrudersInt. J. Adv. Appl. Sci.201742526010.21833/ijaas.2017.02.010
– reference: HillLSConcerning certain linear transformation apparatus of cryptographyAm. Math. Mon.193138135154152220110.1080/00029890.1931.11987161
– reference: YangC-NSunL-ZCaiS-RExtended color visual cryptography for black and white secret imageTheor. Comput. Sci.2016609143161342694610.1016/j.tcs.2015.09.016
– reference: ManimuruganSPorkumaranKNarmathaC“The new block pixel Sort algorithm for TVC encrypted medical image”, imaging scienceJournal2014628403414
– reference: ManimuruganSNarmathaCPorkumaranKThe new approach of visual cryptography scheme for protecting the grayscale medical imagesJ. Theor. Appl. Inf. Technol.2014693552561
– reference: RahmanMNAAbidinAFAYusofMKUsopNSMCryptography: a new approach of classical Hill cipherInt. J. Secur. Its Appl.201372179190
– reference: ReddyKAVishnuvardhanBMadhuviswanathamKrishnaAVNA modified Hill cipher based on circulant matricesProcedia Technol2012411411810.1016/j.protcy.2012.05.016
– reference: YanXWangSNiuXThreshold progressive visual cryptography construction with unexpanded sharesMultimed. Tools Appl.2016758657867410.1007/s11042-015-2779-y
– reference: De PriscoRDe SantisAColor visual cryptography schemes for black and white secret imagesTheor. Comput. Sci.20135106286312221210.1016/j.tcs.2013.09.005
– reference: Suman ChandrasekharAHPAdarshKSasiSA secure encryption technique based on advanced Hill cipher for a public key cryptosystemIOSR J. Comput. Eng.2013112101410.9790/0661-1121014
– reference: NaorMShamirAVisual cryptography, in: advances in cryptology, EUROCRYPT’94, in: LNCS1994112
– reference: ShaoZShangYZengRShuHCoatrieuxGWuJRobust watermarking scheme for color image based on quaternion-type moment invariants and visual cryptographySignal Process. Image Commun.201648122110.1016/j.image.2016.09.001
– reference: ManimuruganSPorkumaranKSecure medical image compression using block pixel Sort algorithmEur. J. Sci. Res.2011562129138
– reference: CimatoSDe SantisAFerraraALMasucciBIdeal contrast visual cryptography schemes with reversingInf. Process. Letter200593199206211061110.1016/j.ipl.2004.10.011
– reference: AmiriTMoghaddamMEA new visual cryptography based watermarking scheme using DWT and SIFT for multiple cover imagesMultimed. Tools Appl.2016758527854310.1007/s11042-015-2770-7
– reference: Al-MutairiSManimuruganSAn efficient secret image transmission scheme using Dho-encryption techniqueInt. J. Comput. Sci. Inf. Secur20161410446460
– reference: ManimuruganSPorkumaranKFast and efficient secure medical image compression schemesEur. J. Sci Res2011562139150
– volume: 35
  start-page: 311
  year: 2005
  ident: 1399_CR5
  publication-title: Des. Codes Cryptography
  doi: 10.1007/s10623-003-6741-z
– volume: 108
  start-page: 34
  issue: 11
  year: 2014
  ident: 1399_CR28
  publication-title: Int. J. Comput. Appl.
– volume: 4
  start-page: 114
  year: 2012
  ident: 1399_CR27
  publication-title: Procedia Technol
  doi: 10.1016/j.protcy.2012.05.016
– volume: 14
  start-page: 446
  issue: 10
  year: 2016
  ident: 1399_CR18
  publication-title: Int. J. Comput. Sci. Inf. Secur
– ident: 1399_CR9
– volume: 75
  start-page: 8527
  year: 2016
  ident: 1399_CR14
  publication-title: Multimed. Tools Appl.
  doi: 10.1007/s11042-015-2770-7
– volume: 69
  start-page: 552
  issue: 3
  year: 2014
  ident: 1399_CR21
  publication-title: J. Theor. Appl. Inf. Technol.
– volume: 5
  start-page: 56
  year: 2012
  ident: 1399_CR22
  publication-title: Int. J. Comput. Netw. Inf. Secur.
– volume: 7
  start-page: 179
  issue: 2
  year: 2013
  ident: 1399_CR24
  publication-title: Int. J. Secur. Its Appl.
– volume: 75
  start-page: 8657
  year: 2016
  ident: 1399_CR15
  publication-title: Multimed. Tools Appl.
  doi: 10.1007/s11042-015-2779-y
– volume: 62
  start-page: 403
  issue: 8
  year: 2014
  ident: 1399_CR20
  publication-title: Journal
– volume: 8
  start-page: 85
  issue: 3
  year: 2016
  ident: 1399_CR16
  publication-title: Int. J. Digit. Crime Forensics
  doi: 10.4018/IJDCF.2016070106
– volume: 36
  start-page: 306
  issue: 6
  year: 1929
  ident: 1399_CR2
  publication-title: Am. Math. Mon.
  doi: 10.1080/00029890.1929.11986963
– volume: 126
  start-page: 3812
  year: 2015
  ident: 1399_CR25
  publication-title: Optik
  doi: 10.1016/j.ijleo.2015.07.117
– volume: 609
  start-page: 143
  year: 2016
  ident: 1399_CR11
  publication-title: Theor. Comput. Sci.
  doi: 10.1016/j.tcs.2015.09.016
– volume: 49
  start-page: 97
  year: 2006
  ident: 1399_CR6
  publication-title: Comput. J.
  doi: 10.1093/comjnl/bxh152
– volume: 56
  start-page: 139
  issue: 2
  year: 2011
  ident: 1399_CR13
  publication-title: Eur. J. Sci Res
– volume: 2
  start-page: 242
  year: 2010
  ident: 1399_CR26
  publication-title: Procedia Comput. Sci.
  doi: 10.1016/j.procs.2010.11.031
– volume: 510
  start-page: 62
  year: 2013
  ident: 1399_CR10
  publication-title: Theor. Comput. Sci.
  doi: 10.1016/j.tcs.2013.09.005
– volume: 38
  start-page: 135
  year: 1931
  ident: 1399_CR3
  publication-title: Am. Math. Mon.
  doi: 10.1080/00029890.1931.11987161
– volume: 374
  start-page: 261
  year: 2007
  ident: 1399_CR8
  publication-title: Theor. Comput. Sci.
  doi: 10.1016/j.tcs.2007.01.006
– volume: 11
  start-page: 10
  issue: 2
  year: 2013
  ident: 1399_CR23
  publication-title: IOSR J. Comput. Eng.
  doi: 10.9790/0661-1121014
– volume: 48
  start-page: 12
  year: 2016
  ident: 1399_CR4
  publication-title: Signal Process. Image Commun.
  doi: 10.1016/j.image.2016.09.001
– volume: 7
  start-page: 26
  issue: 1
  year: 2015
  ident: 1399_CR17
  publication-title: Int. J. Digit. Crime Forensics
  doi: 10.4018/IJDCF.2015010102
– volume: 93
  start-page: 199
  year: 2005
  ident: 1399_CR7
  publication-title: Inf. Process. Letter
  doi: 10.1016/j.ipl.2004.10.011
– start-page: 1
  volume-title: Visual cryptography, in: advances in cryptology, EUROCRYPT’94, in: LNCS
  year: 1994
  ident: 1399_CR1
– volume: 4
  start-page: 52
  issue: 2
  year: 2017
  ident: 1399_CR19
  publication-title: Int. J. Adv. Appl. Sci.
  doi: 10.21833/ijaas.2017.02.010
– volume: 56
  start-page: 129
  issue: 2
  year: 2011
  ident: 1399_CR12
  publication-title: Eur. J. Sci. Res.
SSID ssj0033492
Score 2.3794072
Snippet This paper presents a novel secure medical image transmission scheme using hybrid visual cryptography and Hill cipher (HVCHC) between sender and receiver. The...
Abstract This paper presents a novel secure medical image transmission scheme using hybrid visual cryptography and Hill cipher (HVCHC) between sender and...
SourceID doaj
proquest
crossref
springer
SourceType Open Website
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1
SubjectTerms Algorithms
Character conversion
Coding
Communications Engineering
Cryptography
Encryption
Engineering
Gray scale
Hill cipher
Image transmission
Information Systems Applications (incl.Internet)
Interception
Lookup tables
Medical images
Medical imaging
Networks
Recent Challenges & Avenues in Wireless Communication through Advance computational Intelligence or Deep learning methods
Signal,Image and Speech Processing
Transmission
Visual cryptography
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV07SwQxEA5ipYX4xPNFCislmE2y2Wyph3IIWnkiWIQ8bfQUdy301zvJ7ukpqI1tNgvDzCTzzWT4BqF9Q6k1JXOE06gI4H9DTFkxwo1kxqRCQ24ev7iUo7E4vylvZkZ9pZ6wjh64U9yRgoDnLLXOWCukj0ZwRl0FYb-AFZqhEcS8aTLV3cE8ce71b5iFkkdNwcHPIG2uCSCemrx9iUKZrP8Lwvz2KJpjzdkyWupBIj7uhFtBc2GyihZnqAPX0O0xBkCMm1QuD7hNEQcslkpfGPLV8BBw34GFmzwsrsFm4jFcbyE3YuDU736HR9fD0RCnWuzjSws7XvE9iLuOxmenV8MR6QclEAdHriV1YFUQtnaSxiIyLij3vIhCydqW3nChqJXMUhdtjNyXLLpU_PTGAljyPPINND95nIRNhEOUhapjWXnnBXMB4AlXyiihODfKmgGiU8Vp17OIp2EW9zpnE0rqTtcadK2TrvXbAB18_PLUUWj8tvkkWeNjY2K_zgvgE7r3Cf2XTwzQztSWuj-SjWZpVjyv4A4aoMOpfT8__yjR1n9ItI0WWPK-1PJT7qD59vkl7AKaae1edtx3igfxfQ
  priority: 102
  providerName: Directory of Open Access Journals
– databaseName: SpringerLink
  dbid: C24
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT9wwELYKvZQDaguoC0vlQ0-tLBzbcZwjXbFaIdFTqZB6sPzkQncrEg7l1zPjTWhBBYlrMpasGc_4m4dnCPnkOPeuFoFJng0D_O-YqxvBpNPCOQw0lOLxs296ca5OL-qL4R13N1a7jynJYqmLWht91FUSzgq4vi0D1NKy2w3yukbXHTO0-MRhbX4lttsb0pf_XfbgAip9-h-Ay0f50HLNzN-S7QEf0uO1QN-RV2n5nmz90zVwh_w8poCFaYeR8kR7vGxAWBj1ouCqpl-JDsVXtCtz4jrqlpGCZUulBoNiqfslXfyYLWYUw7Crmx4o_tAr2O4uOZ-ffJ8t2DAjgQXQtp61STRJ-TZonqsspOIyyioro1tfRyeV4V4Lz0P2OctYixww7hmdB5wUZZZ7ZHO5WqYPhKasK9PmuokhKhESIBNpjDPKSOmMdxPCR8bZMDQQxzkWV7Y4EkbbNa8t8Noir-3thHy-X_J73T3jOeKvKI17Qmx8XT6sri_toEfWAP4JnvvgvFc6Zqek4KEBFFjBFw6bnI6ytIM2dlbgmHjZgPmZkC-jfP_-fnJH-y-iPiBvBB4zLOupp2Szv75Jh4BYev-xnNA7R0vlDQ
  priority: 102
  providerName: Springer Nature
Title A new secure transmission scheme between senders and receivers using HVCHC without any loss
URI https://link.springer.com/article/10.1186/s13638-019-1399-z
https://www.proquest.com/docview/2203237510
https://doaj.org/article/8155cb0bcabb46dfa4320c75611abb0a
Volume 2019
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LbxMxELZocoED4ikCJfKBE8iq1_Z6vSe0XTVEkagQEFSJg-VnL21SutsD_fWMN96WItHLHBxvZM3L34xHMwi9M5RaUzJHOI2KAP43xJQVI9xIZkxKNAzF45-P5XItViflSU64dbmscvSJg6P2W5dy5AcsjfrmFajQx4tfJE2NSq-reYTGHpqCC1ZqgqaHR8dfvo6-mKfeeynkkmBKhahYftcslDzoCg66B6F0TQAF1eT6zs00NPC_gzr_eSgd7p_FE_Q4A0fc7CT9FD0Im2fo0V_tBJ-jnw0GkIy7lEIPuE-3EEgxpcMwxLDhPOBclYW7YYBch83GY3B5YSjOwKkG_hQvf7TLFqf87Paqhx2_8Rkc9wVaL46-t0uShycQB2bYkzqwKghbO0ljERkXlHteRKFkbUtvuFDUSmapizZG7ksWXUqIemMBQHke-Us02Ww34RXCIcpC1bGsvPOCuQCQhStllFCcG2XNDNGRcdrlzuJpwMWZHiIMJfWO1xp4rROv9fUMvb_55GLXVuO-zYdJGjcbU0fsYWF7eaqzgWkFwMhZap2xVkgfjeCMugrgYQErFA65P8pSZzPt9K1SzdCHUb63P__3RK_v_7M36CFLepUKfMp9NOkvr8JbwC69naM9QT8BVQug06ZZfVvNs9LCastEorKdD7kBoGvW_AG57vH2
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELZKOQAHxFMsLeADXEBWHdtxnANCZWHZ0sepRZU4GD97Kbttkwq1P4rfyEw2aSkSvfXqOJY1_jz-ZjyeIeS149y7UgQmeTYM-L9jrqwEk04L59DR0AWPb-_o6Z76ul_uL5Hfw1sYDKscdGKnqOM8oI98TWCpb1kBhD4cHTOsGoW3q0MJjQUsNtPZLzDZmvcbn2B93wgx-bw7nrK-qgALgM-W1UlUSfk6aJ6LLKTiMsoiK6NrX0YnleFeC89D9jnLWIoc0FMYnQdmEWWWMO4tcltJOMnxZfrky6D5JWb6QwNPw8YtVCX6W9TC6LWmkIB0MNxrBpyrZudXzsGuXMAVjvvPtWx32k0ekPs9TaXrC1w9JEtp9ojc-yt54WPyfZ0CJacNOuwTbfHMA8yg842CxZx-JtrHgNGmK1fXUDeLFBRs6kJBKEbcH9Dpt_F0TNEbPD9toccZPYTpPiF7NyLUp2R5Np-lZ4SmrAtT57KKISoREhAkaYwzykjpjHcjwgfB2dDnMcdyGoe2s2eMtgtZW5C1RVnb8xF5e_HL0SKJx3WdP-JqXHTE_Ntdw_zkwPbb2RqgYcFzH5z3SsfslBQ8VEBGC2jhMMnVYS1trxQaewnhEXk3rO_l5__O6Pn1g70id6a721t2a2Nnc4XcFYgxDC0qV8lye3KaXgBrav3LDqqU_LjpvfEH-2knig
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELbKVkJwQDzFQgEf4AKK1rEdxzkg1G672lJYVYiiShxcP3spu6VJhdqfxq9jJpu0FIneenWcyBp_nvlmPJkh5LVlzNmC-0ywpDPg_zazRckzYRW3FgMNbfL455ma7smP-8X-Cvnd_wuDaZW9TmwVdVh4jJGPOLb6FiVAaJS6tIjdzcmH458ZdpDCm9a-ncYSIjvx7Be4b_X77U3Y6zecT7a-jqdZ12Eg84DVJqsiL6N0lVcs5YkLyUQQeZJaVa4IVkjNnOKO-eRSEqHgyWPUMFgHLCOIJOC7t8hqiV7RgKxubM12v_R2QGDdP3T3FBzjXJa8u1PNtRrVuQDcgxtfZcDAquz8ilVsmwdcYbz_XNK2tm9yn9zrSCtdX6LsAVmJ84fk7l-lDB-R7-sUCDqtMXwfaYMWEBCEoTgK_nP8EWmXEUbrtnldTe08UFC3sU0MoZh_f0in38bTMcXY8OK0gRln9AiW-5js3YhYn5DBfDGPTwmNSeW6SkUZfJDcR6BLQmurpRbCameHhPWCM76rao7NNY5M691oZZayNiBrg7I250Py9uKV42VJj-smb-BuXEzEatztwOLk0HSH22ggZd4x561zUoVkpeDMl0BNcxhhsMi1fi9NpyJqcwnoIXnX7-_l4_-u6Nn1H3tFbsO5MJ-2ZzvPyR2OEMM8o2KNDJqT0_gCKFTjXnZYpeTgpo_HH7GmLRw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+new+secure+transmission+scheme+between+senders+and+receivers+using+HVCHC+without+any+loss&rft.jtitle=EURASIP+journal+on+wireless+communications+and+networking&rft.au=Almutairi%2C+Saad&rft.au=Manimurugan%2C+S&rft.au=Aborokbah%2C+Majed&rft.date=2019-04-05&rft.pub=Springer+Nature+B.V&rft.issn=1687-1472&rft.eissn=1687-1499&rft.volume=2019&rft.issue=1&rft.spage=1&rft.epage=15&rft_id=info:doi/10.1186%2Fs13638-019-1399-z&rft.externalDBID=HAS_PDF_LINK
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1687-1499&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1687-1499&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1687-1499&client=summon